Attracted by the benefits offered by mobility technologies directly relating to cost savings and improved productivity, enterprises are keen to adopt BYOD models; however, without proper feasibility studies and mobility policies in place, BYOD will not be able to generate the desired results. The commercialization of technology or BYOD is rapidly transforming the enterprise mobility landscape and changing the way that organizations conduct business. However, the adoption of this concept enables enterprises to devise stringent and precise mobility policies to avoid any security and privacy issues.
In today’s globalized, competitive marketplace, being able to leverage technology to deliver faster turnaround times, meet lower pricing goals and provide customizable options can mean the difference between sustainability and irrelevancy. In this ebook, we’ll explore some of the leading solutions transforming the manufacturing industry:
- Automation for cost savings
- 3D printing for improved productivity
- Smart data for quality assurance
- Connectivity for safety and communication
- Security solutions to protect it all
Learn more: http://ms.spr.ly/6006Twegg
Interaction of IT investment mandates and mobile savvy affecting mobile offic...IJECEIAES
This study investigates the effect of IT investment portfolios on the performance of mobile business services, as well as the moderating role of IT savvy. This study pulls the concept of IT investment mandates into the conceptual research framework of mobile investment. A survey for the IT specialists working at 123 enterprise-level companies was conducted and hierarchical regression analysis was adopted. Our results show that IT investment and organizational IT capabilities influence the performance of the mobile office and that IT savvy plays as a moderator in the relationship between investment mandates and mobile office performance. This research also may indicate that transactional assets are most helpful factors for a change by the adoption of mobile technology. This study is a rare research paper to explain the impact of IT investment portfolios on the mobile office performance in an academic methodology.
In today’s globalized, competitive marketplace, being able to leverage technology to deliver faster turnaround times, meet lower pricing goals and provide customizable options can mean the difference between sustainability and irrelevancy. In this ebook, we’ll explore some of the leading solutions transforming the manufacturing industry:
- Automation for cost savings
- 3D printing for improved productivity
- Smart data for quality assurance
- Connectivity for safety and communication
- Security solutions to protect it all
Learn more: http://ms.spr.ly/6006Twegg
Interaction of IT investment mandates and mobile savvy affecting mobile offic...IJECEIAES
This study investigates the effect of IT investment portfolios on the performance of mobile business services, as well as the moderating role of IT savvy. This study pulls the concept of IT investment mandates into the conceptual research framework of mobile investment. A survey for the IT specialists working at 123 enterprise-level companies was conducted and hierarchical regression analysis was adopted. Our results show that IT investment and organizational IT capabilities influence the performance of the mobile office and that IT savvy plays as a moderator in the relationship between investment mandates and mobile office performance. This research also may indicate that transactional assets are most helpful factors for a change by the adoption of mobile technology. This study is a rare research paper to explain the impact of IT investment portfolios on the mobile office performance in an academic methodology.
Cognizant is the only company to earn a place in the list of Forbes fastest growing technology companies every year since the list’s inception. Its intriguing growth leaves us inquisitive – is there a framework to excel? Has Cognizant found the same? It is known that the book Built to Last by Jim Collins and Jerry Porras influenced Francisco D’Souza (CEO of Cognizant) the most. He is committed to establish a “cult like” culture focused on core values. But, beyond this, does their dual mandate of run better and run different have any role in their monumental growth? Cognizant is not only preaching about helping their clients to transform in order to run better and run different but also walking the talk by practicing the dual mandate within organization from its early days. This paper digs into Cognizant’s history and current trends to understand what they have done to run better and run different.
The paper outlines a practical “how-to” guidance to strategize and implement more effective mobile enterprise programs and details the robust capabilities that mobile enterprise partners can bring to the development and support of your corporate owned device or BYOD mobile enterprise programs.
Technology organization environment framework in cloud computingTELKOMNIKA JOURNAL
Cloud Computing is a rapidly emerging technology over the last few years, that has
abolished the burden of purchasing heavy hardware and software. Cloud computing
has been advantageous to Small and Medium-sized Enterprises (SMEs), though many
SMEs have not adopted to delve into its appealing benefits. To increase the cloud
adoption rate in these Enterprises, the most important thing is to understand the
aspects which influence the cloud adoption. The article focuses on these factors, which
influence the use of cloud services by establishing the three layer hierarchical framework
based on the grounded on the Technology Oriented Environmental (TOE)
framework through systematic literature review. Because cloud-based solutions offer
numerous benefits for companies, they have precious cloud determinants. This paper
therefore took into account the Technology Organization Environment TOE model for
Cloud Computing adoption. In addition, the questionaries designed at the end also
indicate the significant connection in the decision of adoption between three context
of TOE. Moreover, the designed questionaries has been used for the analysis of cloud
computing adoption in Bangladeshi SMEs.
http://www.hcltech.com/ -
As CIOs and business leaders try to create a modern infrastructure that can support today’s challenging IT environment, they may find themselves taking wrong turns or pursuing approaches that lead to dead ends. Here’s a technology roadmap for 2012 — one that highlights useful landmarks and identifies areas to steer clear of – that you can refer to as you explore today’s challenging IT environment. Read Now.
Internet of Things Index 2017. Excellent Report from IBM and The Economist Intelligence unit about the use of IOT nowadays, it´s main trends, problems and debate contents. Is really IOT going to change all in the next years?
Cloud computing has clearly become a driving force in the information technology world. Over 90% of global enterprises report using cloud as part of their business. With over $33 billion in projected 2015 spend, cloud is now the largest category in IT infrastructure budgets.
But every industry has its unique technology dynamics. Therefore, to understand the future of cloud computing you need to understand its dynamics in key industries.
In this report, we will first present some brief observations on the role of cloud across these verticals. The focus will be on the pace of cloud adoption and its subsequent impact on key sectors within each industry.
In addition, our research showed that manufacturing plays a special role in global development—and so the report will take a deeper dive into that unique sector. In doing so, the report will highlight digital trends that have a broader impact as cloud moves from the digital to the “cyber-physical”.
Perceived significance of information security governance to predict the info...Irfaan Bahadoor
Abstract
Purpose – Information security is a growing concern in society, across businesses and government. As the offshore IT services market continues to grow providing numerous benefits, there are also perceived risks with respect to the quality of information security delivered in the supply chain. This paper aims to examine, as a case, the perceptions of Indian software services provider (service provider) employees with respect to information security governance and its impact on information security service quality that is delivered to customers.
Design/methodology/approach – The paper provides a framework built upon the existing
dimensions and instruments for total quality management and service quality, suitably modified to reflect the context of information security. SmartPLS, a structural equation modelling technique, has been used to analyse field survey data collected from across various Indian cities and companies.
Findings – Significant finding is that information security governance in an IT outsourcing company providing software services has a highly significant impact on the information security service quality,which can be predicted.The paper also establishes that there is a positive relationship collectively between elements of information security governance and information security service quality.
Research limitations/implications – Since data used in this study were taken solely from the responses of employees of outsourced service companies in India, it does not show if this translates into service improvements as perceived by the customer.
Practical implications – Information security governance should be made an integral part of corporate governance and is an effective strategic technique, if software outsourcing business enterprises want to achieve a competitive edge, provide client satisfaction and create trust.
Originality/value – The paper presents empirical data validation of the connection between information security governance and quality of service.
Printing the Future: From Prototype to ProductionCognizant
Additive manufacturing (AM) such as 3-D printing heralds a new industrial revolution. We offer a framework for analyzing capabilities and implementing AM technologies to help you smoothly move from prototyping to volume production.
IoT and equipment connectivity are vital necessities for original equipment manufacturers, owners, and operators who want to maintain or increase market share.
THE EFFECT OF SERVICE INFLUENCE FACTORS ON PERCEIVED USEFULNESS AND USE SATIS...IAEME Publication
The convergence of advanced technologies such as AI, IoT, and BigData with medical technology also has changed medical services significantly. Particularly digital healthcare services have developed in the untact settings by the COVID-19 pandemic. This study aims to examine factors that affect the usefulness of such digital health care services perceived by users and their use satisfaction. The study defines the ‘personal influence factor, ‘information quality factor,’ and ‘social impact factor’ that affect digital healthcare service use and empirically analyzes the effects of such factors on perceived usefulness and use satisfaction. A survey was conducted among 364 individuals who used digital healthcare services in Korea, and then statistical analysis results were derived. Hence analysis results show that personal influence factors and social impact factors positively affected perceived usefulness while information quality factors did not. In addition, it turned out that personal influence factors and information quality factors had positive effects on use satisfaction while social impact factors did not affect use satisfaction. The above-stated results suggest that when it comes to digital healthcare service, personal influence factors concerning the experience of product or service use affected perceived usefulness and use satisfaction, social impact factors affected perceived usefulness, and information quality factors affected use satisfaction to a significant degree.
Electrochemical behaviorof carbon paste electrode modified with Carbon Nanofi...IJERA Editor
The electrochemical behavior of carbon paste electrode modified with carbon nanofibers has been studied using cyclic voltammetry (CV), electrochemical impedance spectroscopy (EIS) and scaning electron microscopy. The response of modified electrodein ferroferricyanidesolutionshows reversible behavior and significant increment in current value compared to the bare CPE indicating that CNFs act as efficient electron mediator to catalyze reactions at the surface. The modified electrode has been used to study the electrochemical response of bisphenol Ausing different electrochemical techniques such as cyclic voltammetry, linear sweep voltammetry, differential pulse voltammetry and square wave voltammetry. The oxidation peak of BPA was observed at about 0.53 V in phosphate buffer solution at pH 6.7. The oxidation peak current of BPA varied linearly with concentration over a wide range of 5µmol L-1 to 400 µmol L-1 and the detection limit of this method was found to be 0.55 µmol L
Nutritional and Physicochemical Characteristics of Bread Enriched with Microa...IJERA Editor
The aim of this study was to increase the nutrient content of bread prepared with white flour, using the valuable metabolites included in Spirulina platensis. In this study, conventional breads were added 10% of Spirulina. The nutrient composition, protein and lipid content were evaluated and microbiological and sensory analyses were conducted in the breads with microalgal biomass. The addition of microalgal biomass resulted in protein content increase, ranging from 7.40% to 11.63%. While Calcium, Magnesium and Iron contents of bread with S. platensis were 721.2, 336.6, 41.12ppm, conventional bread contained 261.7ppm Calcium, 196ppm Magnesium, and 8.72ppm Iron. Enrichment with Spirulina had significant influence on the volatile compounds of bread. By using the HS/SPME/GC/MS technique, fourteen volatile compounds were detected in control group and ten compounds were detected in bread with Spirulina. The results for the sensory assessment of bread enriched with Spirulina were considered satisfactory even if some algae flavor in the samples were perceived. Besides, bread with Spirulina stored at room conditions was observed to have a positive effect on the inhibition of mold growth. According to these results, the use of microalgae can enhance nutritional quality of bread without a negative impact on the shelf life of bread
Cognizant is the only company to earn a place in the list of Forbes fastest growing technology companies every year since the list’s inception. Its intriguing growth leaves us inquisitive – is there a framework to excel? Has Cognizant found the same? It is known that the book Built to Last by Jim Collins and Jerry Porras influenced Francisco D’Souza (CEO of Cognizant) the most. He is committed to establish a “cult like” culture focused on core values. But, beyond this, does their dual mandate of run better and run different have any role in their monumental growth? Cognizant is not only preaching about helping their clients to transform in order to run better and run different but also walking the talk by practicing the dual mandate within organization from its early days. This paper digs into Cognizant’s history and current trends to understand what they have done to run better and run different.
The paper outlines a practical “how-to” guidance to strategize and implement more effective mobile enterprise programs and details the robust capabilities that mobile enterprise partners can bring to the development and support of your corporate owned device or BYOD mobile enterprise programs.
Technology organization environment framework in cloud computingTELKOMNIKA JOURNAL
Cloud Computing is a rapidly emerging technology over the last few years, that has
abolished the burden of purchasing heavy hardware and software. Cloud computing
has been advantageous to Small and Medium-sized Enterprises (SMEs), though many
SMEs have not adopted to delve into its appealing benefits. To increase the cloud
adoption rate in these Enterprises, the most important thing is to understand the
aspects which influence the cloud adoption. The article focuses on these factors, which
influence the use of cloud services by establishing the three layer hierarchical framework
based on the grounded on the Technology Oriented Environmental (TOE)
framework through systematic literature review. Because cloud-based solutions offer
numerous benefits for companies, they have precious cloud determinants. This paper
therefore took into account the Technology Organization Environment TOE model for
Cloud Computing adoption. In addition, the questionaries designed at the end also
indicate the significant connection in the decision of adoption between three context
of TOE. Moreover, the designed questionaries has been used for the analysis of cloud
computing adoption in Bangladeshi SMEs.
http://www.hcltech.com/ -
As CIOs and business leaders try to create a modern infrastructure that can support today’s challenging IT environment, they may find themselves taking wrong turns or pursuing approaches that lead to dead ends. Here’s a technology roadmap for 2012 — one that highlights useful landmarks and identifies areas to steer clear of – that you can refer to as you explore today’s challenging IT environment. Read Now.
Internet of Things Index 2017. Excellent Report from IBM and The Economist Intelligence unit about the use of IOT nowadays, it´s main trends, problems and debate contents. Is really IOT going to change all in the next years?
Cloud computing has clearly become a driving force in the information technology world. Over 90% of global enterprises report using cloud as part of their business. With over $33 billion in projected 2015 spend, cloud is now the largest category in IT infrastructure budgets.
But every industry has its unique technology dynamics. Therefore, to understand the future of cloud computing you need to understand its dynamics in key industries.
In this report, we will first present some brief observations on the role of cloud across these verticals. The focus will be on the pace of cloud adoption and its subsequent impact on key sectors within each industry.
In addition, our research showed that manufacturing plays a special role in global development—and so the report will take a deeper dive into that unique sector. In doing so, the report will highlight digital trends that have a broader impact as cloud moves from the digital to the “cyber-physical”.
Perceived significance of information security governance to predict the info...Irfaan Bahadoor
Abstract
Purpose – Information security is a growing concern in society, across businesses and government. As the offshore IT services market continues to grow providing numerous benefits, there are also perceived risks with respect to the quality of information security delivered in the supply chain. This paper aims to examine, as a case, the perceptions of Indian software services provider (service provider) employees with respect to information security governance and its impact on information security service quality that is delivered to customers.
Design/methodology/approach – The paper provides a framework built upon the existing
dimensions and instruments for total quality management and service quality, suitably modified to reflect the context of information security. SmartPLS, a structural equation modelling technique, has been used to analyse field survey data collected from across various Indian cities and companies.
Findings – Significant finding is that information security governance in an IT outsourcing company providing software services has a highly significant impact on the information security service quality,which can be predicted.The paper also establishes that there is a positive relationship collectively between elements of information security governance and information security service quality.
Research limitations/implications – Since data used in this study were taken solely from the responses of employees of outsourced service companies in India, it does not show if this translates into service improvements as perceived by the customer.
Practical implications – Information security governance should be made an integral part of corporate governance and is an effective strategic technique, if software outsourcing business enterprises want to achieve a competitive edge, provide client satisfaction and create trust.
Originality/value – The paper presents empirical data validation of the connection between information security governance and quality of service.
Printing the Future: From Prototype to ProductionCognizant
Additive manufacturing (AM) such as 3-D printing heralds a new industrial revolution. We offer a framework for analyzing capabilities and implementing AM technologies to help you smoothly move from prototyping to volume production.
IoT and equipment connectivity are vital necessities for original equipment manufacturers, owners, and operators who want to maintain or increase market share.
THE EFFECT OF SERVICE INFLUENCE FACTORS ON PERCEIVED USEFULNESS AND USE SATIS...IAEME Publication
The convergence of advanced technologies such as AI, IoT, and BigData with medical technology also has changed medical services significantly. Particularly digital healthcare services have developed in the untact settings by the COVID-19 pandemic. This study aims to examine factors that affect the usefulness of such digital health care services perceived by users and their use satisfaction. The study defines the ‘personal influence factor, ‘information quality factor,’ and ‘social impact factor’ that affect digital healthcare service use and empirically analyzes the effects of such factors on perceived usefulness and use satisfaction. A survey was conducted among 364 individuals who used digital healthcare services in Korea, and then statistical analysis results were derived. Hence analysis results show that personal influence factors and social impact factors positively affected perceived usefulness while information quality factors did not. In addition, it turned out that personal influence factors and information quality factors had positive effects on use satisfaction while social impact factors did not affect use satisfaction. The above-stated results suggest that when it comes to digital healthcare service, personal influence factors concerning the experience of product or service use affected perceived usefulness and use satisfaction, social impact factors affected perceived usefulness, and information quality factors affected use satisfaction to a significant degree.
Electrochemical behaviorof carbon paste electrode modified with Carbon Nanofi...IJERA Editor
The electrochemical behavior of carbon paste electrode modified with carbon nanofibers has been studied using cyclic voltammetry (CV), electrochemical impedance spectroscopy (EIS) and scaning electron microscopy. The response of modified electrodein ferroferricyanidesolutionshows reversible behavior and significant increment in current value compared to the bare CPE indicating that CNFs act as efficient electron mediator to catalyze reactions at the surface. The modified electrode has been used to study the electrochemical response of bisphenol Ausing different electrochemical techniques such as cyclic voltammetry, linear sweep voltammetry, differential pulse voltammetry and square wave voltammetry. The oxidation peak of BPA was observed at about 0.53 V in phosphate buffer solution at pH 6.7. The oxidation peak current of BPA varied linearly with concentration over a wide range of 5µmol L-1 to 400 µmol L-1 and the detection limit of this method was found to be 0.55 µmol L
Nutritional and Physicochemical Characteristics of Bread Enriched with Microa...IJERA Editor
The aim of this study was to increase the nutrient content of bread prepared with white flour, using the valuable metabolites included in Spirulina platensis. In this study, conventional breads were added 10% of Spirulina. The nutrient composition, protein and lipid content were evaluated and microbiological and sensory analyses were conducted in the breads with microalgal biomass. The addition of microalgal biomass resulted in protein content increase, ranging from 7.40% to 11.63%. While Calcium, Magnesium and Iron contents of bread with S. platensis were 721.2, 336.6, 41.12ppm, conventional bread contained 261.7ppm Calcium, 196ppm Magnesium, and 8.72ppm Iron. Enrichment with Spirulina had significant influence on the volatile compounds of bread. By using the HS/SPME/GC/MS technique, fourteen volatile compounds were detected in control group and ten compounds were detected in bread with Spirulina. The results for the sensory assessment of bread enriched with Spirulina were considered satisfactory even if some algae flavor in the samples were perceived. Besides, bread with Spirulina stored at room conditions was observed to have a positive effect on the inhibition of mold growth. According to these results, the use of microalgae can enhance nutritional quality of bread without a negative impact on the shelf life of bread
Studies on the Paint Forming Properties of Avocado(Persea Americana) and Afri...IJERA Editor
Avocado(Persea Americana) and African Pear (Dacryodes edulis) seed oils were investigated for their suitability as base materials for oil paint production. Soxhlet extraction of the oils from the powdered seeds using n-hexane gave 3.63% and 10.40% yields for Avocado and African Pear respectively. Proximate analysis and chemical characterization of the seed oils were carried out using standard procedures according to the American Oil Chemist Society (AOCS) and the American Society for Testing and Materials (ASTM). The fatty acid compositions of the oils were obtained by Gas Chromatography. It showed that oleic and stearic acids are the most abundant unsaturated and saturated fatty acids respectively in both oils. Marginal differences were observed in the iodine and peroxide values of the oils. Chemical characteristics of the oils gave iodine values of 38.35mqI2/g for Avocado oil and 32.26mqI2/g for African Pear oil, both results suggestive of non-drying oils. Similarly, peroxide values of 45meq/kg and 30meq/kg were obtained for the seed oils respectively. Some chemical properties and performance characteristics of the finished paints were determined. The drying time of the paints indicates poor drying properties. The results obtained showed that Avocado and African Pear seed oils do not have the potential for normal wall paintings but may find use in artists’ paintings.
How ‘Big Data’ Can Create Significant Impact on Enterprises? Part I: Findings...IJERA Editor
Big data is the latest buzz word in the BI domain, and is increasingly gaining traction amongst enterprises. The prospect of gaining highly targeted business and market insight from unmanageable and unstructured data sets is creating huge adoption potential for such solutions. The scope of big data moves beyond conventional enterprise databases to more open environments, covering new sources of information typically relating to various social networking sites, wikis and blogs. Moreover, advancements in communications and M2M technologies are also contributing to the massive availability of big data
‘Communications & Collaboration Technologies’ as Strategic Imperative for Ent...IJERA Editor
With an aim to increase productivity and satisfaction, CIOs across the globe are scaling up their investments in advanced communications & collaboration technologies. The need to communicate with customers and employees irrespective of time and place is further driving the development of disruptive communications & collaboration technologies. The evolution of new and affordable communications & collaboration solutions such as IP PBX and web conferencing has led to a decline in the adoption of traditional audio and video conferencing solutions. Enterprises are opting for flexible solutions that also offer additional features at lower prices compared to traditional conferencing solutions
Service Quality Challenges in an Indian Automobile Service IndustriesIJERA Editor
Market scenario in past decade changes very fast due to computation in a market. Changing a technology and launching new models in market are as per customer demand. Providing service quality is a big task to many organizations. Today automobile service sector faces many problems due to increase of customer expectation from branded company. This study overview the challenges faced by an Indian automobile service sector and find the various gaps which will directly or indirectly affects on service quality and factor which affects the service. The paper concludes with the gaps that affects on current position of four wheeler service industries their market share in automobile service industries
Study on spatial variability of Soils using GISIJERA Editor
Spatial variability of soil properties within or among agricultural fields is inherent in nature due to geologic and pedologic soil forming factors, but some of the variability may be induced by tillage and other management practices due to human activities. Determining such soil variability is important for precise agriculture and management of natural resources. Hence, it is important to study the extent of surface spatial variability for efficient input management and to achieve higher yield. In this regard, the spatial variability study was conducted in Pandit Jawaharlal Nehru College of Agriculture & Research Institute, Karaikal for which 77 geo referenced soil samples were collected from the East farm (A, B, C, D, E and F blocks) and analysed for the soil properties like pH, EC, Organic Carbon, Available Nitrogen (N), Available Phosphorus (P2O5), Available Potassium (K2O) using standard procedures. With the available data the spatial maps of basic soil properties were prepared from which the properties are known in unsampled areas and with this map through linkage, spatial variability maps can be generated for other properties
Similar to Is ‘Enterprise Mobility’ The Way Forward For Enterprises? Part I: Findings and Implications from Longitudinal Analysis and Systematic Review
Welcome to the future of the Internet of Things. IoT Viewpoints 2018 is a collection of Ovum’s newest thought leadership on emerging IoT trends, technologies and opportunities.
IOT in Bangladesh | Enterprise Resource Planning (ERP) Software System | Pridesys IT Ltd, Different Innovation and Excellence | Internet of Things Applications for Analytics
This PPT will expose you to the transformation taking place, throughout the world, in the way that products are being designed and manufactured. The transformation is happening through digital manufacturing and design (DM&D) – a shift from paper-based processes to digital processes in the manufacturing industry.
You will gain an understanding of and appreciation for the role that technology is playing in this transition. The technology we use every day – whether it is communicating with friends and family, purchasing products or streaming entertainment – can benefit design and manufacturing, making companies and workers more competitive, agile and productive. Discover how this new approach to making products makes companies more responsive, and employees more involved and engaged, as new career paths in advanced manufacturing evolve.
This ppt of Digital Manufacturing & Design Technology specialization that explores the many facets of manufacturing’s “Fourth Revolution,” aka Industry 4.0, and features a culminating project involving creation of a roadmap to achieve a self-established DMD-related professional goal.
Webinar with Cesare Garlati
An increasing number of organizations allow their employees to use personal mobile devices to connect to corporate networks and data for work related activities - the so-called 'Bring Your Own Device' phenomenon. However, a recent study conducted by Forrester Consulting reveals that only a few companies measure the actual financial impact of this new IT model and that even fewer understand the financial and business implications of Consumerization of IT.
More:
http://bit.ly/Webinar-BYOD
White Paper IDC | The Business Value of VCE Vblock Systems: Leveraging Conver...Melissa Luongo
The Business Value of VCE Vblock Systems: Leveraging Convergence to Drive Business Agility
In the past decade, information technology (IT) evolved from an enabler of back-office business processes to the very foundation of a modern business. In the increasingly digital and mobile world, the datacenter is often the first and most frequent point of contact with customers. The ability to innovate quickly lies at the heart of today’s changing business models. Businesses expect their IT investments to accelerate their pace of innovation, provide flexibility to meet new demands, and continually reduce the costs of operations.
Converged infrastructure is essential for many companies to ensure that their datacenter infrastructures can meet today’s challenges. The business rationale for deploying converged infrastructure goes far beyond traditional IT feeds and speeds. Customers using converged solutions like VCE’s Vblock Systems (Vblock) realize lower costs, greater levels of utilization, and reduced downtime. VCE customers in this study recognized business benefits such as improved organizational agility, faster application development, increased innovation, and improved employee productivity.
IDC interviewed 16 VCE Vblock Systems customers to understand and quantify the benefits delivered by their Vblock converged infrastructure deployments. Vblock Systems are built by VCE using compute, network, and storage technologies and virtualization software from Cisco, EMC, and VMware.
IDC found that by using Vblock Systems, these organizations recorded improved business outcomes and that these improvements are increasingly driving IT investment decisions.
All VCE customers interviewed for this study generated substantial business value by consolidating their IT infrastructures with Vblock. IDC calculates that these VCE customers will generate five-year discounted benefits worth an average of $384,202 per 100 users by using Vblock, which will result in an average return on investment (ROI) of 518% and a payback period of 7.5 months.
How Insurers Can Tame Data to Drive InnovationCognizant
To thrive among entrenched rivals and compete more effectively with digital natives, insurers will need to get their data right. That will mean moving to more responsive, AI-enabled architectures that accelerate data management and deliver insights that drive business performance.
Similar to Is ‘Enterprise Mobility’ The Way Forward For Enterprises? Part I: Findings and Implications from Longitudinal Analysis and Systematic Review (20)
Cosmetic shop management system project report.pdfKamal Acharya
Buying new cosmetic products is difficult. It can even be scary for those who have sensitive skin and are prone to skin trouble. The information needed to alleviate this problem is on the back of each product, but it's thought to interpret those ingredient lists unless you have a background in chemistry.
Instead of buying and hoping for the best, we can use data science to help us predict which products may be good fits for us. It includes various function programs to do the above mentioned tasks.
Data file handling has been effectively used in the program.
The automated cosmetic shop management system should deal with the automation of general workflow and administration process of the shop. The main processes of the system focus on customer's request where the system is able to search the most appropriate products and deliver it to the customers. It should help the employees to quickly identify the list of cosmetic product that have reached the minimum quantity and also keep a track of expired date for each cosmetic product. It should help the employees to find the rack number in which the product is placed.It is also Faster and more efficient way.
Saudi Arabia stands as a titan in the global energy landscape, renowned for its abundant oil and gas resources. It's the largest exporter of petroleum and holds some of the world's most significant reserves. Let's delve into the top 10 oil and gas projects shaping Saudi Arabia's energy future in 2024.
We have compiled the most important slides from each speaker's presentation. This year’s compilation, available for free, captures the key insights and contributions shared during the DfMAy 2024 conference.
Using recycled concrete aggregates (RCA) for pavements is crucial to achieving sustainability. Implementing RCA for new pavement can minimize carbon footprint, conserve natural resources, reduce harmful emissions, and lower life cycle costs. Compared to natural aggregate (NA), RCA pavement has fewer comprehensive studies and sustainability assessments.
HEAP SORT ILLUSTRATED WITH HEAPIFY, BUILD HEAP FOR DYNAMIC ARRAYS.
Heap sort is a comparison-based sorting technique based on Binary Heap data structure. It is similar to the selection sort where we first find the minimum element and place the minimum element at the beginning. Repeat the same process for the remaining elements.
Final project report on grocery store management system..pdfKamal Acharya
In today’s fast-changing business environment, it’s extremely important to be able to respond to client needs in the most effective and timely manner. If your customers wish to see your business online and have instant access to your products or services.
Online Grocery Store is an e-commerce website, which retails various grocery products. This project allows viewing various products available enables registered users to purchase desired products instantly using Paytm, UPI payment processor (Instant Pay) and also can place order by using Cash on Delivery (Pay Later) option. This project provides an easy access to Administrators and Managers to view orders placed using Pay Later and Instant Pay options.
In order to develop an e-commerce website, a number of Technologies must be studied and understood. These include multi-tiered architecture, server and client-side scripting techniques, implementation technologies, programming language (such as PHP, HTML, CSS, JavaScript) and MySQL relational databases. This is a project with the objective to develop a basic website where a consumer is provided with a shopping cart website and also to know about the technologies used to develop such a website.
This document will discuss each of the underlying technologies to create and implement an e- commerce website.
CW RADAR, FMCW RADAR, FMCW ALTIMETER, AND THEIR PARAMETERSveerababupersonal22
It consists of cw radar and fmcw radar ,range measurement,if amplifier and fmcw altimeterThe CW radar operates using continuous wave transmission, while the FMCW radar employs frequency-modulated continuous wave technology. Range measurement is a crucial aspect of radar systems, providing information about the distance to a target. The IF amplifier plays a key role in signal processing, amplifying intermediate frequency signals for further analysis. The FMCW altimeter utilizes frequency-modulated continuous wave technology to accurately measure altitude above a reference point.
CW RADAR, FMCW RADAR, FMCW ALTIMETER, AND THEIR PARAMETERS
Is ‘Enterprise Mobility’ The Way Forward For Enterprises? Part I: Findings and Implications from Longitudinal Analysis and Systematic Review
1. Pradeep Singh. Int. Journal of Engineering Research and Application www.ijera.com
ISSN : 2248-9622, Vol. 6, Issue 12, ( Part -4) December 2016, pp.51-57
www.ijera.com 51 | P a g e
Is ‘Enterprise Mobility’ The Way Forward For Enterprises? Part
I: Findings and Implications from Longitudinal Analysis and
Systematic Review
Pradeep Singh1
, Naveen Pandey2
1
Research Analyst, Current Analysis Group, Global Data Research Center, India
2
Assistant Professor, Department of Decision Sciences, University of Petroleum & Energy Studies, India
ABSTRACT
Attracted by the benefits offered by mobility technologies directly relating to cost savings and improved
productivity, enterprises are keen to adopt BYOD models; however, without proper feasibility studies and
mobility policies in place, BYOD will not be able to generate the desired results. The commercialization of
technology or BYOD is rapidly transforming the enterprise mobility landscape and changing the way that
organizations conduct business. However, the adoption of this concept enables enterprises to devise stringent and
precise mobility policies to avoid any security and privacy issues.
Keywords: Business Value, BYOD, COPE, CYOD, Enterprises, IT Services, MDM, Mobility, SMEs
I. INTRODUCTION
In order to improve productivity and
employee satisfaction, many enterprises have
adopted the BYOD model. Employees are looking to
adopt various mobile devices, primarily smartphones
and tablets, to replace traditional desktops and
laptops and improve their accessibility to enterprise
data, irrespective of the place and time. Moreover,
enterprises are also looking to adopt other variants of
the BYOD model such as Corporate Owned
Personally Enabled (COPE) and Chose Your Own
Device (CYOD) models. Under the CYOD model,
employees can choose from a limited number of
approved platforms or devices, while the COPE
concept provides more flexibility, enabling
employees to use any device; while usage, support
costs and many other areas are controlled by the
organization. Although the BYOD model has
created new opportunities for enterprises to reduce
their hardware purchase costs, while boosting
productivity and operational efficiency, it has also
enhanced the risk of data leakage and created new
challenges for IT departments to manage various
mobile devices and platforms.
As a consequence, CIOs and IT
departments need to be vigilant and make sure that
they do not adopt this model without proper
feasibility studies as it can lead to serious data
security issues and management headaches.
Organizations are required to devise stringent and
focused mobility policies to help leverage the
benefits of BYOD models and reduce the risk of any
security threats and data leakage (Scarpino 2011;
Barnes 2008). The below mentioned Table (1) and
Fig (1) illustrates the number of medium-sized
enterprises responded for ICT survey.
Table 1: Medium-sized enterprises ICT survey data
geographic breakdown
Countries Count
Germany 79
UK 74
US 72
Russia 65
Italy 61
China 59
India 57
Spain 52
Brazil 51
France 44
Canada 44
Australia 42
Others 321
8%
7%
7%
6%
6%
6%
6%
5%5%
4%
4%
4%
32%
Germany
UK
US
Russia
Italy
China
India
Spain
Brazil
France
Canada
Australia
Others
1021 respondents
Fig.1. Medium-sized enterprises' ICT survey data
geographic breakdown
RESEARCH ARTICLE OPEN ACCESS
2. Pradeep Singh. Int. Journal of Engineering Research and Application www.ijera.com
ISSN : 2248-9622, Vol. 6, Issue 12, ( Part -4) December 2016, pp.51-57
www.ijera.com 52 | P a g e
ENTERPRISES TAKEOUTS
Enterprises: the adoption of mobile
device/application management solutions and
regular upgrades to mobile operating systems.
IT departments: need to provide separate keys and
increased containerization.
Employees: need to understand the pros and cons of
BYOD policies and behave accordingly.
The below mentioned Fig (2) shows the
overall ICT budget change pattern (flat, growth or
shrink) from FY 2013-14 to FY 2014-15.
7%
17%
38%
34%
5%
5%
11%
29%
38%
17%
0% 10% 20% 30% 40%
Decrease 6%
or more
Decrease
slightly (1%-
5%)
Flat (0%)
Increase
slightly (1%-
5%)
Increase
significantly
(6%+)
2014-15 (%) 2013-14 (%)
1021 respondents% of respondents
Fig.2. ICT budget change (growth or shrink) from
2013-14 to 2014-15
II. SUPPORTING ARGUMENTS AND
EMPIRICAL EVIDENCES
1.1 DUAL-PERSONA SOLUTIONS HELP
REALIZE BYOD BENEFITS
IT teams are continuously struggling to find
the ideal way to offer secure access to employees
while protecting corporate data and maintaining
employee privacy. Previously, one of the solutions
to the problem was to deploy full device
management and security protection to employee-
owned devices. However, mobile device
management (MDM) mechanisms turned out to be
burdensome for the IT team as well as unsatisfactory
for employees. Following this, the approach of
containerization emerged as a complement to
existing MDM solutions to manage corporate-owned
devices. This solution allows the IT team to
authorize which employees may have access to
business data. Subsequently, a third solution has
emerged, which allows employees to separate
personal and work applications on their device
through dual-persona solutions. These solutions
provide more power, choice and convenience to
employees while protecting corporate resources
(Basole 2008).
1.2 ENTERPRISES MUST ADDRESS
CHALLENGES UNDERLYING THE BYOD
AND BYOIOT TRENDS
Despite the obvious advantages, the
concerns that businesses face with BYOD and bring
your own internet of things (BYOIOT) are that of
privacy and security, along with an issue relating to
oversight. For firms that permit BYOD programs,
devices are considered the responsibility of both the
employee and the IT department. However, if nearly
every device is installed with a computerized sensor,
it creates a burden for the IT personnel, which will
in turn increase costs as a result of hiring new IT
employees. Enterprises, however, can address some
of these security concerns by assigning a unique IP
address and channel access to the network through
certain nodes, which will enable IT departments to
match those addresses that have been approved. This
way, the approval process for IP addresses can be
quick, whilst being adaptable enough to change
when required (Sørensen 2012).
1.3 SMALL AND MEDIUM-SIZED
BUSINESSES CAN HAVE A HASSLE-
FREE BYOD EXPERIENCE
With BYOD becoming a growing reality,
small and medium-sized businesses need to be swift
in embracing it; however they should first design
BYOD policies, which must be precisely written and
explained to employees. In addition, business
managers need to ensure that the essential tools are
available on as many platforms as possible so that
staff can access relevant information (Bellavista, ac,
lf 2009). Furthermore, beyond setting up email
services, small and medium-sized businesses can
take two approaches to deliver individual apps: they
can use specific native apps designed for the device;
and resources can be accessed through a browser-
based interface.
1.4 HELP-DESK TECHNICIANS MUST BE
PREPARED FOR THE BYOD CULTURE
With the adoption of BYOD removing
restrictions on using applications and hardware
devices, help-desk technicians are being impacted in
several ways. First, BYOD can cause new IT issues
such as bandwidth hogging, aside from the
inaccessibility of shared devices and network
connectivity, which will result in a surge in ticket
count. Therefore, it is essential to ensure that there
are enough help desk technicians to handle
increasing numbers of tickets. Secondly, due to
BYOD, help desk technicians will have to deal with
several applications or hardware, many of which
they may not be familiar with. Therefore,
technicians will have to improve their skill sets.
Thirdly, help-desk technicians should learn to draw
the line when devices are used for personal
3. Pradeep Singh. Int. Journal of Engineering Research and Application www.ijera.com
ISSN : 2248-9622, Vol. 6, Issue 12, ( Part -4) December 2016, pp.51-57
www.ijera.com 53 | P a g e
purposes. It is essential for enterprises to prepare
their help desk engineers and technicians for the
BYOD revolution (Scornavacca 2008).
The below mentioned Table (2) and Fig (3)
illustrates the number of medium-sized enterprises
responded for ICT survey across the industry
verticals. The respondent size for manufacturing
counts for 101, similarly respondent size for
healthcare counts for 87.
Table 2: Medium-sized enterprises‘ ICT survey data
industry breakdown
Industry Count
Manufacturing 101
Telco/service provider 93
Energy 90
Healthcare 87
Government 84
Financial markets 81
Retail 75
Insurance 72
Retail banking 71
Utilities 70
Pharmaceuticals 67
Education 64
Media 56
10%
9%
9%
9%
8%
8%
7%
7%
7%
7%
7%
6%
6%
Manufacturing
Telco/service
provider
Energy
Healthcare
Government
Financial markets
Retail
Insurance
Retail banking
Utilities
Pharmaceuticals
Education
Media
1021 respondents
Fig.3. Medium-sized enterprises' ICT survey data
industry breakdown
III. KEY ACTIONS BEFORE THE
ADOPTION OF BYOD MODEL
1.0 ENTERPRISES SHOULD CAUTIOUSLY
EMBRACE BYOD
In the wake of the surging BYOD trend,
firms need to follow certain tips to benefit the most
from their MDM initiatives.
Firstly, with employees using cloud storage
applications such as Dropbox, firms face a bigger
threat of data leaks. To ensure that personal and
corporate data are not mixed and shared, businesses
can use mobile device management solutions. These
can restrict access when employees are connected to
corporate networks, but allow them only for personal
use.
Secondly, as BYOD and mobile device
management are widely accepted in some countries
and not in others, companies need to embrace
different mobile device and BYOD polices for
different markets.
Thirdly, one way to keep mobile devices
secure is to ensure that they are updated with the
latest version of the iOS or Android operating
system along with the required security bug fixes.
However, as companies cannot force employees to
spend money on upgrading their mobile devices, the
former ought to have an approved list of devices for
corporate network access as part of their BYOD
policies.
The below mentioned Fig (4) illustrates the
adoption trends of the enterprise mobility
technologies (Device management, Employee/
supplier facing app dev, Customer facing mobile
apps, Tablet computing) among medium-sized
enterprises in FY 2014. The fig also shows next two
year adoption pattern of these technologies
respectively.
75%
63%
61% 56%
65%
58%
61%
62%
0%
10%
20%
30%
40%
50%
60%
70%
80%
%ofrespondents
Have now(%) Considering investment innext 2 years (%)
1021 respondents
Fig.4. Enterprise mobility technologies adoption
trends among medium-sized enterprises in FY 2014.
2.0 WAYS FOR THE IT DEPARTMENT TO
DEAL WITH THE BYOD CHANGE
With the BYOD trend in the workplace
here to stay, IT departments need to refine their
procedures to adjust to the changes that come with it.
Earlier, IT was focused on physical devices,
especially PCs; however, the prevalence of BYOD
has made things challenging for IT departments as
they have to deal with several devices and platforms.
With people frequently changing their tablets and
smartphones, it had become difficult for IT
departments to keep a track of what types of devices
have been coming in and out of the offices.
However, following several refinements to
existing tools and the emergence of new products
and ideas – including the concept of segregating
work and personal ―containers‖ — things seem to be
looking better. Moreover, by having separate ―keys‖
for different kinds of data and access, and then
handing out those keys to the appropriate people, IT
4. Pradeep Singh. Int. Journal of Engineering Research and Application www.ijera.com
ISSN : 2248-9622, Vol. 6, Issue 12, ( Part -4) December 2016, pp.51-57
www.ijera.com 54 | P a g e
departments can focus on the aspects they
specifically need to manage, whilst providing
freedom to employees to use the devices of their
choice (Basole 2007).
IV. RELATED WORKS
The most distinguish areas where mobility
model can be helpful for start-ups:
Due to limited budgets, small and start-up
firms face the hurdle of eliminating waste and
finding ways to experiment and expand. However,
companies will be able to make use of their limited
resources with mobility technologies. With this
added efficiency, businesses can increase their
capital and revenues easily. There are two important
areas where mobility technologies can particularly
be implemented.
First, tracking customers and potential
customers is very difficult for small businesses.
They might invest more or less than required, both
of which are not ideal for a fledgling business. This
is where mobility come into use - it helps in gauging
how much should be invested in marketing and
where that money should be spent.
Second, mobility helps enterprises improve
performance of their either already superior
employees or improve the efficiency of a struggling
workforce. Mobility technologies have proven that it
is effective in motivating and improving employees‘
performance in various sectors. As a result, it
enables companies to save time and money in hiring
and training new employees.
V. RECOMMENDATIONS FOR
ENTERPRISES TO HARNESS BYOD
TREND
“BYOD’S SUCCESS DEPENDS ON A PRE-PLANNED
COMPROMISE STRUCK BETWEEN EMPLOYEES AND
EMPLOYERS.”
Although organizations can benefit hugely
from BYOD, both employers and employees should
be wary about the pitfalls. Businesses embracing
BYOD should have BYOD policies that are clear
and easy to understand which everyone is aware of.
On the employees‘ front, they need to
consider whether BYOD is the right option for them
or not, as their moves will be tracked constantly due
to the safety measures taken by the company.
Furthermore, they lose control over devices and
won‘t be able to install the apps and games of their
choice. In addition, there is every chance of their
personal data being remotely wiped out if they lose
their device. Moreover, it is also possible that their
sensitive information might be scrutinized if the
device is taken for legal examination in case of
corporate litigation [7].
Therefore, it is vital that employees clearly
understand BYOD and know exactly what they are
getting into. In order for BYOD to work, there has to
be a pre-planned compromise between employers
and employees.
The below mentioned Table (3) and Fig (4)
reveals medium-sized enterprises‘ overall ICT
budget allocation in the FY 2014 and FY 2015 (how
did enterprises spend their overall ICT budget in FY
2014? How will this change in 2015?) . The survey
result shows that medium-sized enterprises allocated
26% and 22% of their overall ICT budget to
hardware and software respectively in FY 2014,
whereas medium-sized enterprises allocated 27% of
their overall ICT budget to hardware segment in FY
2015, while the allocation for software segment
remains the same in FY 2015.
Table 3: Medium-sized enterprises‘ (external) ICT
budget allocation, 2014 and 2015
Category 2014 2015
Hardware 26% 27%
Software 22% 22%
Services 17% 16%
Communications 15% 15%
Consulting 12% 12%
Other 8% 8%
26% 27%
22% 22%
17% 16%
15% 15%
12% 12%
8% 8%
0%
20%
40%
60%
80%
100%
2014 2015
OverallICTbudget(%)
Hardware Software Services Communications Consulting Other
1021respondents
Fig.4. Medium-sized enterprises‘ ICT budget change
from 2014 to 2015
VI. ISSUES AND CHALLENGES
1.0 ORGANIZATIONS NEED TO OVERCOME
THE SECURITY CHALLENGES OF
MOBILITY
―It is expected that enterprises will be
significantly shifting their focus from web to mobile
and leveraging apps to increase revenue and
productivity.‖
According to a survey, 77% of executives
at organizations rank mobility highly. Therefore,
firms thinking of embracing mobility must change
their fundamental business processes.
To stay in touch with this evolution, traditional
boundaries of ERP systems must be eliminated.
Only then can enterprises gather insight and
information, and perform analytics and
5. Pradeep Singh. Int. Journal of Engineering Research and Application www.ijera.com
ISSN : 2248-9622, Vol. 6, Issue 12, ( Part -4) December 2016, pp.51-57
www.ijera.com 55 | P a g e
intelligence across different parts of the
enterprise.
Enterprises can tap new ERP solutions to work
along a new value-based dimension, which is
collective of content, context, data and
analytics.
Furthermore, in order to be competitive, mobile
apps must be able to respond to user requests
within the shortest time. The apps will therefore,
be judged on their uptime and responsiveness
[8-10].
The below mentioned Table (4) and Fig (5)
illustrates various factors influencing medium-sized
enterprises‘ decision to choose an IT provider in FY
2014. Various factors such as geographical reach,
contract flexibility, financing options payment
terms, expertise in industry and many others have
been rated by respondents on a scale of one to four
and shown below.
Table 4: Factors influencing Medium-sized
enterprises' decision to choose an IT provider
Factors Average rating
(On a scale of
one to four)
Geographical reach 2.7
Financing
options/payment terms
2.7
Contract flexibility 2.8
Breadth of solution
offerings
3.0
Price 3.0
Financial stability 3.0
Expertise in your industry 3.0
Specific functionality
expertise/depth
3.0
Leading-edge technology 3.1
2.7
2.7
2.8
3.0
3.0
3.0
3.0
3.0
3.1
1.0 1.5 2.0 2.5 3.0 3.5
Geographical reach
Financing options/payment
terms
Contract flexibility
Breadth of solution offerings
Price
Financial stability
Expertise in your industry
Specific functionality
expertise/depth
Leading-edge technology
(1 = not an objective, 4 = top priority) 1021 respondents
Average rating
Fig.5. Factors influencing Medium-sized enterprises'
decision to chose an IT provider
2.0 IMPORTANT THINGS SMALL AND
MEDIUM-SIZED BUSINESSES SHOULD
KNOW ABOUT BYOD
―Small and medium-sized businesses either
contemplating or having just implemented BYOD
policies should keep in mind a few things relating to
BYOD policies, employee satisfaction, and
security.‖
Many large corporations are keen to adopt
the BYOD model as part of their operations, but the
most significant growth is being seen among small
and medium-sized businesses.
BYOD policies differ based on the business
goals, available resources and IT department;
therefore, small and medium-sized enterprises
need to understand that what works for one
organization may not work for the other.
Given the security concerns that come with
BYOD, businesses that are aware of the
potential issues with this model, will be in better
position to deal with them [11, 12].
3.0 THE HIDDEN COSTS OF THE BYOD
PROGRAM
―Though the concept of BYOD is
considered to increase employee productivity and
reduce IT costs, there are concerns that it does not
offer the savings the hype suggests.‖
Employees purchase their devices and bear
the costs of upgrading them over time. Ideally in
such a scenario, organizations are expected to
achieve cost savings as these expenses are paid by
employees. However, the monthly service payment
borne by companies can exceed an employee‘s
expenditure for the device, thereby making it one of
the largest hidden costs [13].
1. BYOD makes it difficult for companies to
manage the mobile device fleet and this might
result in either one of two scenarios:
a. The company could decide to purchase a high-
end mobile device management (MDM) suite
that can control their devices and protect their
system.
b. The company can miss out on the heightened
device management solution and put itself at an
increased risk of attack
2. Mid-size businesses can take advantage of
BYOD as they are large enough to require a
company-wide mobility solution and yet small
enough to benefit from the flexibility that the
concept offers.
3. When opting for the program, IT managers need
to have an appropriate outlook and ensure that
the program is measured on its merits rather
than on inflated promises [14, 15].
6. Pradeep Singh. Int. Journal of Engineering Research and Application www.ijera.com
ISSN : 2248-9622, Vol. 6, Issue 12, ( Part -4) December 2016, pp.51-57
www.ijera.com 56 | P a g e
4.0 MOST COMMON MISTAKES IN
DESIGNING A BYOD STRATEGY
―BYOD offers several benefits to
businesses if it is correctly implemented. However,
there are several firms whose enterprise mobility
strategies are not protective or conducive to boost
productivity.‖
While developing a BYOD strategy,
companies need to be flexible, and should not be
completely inclined towards the IT department
overlooking the perspective of employees. While
developing a BYOD strategy, companies ought to
avoid making these three mistakes [16].
1. BYOD policy should never be based on existing
strategies. The idea of building a BYOD
strategy is that it should enable firms to improve
their processes.
2. BYOD policy is usually tilted to one side, but
ideally enterprise mobility programs must create
equilibrium between employees and IT
departments.
3. The most common mistake is that firms usually
opt for a ‗one-size-fits-all‘ BYOD strategy.
However, every firm has its own unique needs,
and BYOD strategy can be successful only if it
can connect the organization‘s goals with
employee productivity.
VII. CONCLUSIONS AND FUTURE
RESEARCH
“Enterprise mobility is the way forward for
enterprises.”
In summary, the proposed paper analyzes
the development related to enterprise mobility
technologies and adoption of enterprise mobility
technologies in large, small and medium-sized
enterprises. The paper represents a holistic view
about the benefits and challenges associated in direct
and cross-platform application of enterprise mobility
technologies across all sizes of enterprises.
However, in future it is expected that more attention
would be made towards developing cross-platform
interoperability of enterprise mobility technologies
in such a manner that it facilitate enterprises to gain
maximum leverage of enterprise mobility
technologies in their business operations.
REFERENCES
[1] J. Scarpino, An analysis of an enterprise
mobility software company – managing
software quality and maintaining a
competitive edge in fluctuating periods of
corporate growth: a case study, Issues in
Information Systems, XII (1), 2011, pp. 7-15.
[2] S. J. Barnes, Enterprise mobility: concept and
examples, International Journal of Mobile
Communications, Vol. 1(4), 2008. Big C
[3] Basole, Rahul C., Enterprise mobility:
Researching a new paradigm, Information
Knowledge Systems Management, Vol. 7
(1,2), 2008, pp. 1-7.
[4] Sørensen, C.: Enterprise Mobility. To appear
as Chapter 60 in The Computing Handbook
Set – Information Systems and Information
Technology, ed. H. Topi, Vol. 2, 2012, CRC
Press.
[5] P. Bellavista, A. Corradi, L. Foschini, IMS-
based presence service with enhanced
scalability and guaranteed QoS for
interdomain enterprise mobility, IEEE
Wireless Communications, Vol. 16 (3), 2009.
[6] Scornavacca, Eusebio, Barnes, Stuart J., The
strategic value of enterprise mobility: Case
study insights, Information Knowledge
Systems Management, Vol. 7(1, 2), 2008, pp.
227-241.
[7] Basole, Rahul, Strategic Planning for
Enterprise Mobility: A Readiness-Centric
Approach, Proceedings of Americas
Conference on Information Systems AMCIS,
2007, Paper491.
[8] Help desks critical to BYOD efforts, Website:
http://www.networkworld.com/article/218496
5/tech-primers/help-desks-critical-to-byod-
efforts.html
[9] The BYOD Revolution, Website:
http://nexusit.ca/2015/the-byod-revolution/
[10] Bring Your Own Device, Website:
https://www.whitehouse.gov/digitalgov/bring-
your-own-device
[11] ITIL® 2015 and Beyond: Six Trends Driving
the Increased Importance of the Service Desk,
Website:
http://www.optimalconnections.com/downloa
ds/WP_PM_ITIL_final.pdf
[12] From Work PCs to BYOD: The Evolving Job
of the Desktop Support Professional, Website:
https://www.roberthalf.com/technology/blog/f
rom-work-pcs-to-byod-the-evolving-job-of-
the-desktop-support-professional
[13] Secure Mobile Browsing & Custom Apps
Highlight Q1 2014 Mobility Index Report
Findings, Website:
https://community.good.com/community/blog
s/blog/2014/05/14/secure-mobile-browsing-
custom-apps-highlight-q1-2014-mobility-
index-report-findings
[14] So you think you are BYOD-ready? Think
again!, Websites:
https://community.good.com/community/blog
s/blog/2014/05/01/so-you-think-you-are-
byod-ready-think-again
[15] Advancing Growth in New and Emerging
Markets through IT, Website:
https://technet.microsoft.com/en-us/dn760894
7. Pradeep Singh. Int. Journal of Engineering Research and Application www.ijera.com
ISSN : 2248-9622, Vol. 6, Issue 12, ( Part -4) December 2016, pp.51-57
www.ijera.com 57 | P a g e
[16] Helping to COPE with Enterprise Mobility,
Website:
http://www.digitalistmag.com/technologies/m
obile-applications/2012/02/14/helping-to-
cope-with-enterprise-mobility-094
ABOUT THE AUTHORS
Pradeep Narayan Singh is an illustrator and author,
started his career writing
for white papers,
conference papers, and
research reports. At present
he is working as ―Research
Analyst‖ at Current
Analysis Group, Global
Data Research Center,
Hyderabad, India. He has
written about latest
technological advancement in data center, to
upcoming technologies in Telecom and IT. He has
experience in Research and Analysis (Qualitative
and Quantitative) for Telecom and IT industry. This
is where; he proposes strong acumen towards the
technology and related aspects and continuously
looks forward to the changing technology and
business aspects. He has completed B.Tech in
Computer Science & Engineering from G.B.
Technical University, India and MBA in
Management Information Systems from University
of Petroleum & Energy Studies, India.
Naveen Chandra Pandey is an ―Assistant
Professor‖ at the
Department of Decision
Sciences, University of
Petroleum & Energy
Studies, India. He has
extensive experience in
industry as well as in
academics; his research
areas include Project
Management, IT
Applications and Management Information Systems.
He has completed B.Tech in Mechanical
Engineering, from Kamala Nehru Institute of
Technology, Sultanpur, India and MBA in
Information Systems Management, from University
of Petroleum & Energy Studies, India. At present he
is pursuing Ph.D, from University of Petroleum &
Energy Studies, India.