wireless network

October 23, 2013

NETWORKING

Honesty is the Best BYOD Policy

Does BYOD really mean that my device will become the company’s device? Do I control my private data or does my employer? How can I make sure I maintain a work-life balance when my personal device is also my work device? Will my company support any device I choose? Some of these questions might seem…

October 21, 2013

NETWORKING

Mobile Devices Will Transform Your Business IT

There’s no question that more people around the world are connecting to wireless networks at home, work and play via mobile devices, such as smartphones and tablets. This rise in mobile device usage begs the question: How soon will it be (if not already) before these mobile devices dominate the mobi…

October 17, 2013

NETWORKING

Beyond Today’s Productivity and Efficiency: Enterprise Mobility Enables Long-Term Growth

One of the basic tenants of enterprise mobility is its direct influence on “now”. When organizations implement mobile policies like BYOD and virtualized desktops, day-to-day operations can immediately improve. In most cases, the rate of return on seeing change is direct. However, the impact of enter…

October 10, 2013

NETWORKING

As Mobile Social Usage and Constant Connectivity Increases, Security A Top Concern

Survey results from an IDC study recently revealed that people are relying more and more on their smart mobile device as their primary tool for communication and connecting. The study, sponsored by Facebook, highlights some compelling insights about mobility including: Half of the total US populati…

September 19, 2013

NETWORKING

The Sixth Step to Enterprise Mobility: Power to Your People

This is the sixth post in a blog series featuring Vine-format videos focusing on the “Six Essential Steps for Unleashing the Power of Enterprise Mobility”. The first blog post discussing how to build a mobile structure can be found here. The second blog post highlighting the benefits going virtual c…

September 11, 2013

NETWORKING

The Fifth Step to Enterprise Mobility: Defending Your Data

This is the fifth post in a blog series featuring Vine-format videos focusing on the “Six Essential Steps for Unleashing the Power of Enterprise Mobility”. The first blog post discussing how to build a mobile structure can be found here. The second blog post highlighting the benefits going virtual c…

September 4, 2013

NETWORKING

The Fourth Step to Enterprise Mobility: Create an App Checkpoint

This is the fourth post in a blog series featuring Vine-format videos focusing on the “Six Essential Steps for Unleashing the Power of Enterprise Mobility”. The first blog post discussing how to build a mobile structure can be found here. The second blog post highlighting the benefits going virtual…

August 22, 2013

NETWORKING

Third Step to Enterprise Mobility: The Division of Devices

This is the third post in a blog series featuring Vine-format videos focusing on the “Six Essential Steps for Unleashing the Power of Enterprise Mobility”. Be sure to read the first two blogs and watch the videos – First Step to Enterprise Mobility: Build the Mobile Structure and  Second Step to Ent…

August 14, 2013

NETWORKING

Second Step to Enterprise Mobility: Go Virtual

This is the second post in our “Six Essential Steps for Unleashing the Power of Enterprise Mobility” blog series featuring Vine-format videos. To read the first blog and watch the video describing how enterprises can build a mobile structure, click here. I’m excited to discuss the second step enter…