With Apple's recently released iPhones, the world is revving up for its first broad taste of eSIMs, or “virtual SIMs.” While an iPhone isn’t the first consumer device to utilize eSIM technology (Google already beat them to the punch with the Pixel 2), the sheer number of iPhone users that will be taking on an eSIM device legitimizes it as the next technology toward which the masses must scramble.
There are a million reasons and ways to join the fold and create an IoT solution or service. Maybe it’s just “what’s next” for your industry. Maybe it’s been in the works for years but hasn’t taken off for any number of reasons. Whatever it may be, if you’re planning an IoT deployment, you’d better be doing so with consideration of how to manage your newly created “thing.”
Today smartphones and tablets play an integral role in the work life of an employee. A survey by Samsung and GfK Public Communications and Social Science of mobile workers found if employees had to choose just one computing device, the largest number picked their smartphones. The survey included 1,205 workers from professionals to healthcare workers. 93% of those surveyed used a smartphone for work every day. Those surveyed spent 33% of their day using their mobile devices at work.
Mobile Threat Defense (MTD) has been on the rise for a few years, but it is just now finding a foothold as a legitimate must-have among organizations who have been in “watch and see” mode.
Alright, I better start this out by saying I’m not really a contrarian when it comes to automation and data synchronization across multiple platforms. Of course I’m not. But today in Philly at the ETMA Connected Revolution conference, I sat on a panel with a few esteemed colleagues, and that’s the position I took, because sometimes it’s important to step back and look at it from a more common sense approach.
When considering changes to the mobile environment, most enterprises only consider top-line financial costs in the decision making process; support costs are often misunderstood or overlooked. This post serves to highlight key trends in the mobile management industry while exploring cost considerations and implications of each.
How to handle and manage mobile devices in-this-day-and-age is a question that all companies are asking themselves OR should be asking themselves whether you are a small, medium or large organization. In this blog, I will be covering the Options Available for Device Management.
After four years in the making, the European Union’s General Data Protection Regulation (GDPR) received its legislative approval. The regulation will be going into effect on May 25, 2018, and provides a new set of rules to govern the processing of personal data, replacing the 1995 EU Data Protection Directive (“Directive”). GDPR is the law.
The Internet of Things (IoT) has become the new frontier of business, and concurrently, is the new frontier of threats. In this four-part series, I’m covering various angles of IoT Security. Whether you’re on the purchasing, sourcing, and finance side, handle IT security and risk management, or you are project-or product-managing an IoT deployment, security is a major piece of the puzzle. Start from the beginning of the series, and subscribe to our blog to be notified when part four drops.
The Internet of Things (IoT) has become the new frontier of business, and concurrently, is the new frontier of threats. In this four-part series, I’m covering various angles of IoT Security. Whether you’re on the purchasing, sourcing, and finance side, handle IT security and risk management, or you are project- or product-managing an IoT deployment, security is a major piece of the puzzle. Start from the beginning of the series here and subscribe to our blog to be notified when part four drops.