2HP experts like Craig Partridge debunk the myths about rethinking the
mobility phenomenon.
Of all the obstacles standing in the way of building a better IT infrastructure, misinformation may be the most daunting. To help you parate the facts from the hype, the experts from
HP Technology Consulting have created this informative eBook. It’s designed to provide the immedia
te insight you need to make the right decisions about some of the most important
IT issues your enterpri will ever face.
Get the facts about successfully integrating BYOD into your enterpri.
Myth #1:
It’s best to wait on deploying a BYOD initiative until curity issues are worked out.
Insight:
The phenomenon of BYOD is happening—whether your company is actively involved or not. Waiting is not an option. The only choice to be made is how deeply you want to engage your urs. There are two dynamics driving this rapid change:
The consumerization of IT is one. There is an ever-widening gap between the experiences we have with our personal technology—fast, high-quality rvices, often for free—and the slower, more constrained experience of a typical workplace. At home and around town, we have access to free video conferencing, customized shopping, movies on demand, platforms that keep us
in touch with our friends and family, and half a million apps. But at the workplace, we struggle with inflexible legacy applications, long rollout times for new rvices, and sluggish networks.
The other dynamic is the blurring of our personal and professional time. Our devices make
us accessible to friends and colleagues anytime, anywhere. We want the ability to move
easily between the personal and professional, and we want to be able to keep this capability
no matter what device we may be using, from laptop to phone to tablet. At HP, we call this “amless context switching.”
Our consumer IT experience is raising expectations about what we expect of our office IT. If the gap is too great, our end urs have other ways to solve their problem. Can’t nd a large file becau of email restrictions? No problem—just u a consumer drop box. Waiting months for a CRM system? Why bother when you can bypass IT and sign up directly with a cloud rvice?
So if you’re waiting to cure your network before addressing the BYOD phenomenon, chances are you already have leakage.
兄妹本子
各种各样的杯子How should IT respond? Locking down your environment with overly intrusive curity will likely only aggravate your situation. To achieve long-term success, focus on the gap in expectations, and understand what it is your urs are really trying to accomplish. In almost every ca, you’ll find they want quick access to the people important to both their personal and professional lives, as well as the applications and data they need to be productive and make decisions that move their work—and lives—forward. If you can be a trusted resource who delivers solutions, they’ll be more likely to work with you rather than around you.
abb的词语有哪些
Myth #2:
You can manage BYOD with Mobile Device Management.
Insight:
Mobile Devide Management (MDM) is a blunt tool; to gain better ur buy-in, consider platforms that provide finer control.
From a traditional IT perspective, it makes perfect n: a ur accidentally leaves his
古装壁纸phone on the train after a long trip. For curity, you simply u MDM to do a remote wipe. Problem
solved.
But what if it’s a personal device? What if the phone you are about to wipe includes irreplaceable pictures of your ur’s kids? Or of a recent personal trip? Or irreplaceable financial data?
As our personal and professional lives intertwine, so too does the content in our devices. When someone has paid a week’s wages for a new phone, there is an understandable reluctance to submit that device to a draconian IT policy just to get corporate email.
Thankfully, more sophisticated mobile management platforms are now becoming available. MDM can be appropriate for corporately owned or provisioned devices. For finer control, Mobile Application Management (MAM) or Mobile Content Management (MCM) give IT the ability to manage phones at the application or file level—a better respon for different scenarios. And that means better cooperation from your end urs.
3
Our current network is robust enough to handle mobility.
Insight:
Unless you have upgraded recently, your network infrastructure is likely t up for a
different era.
It wasn’t that long ago—just four or five years—when your Wi-Fi network was t up as an
amenity. Perhaps there would be an access point in the conference room or cafeteria, ud by
four or five laptops.
Today’s scenario is exponentially different. Now Wi-Fi access is needed throughout the
corporate landscape. And beyond the laptop, scores of phones and tablets may also be looking
for a slice of the network pie. If your network is of an older vintage, it may not be as responsive
to the weaker Wi-Fi antennas of phones and tablets—creating previously unen dead spots
that frustrate urs.
And content has changed as well. A network that worked fine with normal network traffic five
years ago might choke on today’s high-bandwidth demands. Much of what is traveling over the
network now was rare not so long ago. That includes business apps such as corporate training
videos, video conference calls, VoIP, large design files, and big data, as well as personal apps
like YouTube, Facebook, Skype, and more.
More devices. More bandwidth. Improperly managed, it all adds up to a worning ur
experience. But when handled properly, ur satisfaction soars.
Asssing your network capabilities and needs is the first step to solving this dilemma. One
problem with hardwired legacy networks is they are difficult to manage. Changes must be done
manually. It’s difficult to get a view of the full network, especially in a mixed environment.
Modern networks relieve you of the issues. Creating a virtualized, software-defined network
gives you the ability to make changes in real time, on demand. And new network management
tools give you a complete view of your network, even if it’s a mix of wired and Wi-Fi, while
automating many routine tasks.
Your network is at the heart of your company. When it fails, everything el grinds to a halt. It’s
a dangerous situation. That’s why network asssment should be at the top of your priority list. 4
We may soon need to convert our desktop applications into mobile apps.
又字怎么组词Insight:
Client-rver applications and mobile apps rve entirely different purpos.
Apps vs. Applications? What’s the difference? Should we be retooling desktop programs for mobile u?
Not exactly. The computer you u at your desktop is a different tool than the smaller computer embedded in your mobile device.
Your big computer (your laptop or your workstation, for example) is designed for rious creativity—f四季金银花
or producing content, for processing information. It’s a workhor, and the hours you spend in front of it tend to be dedicated.
转化思想In contrast, you probably spend more time daily in the prence of your phone or tablet.
The difference is that your interactions are typically quick hits, designed to access data that facilitates immediate action. Lengthier ssions with your phone or tablet are likely spent consuming content.
剥豆豆
Good software leverages the strengths of each form factor. Your desktop activity is usually goal-oriented: drafting documents or spreadsheets, designing a product, putting together
a prentation.
5