1 / 11

TOP TECHNOLOGY TRENDS

TOP TECHNOLOGY TRENDS. Bring Your Own Device Tablets and Mobile Computing Cloud Computing Mobile Apps Social Networks . RFID and NFC Big Data and BI Tools Security IT Governance Green Computing. 2012. TOP TECHNOLOGY TRENDS. Bring Your Own Device. TOP TECHNOLOGY TRENDS.

duy
Download Presentation

TOP TECHNOLOGY TRENDS

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. TOP TECHNOLOGY TRENDS Bring Your Own Device Tablets and Mobile Computing Cloud Computing Mobile Apps Social Networks RFID and NFC Big Data and BI Tools Security IT Governance Green Computing 2012

  2. TOP TECHNOLOGY TRENDS Bring Your Own Device

  3. TOP TECHNOLOGY TRENDS Bring Your Own Device

  4. TOP TECHNOLOGY TRENDS Bring Your Own Device

  5. TOP TECHNOLOGY TRENDS Bring Your Own Device What is it? Traditionally IT was a service provided by the business Increasingly employees, customers, contractors and others want to interact with the business using their own devices Companies have found that BYOD environments may increase employee satisfaction Why is it Important? Business are responsible for information entrusted to them Responsible for protecting assets and intellectual property Extending and maintaining protection and security over non-owned technology devices presents new and challenging issues Such access may violate legislative and regulatory requirements or contractual obligations

  6. TOP TECHNOLOGY TRENDS Bring Your Own Device (Con’t) Issues and Risks Lack of specific policies, procedures or guidance Employee’s BYOD may store confidential corporate or personal information Employee’s BYOD may not have appropriate security or comply with corporate policy Employees may loan their BYOD and/or let family members use it further exposing confidential information Business may have difficulty enforcing their policy on non-owned devices Business may not know exactly who they are provisioning or on-boarding Inability to control non-business use of BYODs Challenges in ensuring effective back-up of information stored on BYODs Employees or contractors my subscribe to commercial backup services and inadvertently violate laws and agreements Companies have found that

  7. TOP TECHNOLOGY TRENDS Tablets and Mobile Computing What is it? The adoption of mobile computing/communications devices as an integral part of the corporate’s technology infrastructure Designing corporate processes and system to take the most advantage and achieve a competitive advantage Attempting to use tablets and mobile computing as disruptive technologies Why is it Important? Mobile computing provides significant benefits to the business; availability, immediate access to entity information anywhere and access to technology rich tools and processes The mobile devices and perhaps more importantly, their various uses introduce new risks in terms of security, privacy, loss and theft; all of which may involve personal information, corporate intellectual capital or customer sensitive information.

  8. TOP TECHNOLOGY TRENDS Tablets and Mobile Computing (con’t) Issues and Risks Protection of corporate information on lost or stolen devices Secure integration of mobile devices with existing infrastructure (Controlling access points, data leakage, downloading unsafe apps, etc) Growth in mobile devices requires considerations around device management, mobile platform development and mobile data management capabilities The universality of the Windows-based PC as a business platform will lessen as users increasingly opt for more portable tablets and smart phones. A company’s investment in new or replacement technology will need to accommodate and sustain the new technology The cost to revamp or replace existing business processes and applications to interface with mobile technology can be significant

  9. TOP TECHNOLOGY TRENDS Tablets and Mobile Computing (con’t) Issues and Risks Business competitors can exploit mobile technology marketing and customer relationship opportunities quickly, even providing businesses with the software “apps” The volume and speed of change in mobile technology makes keeping pace difficult and costly. Investment in the “wrong” technology or failing to invest in the “right” technology can contribute to excessive cost write offs or loss of market share The ability to develop user interfaces to accommodate the different operating systems, screen sizes and application functionality to handle inputs and outputs for the target devices and to manage the customer experience requires business and technical skills that may not currently be available to the organization

  10. TOP TECHNOLOGY TRENDS Tablets and Mobile Computing (con’t) Issues and Risks Mobile devices are, by their very nature, easily lost or stolen or can be used by a perpetrator to masquerade as a valid user. There is an increased need to authenticate the mobile user to verify the devices and their identity and credentials Business competitors can exploit mobile technology marketing and customer relationship opportunities quickly, even providing businesses with the software “apps” Existing infrastructure and network bandwidth may not be sufficient to accommodate the increased volume and volatility of users and transactions mobile computing functionality

  11. TOP TECHNOLOGY TRENDS Tablets and Mobile Computing (con’t) Issues and Risks The relationships and cost sharing in the mobile space among the key participants is not clear. Device manufacturers, network providers, app developers and payment processors all play a part in the value proposition that needs to be clarified to enable the customer to understand the costs of the service The integrity, functionality, performance or security of the apps that are downloaded to the mobile devices is not easily verifiable Corporate policies that were developed and implemented in prior years may not be adequate to deal with the issues of mobile computing Protect against malicious codes or naively downloading apps that give away sensitive data to a malicious user

More Related