Subscribe / Unsubscribe Enewsletters | Login | Register

Pencil Banner

Guest View: Thriving in a BYOD world: Three steps to enterprise mobility

Bruce Dahlgren, Senior Vice President and General Manager, Enterprise Services Asia Pacific and Japan, HP | March 12, 2014
In a connected world, organizations are finding they no longer fully control the technology stack used by their employees, customers and suppliers. And that raises multiple challenges which must be addressed.

Step 3 - Establish the architecture

Organizational decisions taken in Step 2 will influence the shape of the architecture needed to support enterprise-class mobile applications. Priorities include:

Security - The architecture should have mobile device end point security built into the device via end point network intrusion protection, virus scan and password policies from the beginning.  This will provide peace of mind to corporate IT and compliance teams.

Mobile application architecture - A major shift from monolithic solutions built around a particular business process to multiple, applications with smaller memory footprints that are designed around the specific use cases.

Visualization and information architecture - User-computer interaction is being transformed by the rich user interfaces delivered by mobile devices. Mobile applications need to adapt new models for visualizing data and use the unique hardware, display and user interaction capabilities to provide context-aware experiences.

Integration architecture - A rethinking of the integration architecture is also required to fully enable enterprise applications for mobility. The new architecture must be scalable and capable of handling thousands of low latency micro-transactions, interface with an array of new technologies and support complex event processing in real-time.

Testing and quality assurance - Business applications should be deployed through an enterprise app store which tests for compatibility across different personal and company-owned devices and at least the five major operating systems and device capabilities -  for example, some devices may only be able to receive and send messages. The store should also support wireless updates for applications, handle remote-wipes and de-registration of devices when they are either lost or compromised.

Enabling a safe journey to enterprise mobility

In today's new mobile world enabled by near-universal connectivity options and a multitude of mobile devices, organizations have an opportunity to do business at any time, from anywhere and through any network. It's a transformation that is radically changing the way organizations interact with customers, employees and partners.

Connectivity is now a necessity for enterprises that recognize it enables faster, more accurate and efficient business operations. But a clear, all-encompassing strategy is needed to address the many challenges. This comprehensive approach will help ensure a smooth journey to true, robust enterprise-class mobility solution.

 


[1]Forrester Research, Inc.: "The Enterprise Mobility Outlook For Asia Pacific In 2014", January 2014

[2] Forrester Research, Inc.: "Info Workers Will Erase The Boundary Between Enterprise And Consumer Technologies", August 2012

[3] Gartner "Bring Your Own Device: The Facts and the Future", April 2013

 

 

Previous Page  1  2  3 

Sign up for Computerworld eNewsletters.