In a technology world, where change is the only constant, it is hazardous to forecast how technology will play out in 2016. However, the disruptions will be an extension of trends that took off in 2015, albeit with higher adoption rate and stronger reinforcements.
The top 5 technology trends India can expect to see in 2016 are:
Mobile will get bigger and more diverse. And it doesn’t just mean the rising number of smartphone users, but also the host of other reasons behind this growth. Continue reading
Bring Your Own Device movement is booming, with 74 percent of organizations either already using or planning to allow employees to bring their own devices to work.
_ Tech Pro Research’s Survey
From a nascent and undefined entity in 2009 to the fast evolving and maturing business transformation tool of today – BYOD is revolutionizing the way enterprises run their business operations. As the plethora of mobile devices and business application are mounting, BYOD programs are also on the rise. Continue reading
Imagine a world where every aspect of your life is connected. What you do is recorded by a growing number of connected devices you touch, interact and encounter every day. And then the collected data is shared over a network. Our world is becoming a central nervous system running on a network of connected devices.
By 2020, the number of internet-connected devices will reach 50 billion. Mathematically, that’s around 8 connected devices per person. And this indeed creates a simple but a dangerous dilemma. While our ability to collect data will grow via connected devices, there is hardly any adequate security system in place to protect and secure this data. Continue reading
Today, “Mobility” is on the radar of every enterprise. As mobility breaks barriers of traditional concepts of cabins and fixed desks, it is turning out to be the most impactful disruption for business transformation.
Enterprise can enable production, distribution and sales and provide prompt services even when customers are on the move through EMM (Enterprise Mobility Management). The business model emphasizes on collaboration, connection and instant communication. Anyone can access and process any business service form anywhere, anytime on any device. Many C-Level executives are brainstorming with their teams to chart out a clear roadmap for EMM (Enterprise Mobility Management). But here lies the problem:
A staggering 71% of IT leaders see mobility as transformational, yet only 18% of companies have a well-defined mobile strategy.
What is Beacon?
Beacon is a new technology created to enhance location-based services for mobile devices. It was created with an objective to enable your phone to receive signals from Beacons in the close proximity and react accordingly.
Understanding the Beacon technology
A Beacon is like a business lighthouse that emits signals to nearby smartphones and other mobile devices. Mobile users can use this signal as a navigational aid for their shopping experience.
Beacon follows Bluetooth Low-energy specifications which are embedded in most smart devices. It transmits small packet of data to alert the receiver. From business point of view, they can advertise their items to a unique identifier. It’s a proximity-based (how near you are to the Beacon) and not location-based, which is what GPS technology does. (GPS technology is great for finding location but not for proximity.) Moreover, Beacons are cheaper than Bluetooth technology, since it consumes less battery. Continue reading
Mobile security challenges:
The mobile has taken center stage in all aspects of life, but its influence is perhaps most noticeable in the corporate sector where the influx of mobile technologies has brought a sea change in the way enterprises operate. The proliferation of mobile has naturally led to concerns regarding security.
Today, 2 out of 3 employees use their mobiles for work-related activities. More and more companies are adopting BYOD’s at their workplace. Mobiles have become a mine of sensitive corporate information and a probable entry point in the IT. In the event of a mobile getting lost or stolen, there is a high chance of sensitive data falling into the wrong hands. For example, according to OCR, there were 253 breaches affecting more than 500 individuals, and running into a combined loss of over 112 million records in healthcare sector. And in Japan, at least 2.07 million sets of personal data were stolen or feared leaked from 140 organizations in 2015, according to a Kyodo News survey. In automobile sector, Mercedes has filed a lawsuit against Benjamin Hoyle (the company’s former employee) for stealing confidential information before leaving to join a rival company. These are perilous security incidents that corporates and companies cannot overlook.
Why data center managers are facing so much heat?
Digital disruptions like Social Media, Big Data, and proliferation of devices are making direct impact on data centers. And data center managers are facing the heat to make their centralized repository more agile, responsive and intelligent to meet evolving user expectations.
But, the challenge is conventional data centers were built to perform simple business data functions. The radius of its functions range from storage to connectivity, security to back up and disaster recovery to easy accessibility. Analytics was never a standard feature or a given capability of legacy data center operations. Continue reading