It is questionable whether vendor difficulties or management upheaval should be a major concern when making an IT buying decision.
Due diligence is important, but history suggests that fear-mongering is overrated.
It is debatable how much the financial or managerial state of a potential supplier should weigh on the minds of IT buyers as they consider various solutions. Sure, on the one hand, no buyer wants to get caught out with an investment in products from a company that may not be able to support it for long. On the other hand, how often does that actually happen? Continue reading “Vendor Upheaval Overrated”→
BlackBerry Enterprise Service 10 (the new version of ‘BES’) offers ‘baked-in’ dual persona and multi-OS device management, provided by the device OEM rather than a third-party software or services provider.
Does this dilute the managed mobility propositions of third-party MDM software vendors, let alone carriers or IT services companies that are key channel partners of BlackBerry and other OEMs?
BlackBerry (née RIM) has always been different from other mobile device vendors, as it is and always has been both a device OEM and a software provider. In addition, its new BlackBerry Enterprise Service 10 software is positioned to address BYOD, as every new BB device can support dual persona (e.g., BlackBerry Balance) and multi-OS MDM. It is clear that BlackBerry cannot claim to handle either of these functions as well for Android and iPhone devices as it can for its own devices, but that is not necessarily a problem in itself. What is a possible problem is that in the last couple of years, while RIM’s smartphone market share shrank from over 60% to less than 5%, the ecosystem of third-party MDM vendors, dual persona and ‘container’ vendors, and the IT service providers and mobile operators that offer managed mobility solutions powered by these vendors’ solutions has evolved considerably. Multi-OS (and multi-carrier) MDM has become a check list item for carrier and systems integrator-delivered managed mobility services. In addition, the offerings of service providers are much broader than MDM, as they also include: TEM and logistics; containerization and dual persona solutions; and increasingly, mobile application development, delivery, and management; enterprise app store enablement; and mobile security. Continue reading “BB 10: ‘Baked-In’ MDM and Dual Persona vs. Third-Party Software and Services”→
One of the bigger benefits promised by the cloud is cost-effective access to the latest and greatest technology, often including compute-intensive services that were out of reach for all but the largest enterprises.
Providers are now delivering some advanced services through the cloud including analytics and ERP applications. The migration to the cloud, and away from a conventional consumption model, is having a profound impact on the hardware suppliers and the competitive playing field. How will this shake up effect service delivery and customer choice?
In the traditional client/server computing model that dominated the market for so many years, organizations relied on a Cap-Ex-centered approach to IT consumption where their individual technology pursuits were tied directly to often tight hardware budgets and procurement cycles. New application upgrades were linked to long term licensing agreements and sometimes lengthy hardware depreciation time tables. This could push some often ambitious processing-intensive projects well into the future or even outside the realm of possibility. Continue reading “Disruption (and Progress) in the Cloud, Continued”→
Enterprise social networking is nothing more than a passing fancy, at least in terms of describing the idea of collaboration.
For a view into what will follow, we need look no further than our own corporate priorities and the manner in which vendors seek to meet those priorities.
Language is a slippery customer. We mold and evolve words and phrases to meet our expectations of how the world works at any given time. For that reason, words and phrases come and go, depending upon whether or not they fulfill this need. And as I’ve been informed, many of the beloved words from my youth are no longer meaningful, words like preppie, hoser, rad, tubular and of course groupware. Continue reading “What Comes After Enterprise Social Networking? Business Networking”→
Press organizations, including The New York Times and The Wall Street Journal, strongly suspect that Chinese hackers infiltrated their networks looking for information on news sources and research.
These attacks – and private sector incidents – underscore the increasing prominence of politically, ideologically, and revenge-driven attacks in the threat environments.
2013 is starting where 2012 left off, with ideologically and politically motivated attacks making headlines, and in the case of a few recent high-profile breaches, making the news outlets that write those headlines extremely anxious. The New York Times, The Wall Street Journal, and a number of other press organizations have publicized their own battles against what they suspect are politically backed hackers which have successfully breached their networks in search of data gathered on sources that exposed government scandals. Though its government has denied any involvement, China specifically has been named for the role that attackers, suspected to be/accused of acting on its behalf, have played on hacking into journalist’s files in search of information used in articles on corruption and other political issues in China. Continue reading “In the Line of Fire: The Press Gets Hacked”→