Home

Mobile

Mobile
If you are a current SAP customer, when do you plan to migrate to SAP S/4HANA?

Top Answer: No plan to migrate soon.

6014 views
20 comments
100 upvotes
Related Tags
People & Leadership
Strategy & Architecture
Cloud
End-User Services & Collaboration
Applications & Platforms
Engineering
Governance, Risk & Compliance
Data & Analytics
Business Intelligence
Disruptive & Emerging Technologies
Team & Organizational Design
Security Strategy & Roadmap
IT Strategy & Roadmap
Outsourcing & Managed Services
Network
Compute
Storage
Backup & Disaster Recovery
Public Cloud
Hybrid Cloud
Contact Center & Telecom
Data Center
Device Management
End-User Devices
Mobile
Productivity Tools
Collaboration Solutions
Document Management
Finance
Business Applications
Legal
Human Resources (HRIS)
Technical Product Management
Software Development
DevOps
Quality Assurance
Continuous Integration/Continuous Deployment (CI/CD)
Enterprise & IT Service Management (ITSM)
Availability & Capacity Management
KPIs, Metrics & Reporting
Financial Management
Vendor Management
Service Desk
Management Tools
Risk Management
Data Privacy
Artificial Intelligence & Machine Learning (AI/ML)
Data Warehouse
Integrations
Security & GRC
Identity & Access Management (IAM)
Blockchain
IoT
Innovation
5G
Peer Insights
Feedback
Vendor/Product Recommendation
Business Continuity & Disaster Recovery
Crisis Management
Customer Engagement
Customer Relationship Management (CRM)
Enterprise Resource Planning (ERP)
Business Relationships
Talent Management & Performance
Portfolio, Program & Project Management
Data Management
Big Data
Vendor/Product Assessment
Process Management
Asset & Configuration Management
Infrastructure
Performance
Operations Management
Mobile Development
Testing
If you had a magic wand - what's the #1 daily business challenge you'd eliminate?

Top Answer: Without a doubt - Technical Debt! It's a ball and chain that creates an ever increasing drag on any organization, stifles innovation, and prevents transformation.

Workforce management: Does anyone have an example to share for mobile punch-in/punch-out that works as well as/better than physical devices and is cost-efficient?

Top Answer: I have been using Pure Access Cloud with Pure Mobile app that connects to Isonas readers by Bluetooth. App is free, cloud licenses are cost efficient. The only major investment is in the hardware but its a one time investment, the readers are usually good for years. You can get automatic daily/weekly reports, logs on who open what door when etc.

40 views
1 comments
1 upvotes
Related Tags
Does your organization have a bring-your-own-device (BYOD) policy?

Top Answer: We have it, but there is no reimbursement.  We had extremely low adoption, since CORP traffic would eat up a significant amount of your monthly data plan. I personally did not choose to use my personal phone for work.

505 views
1 comments
0 upvotes
Related Tags
Confidential File Transfers Over Mobile DevicesConfidential File Transfers Over Mobile Devices

How are your staff transferring secure files over mobile devices today? 100 IT leaders share how they’re keeping mobile transfers compliant and secure.

How are people approaching a mobile-first workforce in their organization?

Top Answer: One word - ZeroTrust. DM me if you want more details.

4825 views
4 comments
9 upvotes
Related Tags
If these companies were affected then the foundation of computing could be at risk. If you could manipulate at the hardware layer via the firmware, BIOS, ect then a threat actor could weaponize well below the operating system which brings in to question the integrity of the entire computing stack and everything above it.  The firmware and bios are like the rebar and concrete for a building. If that foundation is weak then the entire structure and anything dependent on it is at risk. We cannot underestimate the potential or the severity of these companies being potentially affected by the SolarWinds hack and what that means for the foundational computing hardware they provide to the world.  What do others think ?  How could this impact your organization ?   Big tech companies including Intel, Nvidia, and Cisco were all infected during the SolarWinds hack - The Verge

Top Answer: The message here is: one is never out of the woods ever, so pay attention! Just because today's news eclipses yesterday's doesn't mean companies get to shove the bad under the rug and stay silent. Remember, vulnerabilities discovered 10-15 years back are still at the top of the list of the most exploited.

Leveraging Mobile Across Departments - Non-TechnicalLeveraging Mobile Across Departments - Non-Technical

This report was generated to help non-technical teams benchmark their mobile practices against their peers.

Is endpoint security for mobile devices more difficult than it is for laptops?

Top Answer: I think mobile devices were better designed from the beginning as opposed to desktop operating systems. Mobile started way ahead of where desktops started. But the fact that the mobile device management (MDM) products existed at all shows a glaring problem with the way that SaaS companies thought about mobile applications. The way that SaaS companies should have approached mobile applications and data protection from the beginning is to let you set the policies in their app, and then the app will make sure things aren't cached and there's no copy of your data roaming around. You would do it centralized as opposed to using some janky tool that lived as you manage your fleet. Then there are laws passed on whether or not you have to reimburse somebody for their phone. No small start-up wants to reimburse people for their phones or have a clear DoD policy when they start out because there are costs involved. It's a huge pain point, but at least it's not as bad as laptops in my opinion.

Leveraging Mobile Across Departments - TechnicalLeveraging Mobile Across Departments - Technical

This report was generated to help technical teams benchmark their mobile practices against their peers.

What are your thoughts on SaaS management platforms (SMP)?

Top Answer:

116 views
0 comments
3 upvotes
Related Tags
People & Leadership
Strategy & Architecture
Cloud
End-User Services & Collaboration
Process Management
Governance, Risk & Compliance
Data & Analytics
Business Intelligence
Security & GRC
Disruptive & Emerging Technologies
Team & Organizational Design
Talent Management & Performance
Culture & Values
Financial Management
Security Strategy & Roadmap
IT Strategy & Roadmap
Outsourcing & Managed Services
Network
Compute
Storage
Backup & Disaster Recovery
Public Cloud
Hybrid Cloud
Contact Center & Telecom
Data Center
Device Management
End-User Devices
Mobile
Productivity Tools
Collaboration Solutions
Document Management
Finance
Business Applications
Legal
Human Resources (HRIS)
Technical Product Management
Software Development
DevOps
Quality Assurance
Continuous Integration/Continuous Deployment (CI/CD)
Enterprise & IT Service Management (ITSM)
Availability & Capacity Management
KPIs, Metrics & Reporting
Vendor Management
Service Desk
Management Tools
Risk Management
Regulatory Compliance
Data Privacy
Artificial Intelligence & Machine Learning (AI/ML)
Data Warehouse
Integrations
Data Lake
Threat & Vulnerability Management
Identity & Access Management (IAM)
Security Operations Center (SOC)
Augmented & Virtual Reality (AR/VR)
Blockchain
IoT
Innovation
Cryptocurrency & Bitcoin
Bots
5G
Peer Insights
Vendor/Product Recommendation
Business Continuity & Disaster Recovery
Crisis Management
Customer Engagement
Customer Relationship Management (CRM)
Enterprise Resource Planning (ERP)
Threat Intelligence & Incident Response
Talent Sourcing & Hiring
Employee Engagement
Mentoring & Coaching
Training & Certification
Business Relationships
Portfolio, Program & Project Management
Data Management
Big Data
Vendor/Product Assessment
Asset & Configuration Management
Infrastructure
Performance
Contact Center Solutions
Applications & Platforms
Engineering
Operations Management
Mobile Development
Testing
Data Protection & Encryption
When was the last time that you updated the Operating System on your computer, smartphone or some other device?

Top Answer: Asap. Mainly to improve security

42 views
14 comments
3 upvotes
Related Tags