Ce diaporama a bien été signalé.
Nous utilisons votre profil LinkedIn et vos données d’activité pour vous proposer des publicités personnalisées et pertinentes. Vous pouvez changer vos préférences de publicités à tout moment.

The Workplace of Things

466 vues

Publié le


Publié dans : Technologie
  • Soyez le premier à commenter

The Workplace of Things

  1. 1. THE WORKPLACE OF THINGS MOBILE DEVICES ENABLE COMPANIES TO CONNECT TO A NETWORK OF INFINITE POSSIBILITIES: THE INTERNET OF THINGS. The number of smart mobile devices used at work and home is expected to reach 905 million by 2017. Smart managers and employees everywhere understand the business value of mobile devices, from smartphones and tablets to wearables. The survey revealed that 76% of employees believe their companies need to take further steps to fulfil the potential productivity gains that smart devices offer. Steps proposed by employees include increased use of cloud solutions, greater use of specialist software and greater support for smart device users. Exponential growth in the use of these smart devices has led to a staggering increase in demand for network bandwidth across 84% of organisations, according to the findings from a new market study commissioned by BT and Cisco. 905 MILLION 84 % 76 % «The growth in employee smartphone and tablet ownership is changing the ways we work… Draconian Wi-Fi access limitations or failure to invest in sufficient Wi-Fi coverage is a fast way to ensure a poor employee experience» Adrian Drury of Ovum of employees still don't have wireless access to their corporate networks. of IT managers think adopting a BYOD policy gives a competitive advantage to a company.84% 45% BRING YOUR OWN DEVICE With more than 76% of users convinced that their organisation needs to step up to the opportunity, it's clear that enabling BYOD in its many forms is about much more than simply cool devices and a mobile contract”, says Neil Sutton of BT Global Services. “Organisations need to consider elements of device compatibility, security, Wi-Fi, network, application performance, with a focus on driving costs down. The problem lies in a lack of progress in adopting or articulating a consistent policy across wired, wireless and Virtual Private Networks. A study by SecureWorld found that 60% of business and IT professionals say their BYOD policy does not address wearables. Additionally, 83% of respondents believe wearables are as risky as, or riskier than, BYOD. Security consultant Rafay Baloch emphasises how easily information can be compromised on mobile devices. He claims that 79% of security incidents within the past year involved a mobile device. “BYOD should be one of the main concerns of the organisations. Sensitive information that is transported or stored on a mobile device can be compromised easily.” 79 % 6Steps to Prepare for the Workplace of Things: Revisit your BYOD strategies: Study the latest projections about wearable device adoption in the workplace and try to predict how your employees will use wearables at the office or in the field. Identify new security requirements: Anticipate the development of new security apps for wearable devices. How will the use of cameras on these devices be restricted, for example? Experiment as much as possible: Test how wearable electronics could boost productivity, streamline efficiency, and change the way your company does business. Prepare for employee adoption: Wearables have the potential of not only impacting workplace productivity but also how employees think about work-life balance. In a Cornerstone survey, 66% of respondents said they’d try wearable devices if they helped them do their job better. Be proactive, not reactive: Don’t wait for employees to bring these devices to work. Actively try them out ahead of time in controlled applications to understand how wearables will work in real-world situations. Ensure that devices are updated: IT managers need to make sure that the latest available security protocols are installed on BYOD devices. It’s estimated that up to 72% of devices are not up-to-date enough for secure use in the workplace. Source : http://blogs.office.com / http://www.wired.com / http://qz.com / http://www.processor.com http://www.rapid7.com / http://www.hcamag.com / http://business.financialpost.com http://www.appstechnews.com / http://www.cornerstoneondemand.com / http://www.fiercecio.com 1 2 3