Click to Visit

Click to Visit

Contributed Articles

"Phablets" Generating Strong Consumer Buying Interest Worldwide

Phablets are generating strong consumer buying interest worldwide, particularly in emerging countries, an Accenture survey has found. Blending smartphone and tablet PC features, phablets have five-to-seven inch screen sizes – larger than the four-to-five inches of conventional smartphones.

The survey revealed that 57 percent of consumers plan to buy a smartphone this year and, of those, nearly half (48 percent) prefer to buy a phablet rather than a conventional smartphone.

These findings are the latest to be released from the 2014 Accenture Digital Consumer Survey that explores consumer electronics spending and usage of 23,000 respondents in 23 countries.

Emerging markets
The survey also revealed that consumer preferences for phablets are stronger in emerging countries than developed countries. Of the consumers planning to buy a smartphone, 67 percent in India, 66 percent in China and 65 percent in South Africa said they would prefer to buy a phablet device. Consumers in developed countries, by contrast, were less partial to buying phablets. In the United States, for example, 40 percent indicated a preference to buy a phablet. Similarly, nearly a third (30 percent) of German respondents and only 19 percent of Japan’s participants prefer a phablet.

Interest in buying larger screens extends to tablets
The survey also found that 44 percent of respondents are planning to buy a tablet PC this year. Of those, 72 percent prefer the full-size tablets rather than micro-mini-sized versions, compared with 20 percent who prefer the smaller versions. Eight percent did not know.
[Full Article]   Jun-24-2014

 

Mobile Apps Will Have a Significant Impact on Information Infrastructure

With digital business blurring the line between the physical and the digital worlds, consumer-centric mobile apps are playing an important role, according to Gartner, Inc.
Gartner predicts that, by 2015, most mobile apps will sync, collect and analyze deep data about users and their social graphs, but most IT leaders are failing to consider the deep impact that mobile apps have on their information infrastructure.

Gartner also predicts that, by 2017, wearable devices will drive 50 percent of total app interactions.

This includes desktop-based app interactions and mobile apps, with mobile apps making up the majority of these interactions.

The line between acceptable and unacceptable use of consumer data can be very thin, and it gets even thinner as the data collected becomes more detailed and personal. For example, organizations collecting biometric data through mobile apps linked to wearable devices could be tempted to monetize this data by reselling it.

These risks relating to data collected from mobile apps require organizations to rethink their governance policies and adjust their information infrastructure.

Such organizations should:

- Manage the persistency and perishability of data collected from mobile apps.

- Monitor access to and control of this data. It is important to ensure that personal data collected from mobile apps remains private, and that it is secured, anonymized and accessed according to the organization's governance policies. Proper management of user agreements and opt ins are important aspects of this.

- Control the sharing and reuse of mobile app data for other purposes.
Data from mobile apps, whether deployed on the premises or in the cloud, is not currently managed as part of an organization's information infrastructure, and data collected from mobile apps is often siloed.

For example, colocation of data from mobile apps with other application data on the premises can be a better option for use cases such as offline and near-line analysis. However, using data virtualization to combine data in the cloud with data on the premises can be a better option if colocation does not suit the governance or SLAs of a use case. Using integration-platform-as-a-service capabilities for cloud service integration can complement existing data integration strategies by moving data from the cloud to the premises, or from cloud to cloud as needed.
[Full Article]   Jun-23-2014

 

Gartner Says Correct Categorization Is Key to IT Program Management

The ability to categorize IT programs and assign them appropriate tactics, skills and resources is critical to the generation of positive outcomes, according to Gartner, Inc. Programs that are not properly categorized are significantly more likely to run over budget, to fall short of one or more of the intended objectives, or to fail completely.

To help program managers categorize their programs and plan accordingly, Gartner has identified five types of program:

-- Bottom-up: Multiple projects that are recognized — after they have started — as part of a larger set of problems and as sharing dependencies. They are then assembled into a single program for better control and avoidance of redundancy.

-- Change-oriented: These programs are generally triggered by a high-level need for major change. They normally encompass multiple initiatives that may or may not be formally assembled into a program.

-- Policy-driven: This type of program is unique to government and the public or public service sectors, including government, social, charitable and nongovernmental organizations. A policy-driven program typically enables provision of a law, regulation or defined service — and continues until canceled or no longer funded.

-- Outcome-driven: These programs are driven by a concept of, or a vision for, a product, service or generally identified set of results, or to address a specific need. The concept, program contents and required results evolve naturally during program execution.

-- Transformational: These programs represent an effort that transcends the organization's current vision and its recent history and direction. They usually represent reinventions of one or more aspects of the organization's functions, services, culture, markets or products.

Although this introduces an extra step to the startup process for programs, it is upfront work that can go a long way toward avoiding some of the root causes of program failure, such as incorrect or poor governance and ineffective change management.
[Full Article]   Jun-02-2014

 

Mobile and Web Chat Investment Set to Jump in 2014

New research published by ContactBabel, the contact center industry analysts, reveals that US contact centers plan to invest heavily in mobile customer service applications and web chat technology within the next 12 months. Senior contact center decision-makers expect the penetration rate of mobile apps for customer service to increase from 25% to 42% over the next 12 months. The use of web chat is expected to grow from 41% to 58% over the same period.

Furthermore, significant upgrades to call recording technology and workforce management systems are also expected, driven respectively by the growing use of speech analytics tools, and the requirement to forecast and schedule for multichannel work, rather than just telephony. 21% of the contact centers that use call recording expect to upgrade it this year, with 17% investing in improved workforce management solutions.

[Full Article]   Jun-01-2014

 

U.S. Consumers Have Little Security Concern With BYOD

Despite the rise in the use of personal devices for business use, U.S. consumers are showing scant concern for security when it comes to bring your own device (BOYD). According to a recent survey by Gartner, Inc. a quarter of business users admitted to having had a security issue with their private device in 2013, but only 27 percent of those respondents felt obliged to report this to their employer. The survey was conducted in the fourth quarter of 2013 with 995 full or part time workers in the U.S., all of whom use a private device for work purposes.

The threat of cyber attacks on mobile devices is increasing and can result in data loss, security breaches and compliance/regulatory violations. One of the biggest challenges for IT leaders is making sure that their users fully understand the implications of faulty mobile security practices and to get users and management to adhere to essential steps which secure their mobile devices. For many organizations, overcoming BYOD security challenges is a full-time task, with a host of operational issues.

Nearly half of the survey respondents said they spend more than one hour each day using private devices for work purposes. The data also suggests that around half of respondents regularly use their devices for social as well as productivity tasks. This has different implications. It might point to employees considering their personal devices as necessary tools for their jobs. On the other hand, it also points to work-related documents regularly being transferred to private devices, leaving the security of the company network. In fact, 20 percent of respondents also stated that they do access data behind the workplace firewall using private devices.

The key to having a secure device is making sure it is well-managed. Enterprises are being compelled to make decisions about whether or not to allow employee-owned devices to access their enterprise's network and information. Failure to embrace BYOD will force it underground and into the shadows, where it will have the potential to publicly expose private data and open the enterprise to a data breach situation.

In our survey, 26 percent of respondents said their employer required use of BYOD devices and 15 percent had signed a BYOD agreement. A third of respondents have employers who are aware but don’t have a policy in place, and the rest said their employer was either not aware or they didn't know. This means 59 percent of survey respondents who regularly use their private devices for work have not yet signed a formal agreement with their employer.

Organizations that do decide to allow employee-owned devices need to develop solid BYOD policies based on their business requirements and risk profiles. At the moment, BYOD laptop, smartphone and tablet security policies are still incomplete in many companies, and contain gaps and other inconsistencies that don't measure up to business obligations. Many enterprises (especially in the smaller and midsize sector) lack the proper organizational structures to create these policies and must reorganize to provide the necessary governance for a successful mobility implementation.

For a BYOD program to work there has to be strict policy enforcement and compliant users - an issue that CIOs and IT directors are grappling with right now. All policy agreements have to be created with clear guidelines for cases of security breaches.
[Full Article]   May-15-2014

 

<< Prev1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 Next >>
Page: 2/46   Articles: 230