Early one morning during last month’s SHARE in Anaheim event, about a dozen participants left their smartphones and tablets in their bags or pockets to discuss “The Mobile Computing Revolution,” a focus group hosted by Ray Sun, SHARE Marketing Director.
Since SHARE is an independent, volunteer-run user group focusing on enterprise IT, SHARE depends upon you, as representatives of its member organizations, to define, prioritize and ultimately deliver each conference’s technical content.
We all know that our organizations have a lot of data. It accumulates so quickly it’s often difficult to maintain and obtain enough storage capacity. Then, we are expected to be able to abstract knowledge and value from all of the data in its myriad of formats. Add to that the efforts needed to keep
Employees clamoring to access the mainframe via their own device? It is certainly doable (see blog post “Many Still at the Starting Gate with BYOD, Mobile Productivity”) and may even be a perk for a certain type of employee, but is it wise in terms of security?
A shopper visits a high-end department or clothing store and is helped by salespeople equipped with tablets that not only access the customer’s previous purchases—the better to coordinate the new item she may be considering—but can also place an order if an item is not in stock.