Wi-Fi is an Answer for Africa: Across Africa demands are changing, access models are changing and consumers are blurring the lines between corporate

Latest Articles

  • 1
  • 2
  • 3
Wi-Fi is an Answer for Africa

Wi-Fi is an Answer for Africa

Across Africa demands are changing, access models are changi...

Shortage of Information Security skills in South Africa a cause for concern

Shortage of Information Security skills in South Africa…

The Information Security field is extremely fast moving, how...

Tips to ensure mobile safety

Tips to ensure mobile safety

Today, we cannot live without our mobile phones. We use our ...

A+ A A-
Monday, 11 August 2014 08:59

Creating a Compelling Mobile User Experience

Creating a Compelling Mobile User Experience

With millions of apps available today and growing at a rapid pace, consumers are spoilt with choice and have little patience for apps that do not deliver. In a market where quality and performance always come before brand loyalty, the competitor’s app is only a tap away.

 

How can a business make its mobile offering stand out from the crowd and more importantly, beat the competition? What does it take to become successful and why do consumers seem to embrace certain offerings when most fall by the roadside?

Published in Mobile
Read more...
Thursday, 03 April 2014 11:39

Managing the mobile enterprise

Managing the mobile enterprise

BYOD has become the rule, rather than the exception. A recent MobileIron survey revealed that of the 3 000 respondents, a whopping 80% said they regularly use their personal devices – smartphones and tablets – for work purposes.

 

There can be no doubt that it is no longer a question of if enterprises will implement mobile device management (MDM) policies, but when. And further to this, once the devices are under MDM, businesses will need to address the information sprawl.

Published in Mobile
Why Wi-Fi will become the next corporate must-have

Wi-Fi is not new. Although it’s hard to track its origins, it’s safe to say Wi-Fi was being used on a large scale for the first time in the late 1990s – which probably qualifies it as being prehistoric in tech terms. But there has been renewed interest in the technology of late, and with good reason.

 

For one, analysts have predicted that in the next few years, the average people will go from owning two to three Wi-Fi enabled devices (such as a laptop, tablet and smart phone) to seven, or more, if the futurists are correct in assuming that we’ll soon download our emails via our fridges, bedside radios and televisions.


Subscribe content preview

To continue reading: Log-In above or Subscribe now.

Want the full story?

The SA Leader Magazine Cover

SUBSCRIBE NOW  

Get The SA Leader  the way you want it

  • One Year Digital Subscription - R320
  • 10 Issues Print Subscription - R580
  • One Year All Access - Just R900  Best Deal!
    Print Magazine + Digital Edition + Subscriber-only content on SALeader.co.za

If you are already a subscriber, please Log-In using the Log-In button found on the top right of the site!


click here
Published in Networking

Today's CIOs have to deal with the potential challenges of bring your own device (BYOD), mobile applications, software-defined networks (SDN), cloud sprawl, and usability demands, all on a static or shrinking budget.

 

Riverbed Successful Consolidation Infographic EMEAAs such, organisations are increasingly pursuing enterprise-wide virtualisation and consolidation as a means of improving the cost efficiency, manageability, security, resiliency and flexibility of the business. This is leading to a fundamental transformation in the modern data centre.

 

In fact, according to research conducted by Vanson Bourne on behalf of the application performance company, Riverbed Technology, 70% of IT decision makers across Europe and the Middle East are planning consolidation projects during 2013.

 

Virtualisation is now being extended to production and line-of-business applications. With this broader adoption, customers have begun to look for similar cost savings from broader consolidation efforts. They’re relocating servers from branch offices to consolidated data centres and even consolidating entire data centres and operating IT out of fewer locations, as well as moving certain workloads and data to the cloud.

 

The study questioned 400 CIOs across France, Germany, the United Arab Emirates, Poland and the United Kingdom. It revealed several major drivers and barriers that CIOs are considering when looking at consolidation.

 

Drivers

By consolidating and transforming the architecture of underutilised and distributed assets, a business can reduce infrastructure, administration, and power and cooling costs. At the same time it can reduce the volume of hardware to manage, and more easily apply automation policies, improve security, and streamline data protection procedures for disaster recovery and business continuity.

 

The study found that 68% of those planning a consolidation project report data security as the key driver for their programmes. Reducing the cost of managing distributed servers at the branch office layer (58%) and greater control of application and server upgrades (49%) were also reasons to consolidate. Although these drivers varied in importance across regions, these were all consistently high factors for every business, regardless of location or industry.

 

Organisations consolidate infrastructure and adopt virtualised deployment paradigms, provision new services and locations, and add scale to existing applications, all with minimal cost overhead and administration.

 

However, many still harbour concerns about the negative impact that projects like these may have on the business.

 

Concerns

While transforming the data centre through consolidation holds the potential for improving cost efficiency and mitigating risk, the reality is that IT needs to play a part in supporting productivity and revenue growth. This generally involves supporting users outside the data centre, at the far edges of the network and so post-consolidation performance is a major concern.

 

The research showed that, of those questioned, over half cited complexity as the biggest obstacle to consolidation efforts. The cost of initial set-up, as well as application performance over the WAN, was also reported as concerns by 45% and 38% of the respondents, respectively.

 

IT often questions the feasibility of sustaining performance after consolidation, but with the right support and solutions, all these issues can be overcome.

 

Advice

Consolidation and data centre transformation can fundamentally change a business’s application delivery environment, making it more reliant than ever on the network. As the network becomes critical for centralised applications, changes that used to affect a single location can now impact an entire region.

 

Another key consideration is that, once applications have been centralised within the data centre and started delivering proven cost savings and efficiencies, there is the potential for performance blind spots amidst the layers of virtualisation in the data centre. 

 

The cost of change is sometimes high, but when an organisation considers the overall savings that can be achieved, the true value of consolidation can be accurately ascertained. This requires an assessment of other recent IT investments and the cost of migrating to cloud services, for instance.

 

Regardless of whether a business is seeking to improve performance after consolidation or at the start of such a project, performance and simplicity need to be at the heart of the network infrastructure.

 

In particular, boosting sluggish business applications and slow websites can be dealt with through a combination of WAN optimisation, QoS, and web content optimisation (WCO). Combined, these technologies can help ensure that the increased distance between workers and the data and applications they use don’t slow things down.

 

Of course, not every application should be moved out of branch offices, but the risks and complications of a distributed application infrastructure can be mitigated. Those few applications that do remain can be virtualised directly on a WAN optimisation appliance and managed remotely with industry standard tools.

 

Even when reducing the number of data centres, a company’s services and applications will be spread across several locations. Virtual application delivery controllers (ADCs) make it possible to accelerate user and replication traffic between data centres as well as ensure high availability of critical services.

 

To effectively manage such modernized data centres requires monitoring of the traffic between virtual machines to keep tabs on the performance of virtualised services. With such monitoring tools in place, CIOs can rest assured that their investment is paying dividends and that any potential problems are fixed before they adversely impact the business.

 

Conclusion

The tools exist to enable a business to successfully consolidate and transform its entire data centre infrastructure. With the right partner, an organisation can easily ensure that network performance is maintained during the consolidation and transformation process. As such, enterprises can successfully and intelligently implement strategic initiatives such as virtualisation, consolidation, cloud computing and disaster recovery, without fear of compromising performance.

 

The benefits of a well-planned and executed data centre transformation approach can extend beyond merely cost savings, with companies improving the way they mitigate risk and grow. While many organisations have achieved some level of consolidation, beginning with server virtualisation, enterprise-wide consolidation efforts require overcoming greater complexity, latency, and traditional IT organisational silos.

 

The Vanson Bourne study highlights how CIOs are recognising the importance of centralising technology and data to gain these efficiencies. But some must overcome barriers before they can consolidate their applications or remove branch office servers.

By ensuring that performance challenges are identified, addressed, and managed, organisations can realise greater flexibility in where they locate IT resources. Doing so can mean greater economies of scale, control, and security.

Published in Storage & Data Centres
Preparing for the mobile workforce: Bring Your Own Device and beyond

The days where employees were confined to desks in front of a company-owned-and-controlled personal computer are long gone. Workers are increasingly mobile, jetting off to different locations around the country (and the globe), and they no longer keep office hours, preferring to fire off emails and complete tasks on the road and from home.

 

This was when we first saw the concept of BYOD (or Bring Your Own Device), and with it, Mobile Device Management, enter the market. The premise behind Mobile Device Management was, initially, the need to control the data employees were accessing – mainly for security purposes and to curb the abuse of company Wi-Fi. The first phase of MDM was concerned with restricting information – and with good reason. If a CEO’s IPad, containing the latest pricing strategy, was stolen, the IT department had to be able to remotely shut down the device to prevent a competitor from accessing it. Likewise, if an employee left the company’s service, so would their smartphone - with all the potentially sensitive emails contained on it.

Published in Mobile
Migrating to ‘Everything over IP’ – can your network handle the pressure?

Converged communications open up a host of opportunities for businesses, and IP is often seen as the ultimate solution to bringing various communication media together. From voice and data to video, security and surveillance, even wireless printing and more, the ‘Everything over IP’ (EoIP) phenomenon has taken the business world by storm. However, migrating all of these various aspects onto an IP network is not as simple as ‘plug and play’. When looking to migrate services onto IP, there are many factors that first need to be considered, including the technical considerations regarding the network. Addressing the network design and architecture up-front is critical to the success of migrating to IP. Data networks become more complex the more services are run over them, and as more services migrate to IP, it becomes increasingly important to ensure uptime and availability. Planning the network correctly, taking into account the needs of each IP service, and choosing the right network partner, are critical in ensuring that EoIP does not backfire on the organisation.

 

“Collapsing various services onto a single network makes sound business sense; when this is achieved the total cost of ownership of the various services can be lowered. From an end-to-end business perspective, once all services are collapsed onto the IP network, they can all be managed by the IT support organisation on a common platform which allows information to be shared across voice, video, data and so on. This means that content and context rich collaboration are made possible for enhanced productivity,” says Paul Fick, Managing Director of Jasco Enterprise.

 

IP applications also allow services that were traditionally confined to the office environment to be easily extended to mobile, catering to the ever-growing Bring Your Own Device (BYOD) phenomenon. Applications can be loaded onto tablets and mobile devices, hooking into business systems and providing the same type of services on these devices in remote locations. Services can also be easily provisioned to users, giving them a choice of the device they prefer to work on. This changes the way that users work, enhancing efficiency and productivity. However, in order to cater to these changes, both the network and the services need to adapt.

 

“When it comes to IP migrations, simply loading a host of previously separate functions onto a single network can have serious negative repercussions for the performance of the network, degrading the quality of all services and making them unusable. This then impacts the productivity of the business and in turn its profitability. For example, adding voice onto a data network without first considering the technical requirements will make voice traffic subject to latency and jitter, and at the same time will hog bandwidth and cause normal data traffic to come to a potential standstill. The quality of the experience is critical in ensuring maximum user adoption, to drive optimum value from investment,” says Andrew Larkins, Systems Engineer at Avaya Networking.

 

In today’s world it is not possible to retrofit an application onto the traditionally designed network. Deploying new services onto unsuitable network architecture can overload the network, causing bottlenecks in traffic, which in turn can cause the entire network to shut down, resulting in services outages, which pose a serious risk to business. Agility is key and applications should drive the network, to ensure that applications work as expected and the user experience is satisfactory. IT needs to be proactive to deliver agile services in a fast, flexible and secure manner. Business critical applications need to be identified and prioritised on the network, to ensure that consistent levels of service are delivered to these applications regardless of the network load, thus preventing service degradation. This is particularly important with real-time services such as voice and video over IP.

 

“Voice and video have significant bandwidth requirements. This means that the current network design and capabilities have to be re-examined. Redundancy is also key as services need to continue without affecting quality even if a link goes down. The architecture of the base level network needs to be changed to deliver a stable, always-on network that can be grown and have capacity added as requirements change. The reality is that traditional networks simply are not designed to cater to this loading,” Larkins adds.

 

For EoIP services, the network must be always-on, scalable and reliable, with active-active forwarding to make the most of all available links, rather than leaving one as a backup. This enables more capacity to be available at all times, and provides automatic failover in the event of a link failure. Networks need to be fit for purpose today and be able to support change and innovation in the future, preventing the necessity to rip and replace the network every time new products or services need to be added.

 

“The best advice is to look forward to the future. Don’t plan for what you need now, this is the bare minimum and it will change. Organisations require a network that delivers on today’s requirements, with an architecture that can be expanded and scaled to meet future demand. Using open standards technology enables organisations to select a basket of best-of-breed solutions, regardless of vendor, which provides the agility and flexibility needed to match business requirements in an unknown future. And choosing the right service provider to partner with not only removes some of the complexity by giving you access to specialist network design skills, it also ensures that this vision can be brought to life and that networks can continue to add value to the business in years to come,” concludes Fick.

Published in Networking
Monday, 27 May 2013 10:36

CIOs have to say yes to CEOs

CIOs have to say yes to CEOs

The Bring Your Own Device (BYOD) trend is no longer a ‘trend’. It has happened. Recent predictions from Gartner claim that global PC shipments will decline this year as shipments increase, and there is anecdotal evidence that the majority of employees have accessed company-sensitive information on their personal . Just look at any desk around you in your office and you will spot personal devices scattered among traditional work tools.

 

Whereas the BYOD phenomenon has previously been associated with a younger generation coming into the workforce, disrupting existing workflows and tools deployed in an office environment, it actually isn’t. In fact, increasingly, it is the C-suite that is driving BYOD.

Published in Mobile
Read more...
Tuesday, 16 April 2013 12:30

To leverage the BYOD trend and protect the business, corporates need mobile device management software

To leverage the BYOD trend and protect the business, corporates need mobile device management software

The Bring Your Own Device (BYOD) phenomenon, which sees individuals bring their own mobile devices into the workplace, is part of a new business paradigm. It allows business to be conducted remotely, from anywhere, at any time. It drives productivity and competitiveness. But BYOD also poses a significant challenge to organisations,  from the large corporate to the Small Medium Enterprise (SME). As we enter the era of mobile computing, a composite security solution that addresses device management, application management, and threat protection has become vital.

 

More people own mobile devices and use them as personal productivity tools in their private and business lives. To refuse to allow employees to use these tools for work purposes would strategically disadvantage the business. However, if these devices are allowed to connect to the corporate network and access precious business data, the organisation is opening itself up to considerable security risks.

 

Besides basic protection from viruses or corruption of data, the organisation needs to be in a position to remove or ‘wipe’ corporate data from a device that is lost or stolen, and prevent access of company data by anyone no longer employed by the organisation. There are also privacy issues to consider. The owner of the device is unlikely to want the organisation to be able to access his or her private data or have any control over it. Finding a way to split access and control over personal and business data is thus important.

 

The answer lies in finding a solution that will assist the business to secure all mobile devices within the organisation, enforce organisational policy and maintain control of the IT environment. The solution should ideally address security of devices, applications and data across personal and corporate devices.

 

The right management software will ensure the company is positioned for mobility. It should:

  • Enable devices for use in corporate environment by providing access to key corporate assets, such as email, calendars, critical mobile applications, documents, and media content.
  • Secure devices and data on all devices, including activating appropriate password and access controls, and maintaining separation of corporate data and personal data.
  • Manage all devices in the enterprise from a single centralised solution. This includes visibility and control over all phases of device lifecycle with needed administrative and helpdesk options.

The range of tools available to control information and devices is quite large and implementing these tools is becoming a trend throughout business as corporates realise that they are at risk and that people will use their own devices whether they want them to or not.

Enable, secure, manage – the key features

There are some key features to look out for in the solution you select. In terms of enablement, enterprise enrolment will help prevent unauthorised shadow enrolments and provide a standard and automated provisioning process, while self-service activation will reduce IT handholding. A business email feature should include automatic configuration for native and third-party email clients that connect to various mail servers. An in-house enterprise application store will provide the ability to distribute internal or public applications. An enablement solution should also facilitate access to corporate network resources like Wi-Fi and VPN with support for all protocols and authentication methods. A mobile collaboration feature is also vital to makes content available on an end user device of choice.

 

When it comes to security, ensure the solution’s policy management feature can drive corporate compliance by enabling advanced security settings on devices. All policy options including passwords, remote wipe, and resource and application restrictions should be available and should be able to target specific users, devices, OS’ or groups. Strong authentication, secure email access, data separation and compliance and remediation features are also crucial.

 

Effective and efficient management of devices is going to be essential. The management features that will make the biggest difference are: centralised management for all mobile devices; integrated management of all the computing devices in the enterprise; management of all enterprise applications through the lifecycle phases with over-the-air (OTA) control; application curation to keep the enterprise mobile ecosystem safe with policy driven blacklisting; dashboards and reports to provide exact details of enterprise mobile assets at all times as well as comprehensive user, device, app, and profile details; and automation of administrative and operational tasks.

 

The message to corporates is: if you are using mobile devices in your organisation, you are at risk. Leverage the advantage the BYOD trend offers by investing in the software you need to better manage the devices and protect the organisation.

Published in Security
Read more...
Monday, 25 March 2013 11:23

Mobility extends the reach of the business into the market

Mobility extends the reach of the business into the market

Mobility enjoys such acceptance in the market that many new enterprise applications are now built for mobile access first and for other devices only as additional channels. In addition, there is large-scale mobile re-engineering of enterprise applications taking place, says Wesley Lynch CEO of Realmdigital.

 

In short, mobile is the major growth area of the moment; and the success of apps the reason for its popularity.

 

Unlike Internet-enabled enterprise mobility, apps offer a far more streamlined, tap-once experience. They also depend less on Internet bandwidth to function optimally as the application logic resides mostly on the device itself.

 

All sorts

Examples of the rise of apps can be seen everywhere in the market, and are of both the consumer-facing and internal varieties. This illustrates the appeal of mobile to companies of all sizes and industries, as well as the rich diversity of apps that have made mobile the next channel of business growth.

 

The most obvious call for enterprise mobility is from companies with field workers such as sales reps, work-from-home staff or roving employees.

 

In a sales situation mobility arms agents with more expansive catalogues than physical samples or print outs –facilitating the buying decision, order placements and even transactions.

 

Beyond sales, opportunity exists for interfacing with enterprise systems in near proximity without the need for desk-bound presence. In this context, depot or warehouse staff can interface with online stock systems and release stock, triggering live status updates of the system with dispatches.

 

Mobile also offers much more opportunity for self-service, for instance flight check-ins, hotel room bookings or reservations. Airline ground staff can check online seating plans on tablet devices while on-board the aircraft.

 

Mobility also extends the reach of the enterprise deep into the market, with promise for field service delivery. In this way medical results become available wherever patients or insurance clients find themselves, and can be entered into patient medical records immediately.

 

The direct, deep and continuous enterprise integration of mobile has increased the pace of doing business and enabled a more distributed layout of computing infrastructure within the enterprise.

 

Getting ready

With mobility increasing its advance in the enterprise it is important to seriously consider the implications of issues like the bring-your-own-device (BYOD) trend and the demands it places on security and systems management.

 

BYOD is effectively a convergence between business and personal technology, and it poses significant security problems. BlackBerry 10 has taken a stab at solving the risks with an elegant solution to split personal and business personas. Whether it takes on remains to be seen, but it does make it easier to deactivate enterprise access under certain conditions, such as when an employee resigns.

 

To make sure security and device management and a range of other mobility issues are seen to, enterprises must adopt a mobile application strategy. Its success will depend on having the right technical architecture and skilled development partnerships to design, develop and deploy the applications.

Published in Mobile
Read more...
Thursday, 28 February 2013 10:26

Will there be an office in ten years’ time?

Will there be an office in ten years’ time?

As technologies change and develop at an ever increasing pace, and mobile workers become more common - where does this leave the conventional office? Will there even be an office in 10 or 20 years?

Published in Wellness & Ergonomics
Read more...
  • Start
  • Prev
  • 1
  • 2
  • Next
  • End
Page 1 of 2

The SA Leader Magazine

Sept14-Cover

In the September issue

Leadership in a changing context


Interview with one of SA’s Young Achievers


While you’re speaking, what’s your body saying?


AN OPEN LETTER TO BOOMER BOSSES EVERYWHERE

Subscribe

Technology Tags

3G bandwidth BYOD call centres cloud software cloud technology cost cutting ERP iPad LTE network malware mobile mobile apps mobile commerce mobile device management networking outsourcing SaaS security security risk smartphones SME social media software development tablets telecoms virtualisation VOIP WiFi
Copyright © 2014 gdmc (Geoffrey Dean Marketing Corporation cc). All rights reserved. Material may not be published or reproduced in any form without prior written permission. Use of this site constitutes acceptance of our Terms & Conditions and Privacy Policy. External links are provided for reference purposes. SALeader.co.za is not responsible for the content of external Internet sites.

Login or Subscribe