Amit Belani, National Manager - Mobility Solutions Marketing, Public and Large Enterprise, Dell India
Organizations ranging from corporations to public entities such as schools and healthcare providers are being transformed by sweeping changes in technology and mobility that impact how people work, interact, collaborate, study and learn. The proliferation of devices such as smartphones, tablets and mobile, high powered notebooks, combined with the pervasiveness of social media and its increasing impact on corporate brand and sales have caused lines to blur between personal and professional life. Students stream lectures over personal computers while simultaneously checking their Facebook page on their mobile phone. ER nurses triage patients in the waiting room with mobile tablets, and employees check email, tweet and blog from coffee shops and airports. Whether logging onto the university’s online library or the corporation’s collaboration tool, limitless access, flexibility and mobility define today’s end user computing environment and underscore the expectations of end user.
As a result, CIOs should address two fundamental end user computing challenges – providing secure, anytime access to an increasingly remote and mobile workforce, and managing the burgeoning diversity of devices, applications, platforms and operating systems needed to run their organization.
Though traditionally IT departments determined the technology issued to employees and the policies strictly governing their use, an office-bound, limited approach is no longer practical in today’s highly connected, mobile, environment. In addition, with the increase in IT complexity, security challenges have become more complex and insidious. Security threats are growing in volume and sophistication at an alarming rate.
[In 2010, security researchers uncovered close to 100,000 new malware samples per day – more than one per second More alarming; most organizations are not prepared or staffed to handle these new and numerous threats. As end users access corporate applications and IP over unsecure networks, via personal devices and in locales ranging from the field to the battlefield, organizations endure increased risk to data security. For example, it is not uncommon for the same PC or tablet to be used by an entire family: to check work email, access homework, play games, download music, pay bills and stream movies. Ironically, corporate IT policies that ban the use of employee-owned devices in the name of security inadvertently create new, large security holes as end users skirt IT restrictions. For the CIO, these trends present a need for updated IT policies, better data protection and security, and improved end-point management]
Top 10 Strategic Technology Trends for 2012
Is not only about sharing pictures , status updates , experiences, wise cracks , videos etc anymore - It is an important channel between vendors and customers, and usually works more quickly and directly than other channels into their support organizations. Dell's commitment to social media is sizable and is already paying great dividends. Effective use of social media is no longer an after-thought,its an essential form of marketing in the new era.
Two things that are powerful and remarkable about Social Media
An interesting infographic you may like to view on what the future of evolving workforce looks like.