Sponsor

2013/11/18

| 11.18.13 | Q&A with Joshua Konvisser of Pillsbury Winthrop Shaw Pittman

If you are unable to see the message below, click here to view.

Today's Top Stories:
1. Q&A with Joshua Konvisser of Pillsbury Winthrop Shaw Pittman
2. High-performing IT organizations embrace, support BYOD, says Accenture
3. BYOD stresses enterprise Wi-Fi networks, spurs gear deployment

News Scan:
Oracle buys Bitzer Mobile
UK firms not BYOD ready, more

Also Noted:
Robots go mobile; Is 5X battery boost near?; Much more...

News From The Fierce Network:
1. Study looks to Kaggle for big data superstar clues
2. Only minority of business execs have confidence in IT, says Forrester
3. Would you like big data with that burger?

FierceMobileIT

November 18, 2013

Subscribe | Website
Refer FierceMobileIT to a Colleague

This week's sponsors:
AdColony
Moovweb
Kony
Intel and Atos

Follow @fiercemobileit on Twitter


This week's sponsor is AdColony, the Only Instant-Play™ HD Mobile Video Ad Network.

Visit adcolony.com/monetization to learn more about AdColony's new Android SDK 2.0.


Sponsor: Kony

Webinars

> 8 Ways to Unify Your Web, Mobile & Apps Strategy- November 20, 2013, 2 pm ET/ 11 am PT
> CIO/CMO Extreme Collaboration: Mobile App Edition - Thursday, November 21, 2pm ET / 11am PT
> Building a Strategic Road Map for Enterprise Mobility - December 11, 2pm ET / 11am PT
> Next Generation Data Center - Innovation, Transformation, and Management - Now Available On-Demand!

Marketplace

> Whitepaper: Enterprise Job Scheduling: 12 Things You Should Know
> IT Made Easy with ManageEngine ServiceDesk Plus
> Whitepaper: DIY SharePoint - 6 Reasons to Enable Self-Service SharePoint Customization
> Whitepaper: Avoiding the top three challenges of custom-coded SharePoint applications
> Whitepaper: OTA Updating Simplified - Using SaaS to Update Android Devices
> Whitepaper: Your Guide to iOS 7
> Whitepaper: Next-generation Network Security
> Whitepaper: Customer Experience for Service
> Whitepaper: Know What Customers Want Before They Do
> Whitepaper: The Future of Sales Performance Management
> eBook: Making BYOD Work
> Whitepaper: Best Practices for Migrating to SharePoint 2013
> Whitepaper: How to Transform Your Mobile Customer Care Strategy
> eBook: eBook | Content for the Mobile and Social Workforce
> eBook: Convergence of Mobility and the Cloud
> Whitepaper: Encryption of Cloud Data

This week's sponsor is Moovweb.

Whitepaper: Creating the Right Mobile Strategy

Creating compelling mobile experience is no longer an option; your customers, business partners and employees are demanding it. But what is the right strategy? Should you be investing in custom APIs? What is the right way to think about mobile apps versus mobile sites? Get Answers Today!

Today's Top Stories

1. Q&A with Joshua Konvisser of Pillsbury Winthrop Shaw Pittman

By Fred Donovan Comment | Forward | Twitter | Facebook | LinkedIn

The BYOD trend and enterprise mobility in general are raising legal issues regarding employee privacy and data security that enterprises will need to address to avoid lawsuits and regulatory fines.

To address these legal issues, enterprises need to institute strong privacy and data security guarantees in their BYOD policies and back up these policies with technology, such as mobile device management (MDM) and containerization products.

To explore the legal issues raised by BYOD and enterprise mobility, FierceMobileIT sat down with Joshua Konvisser, a partner in the law firm of Pillsbury Winthrop Shaw Pittman. Konvisser represents clients in complex technology transactions. He explains how BYOD can be a legal balancing act between employee privacy, corporate interests and interests of the data owners.

FierceMobileIT: What are some of the privacy issues raised by BYOD?

Konvisser: BYOD is the balancing between employee privacy, protection of corporate interests and the interests of the data owner--should there be customer data on the device. There was actually an interesting article I was looking at not that long ago about the Veteran Administration, which has a BYOD initiative. They are getting gummed up on the fact that there is a lot of PHI [protected health information] that could be on the system, especially as they move into medical electronic records. So not only do you worry about the employee's privacy and the company's confidential information, but you also have to worry about the patient information that may resign on a personal-liable device.

It is really balancing all of those interests in a way that keeps everybody compliant. But I think the end result is likely to be that the employee is going to lose out. The law protects the employee's privacy, but that is something that is being contracted out through the BYOD policy. Otherwise, you have a conflict that is really hard to bridge. You can use technical things like MDM [mobile device management] to try and manage the risk. If somebody wants to seize the device, there is an exposure risk to employee privacy that only gets solved by the employee giving up some rights.

FierceMobileIT: Would that be through an end user licensing agreement that the employee would have to sign?

Konvisser: Typically, BYOD is subject to a policy. It is not a licensing agreement as much as a policy that can be implemented as a condition of my employment. I need to affirm that I am compliant with all of the HR [human resources] policies, one of which would be the BYOD policy. The way the company can up the ante is to say, 'You want me to reimburse you for the data service on your device; the quid pro quo is that you're going to agree to certain policies.' That becomes more challenging in a company that isn't reimbursing data service. There are different methodologies for this. One is, use your own device, and we're going to reimburse you.  Another is, use my device. Yet another is, use your device but we are not reimbursing you. For example, in my law firm it is assumed that I have a cell phone, and the firm will pay the data portion. So when I sign up for the data portion, there is a policy that I need to accept that has certain provisions, such as I recognize that they can grab my device if they need to.

If I am advising a company that is starting up a BYOD policy, I say that from a legal perspective, if you want to have the best argument in terms of defeating the privacy interest, the best thing you can do is have someone sign an agreement. Then, there is no argument that this was an unreasonable condition. Whereas, if I just thought it was the employee policy, it becomes easier for the employee to say well, I didn't know and how was I supposed to know. It depends to some extent on state law. Some states will be very protective of employee rights, so those arguments can have credence. If I am advising the company, the advice is go as far as you can, subject to not wanting to antagonize the employees….Right now, my sense is--and this is not based on any real numbers--is that the tide is in favor of the company because employees want BYOD, so there is a willingness on the part of employee to sign a piece of paper because that's how they want to work. That is playing to the company's advantage because the company can then get the BYOD policy in place that they want.

FierceMobileIT: In your analysis of a recent court case in the Northern District of Ohio (Lazette v. Kulmatycki), you argued that the court was twisting various laws to try to get an employee privacy right. Does every state have a law that protects employee privacy or does that vary from state to state?

Konvisser: The problem in that case was that they didn't. If you ask a privacy person if there are state laws on privacy, the answer is, Yes, there are 48 states that have privacy laws. But what those privacy laws really cover are improper disclosures to the public of private information held by somebody. So that is not really what happened in this case. What happened here was somebody got access to information that they didn't rightly have and took advantage of it. The reason the court was twisting and turning is because the court read the facts and they said this is wrong, it feels really bad. But none of the federal or state laws about privacy squarely touched this issue. One of the things is an interesting lesson for the starting lawyer is, judges are people too. So judges have an innate sense of fairness about what is right and wrong, but their job is to interpret the law. So that is when you get into a situation where the court had to figure out how to get the law to apply to get the right result. I'm not saying that they misconstrued the law. I'm not saying that that they twisted the facts, but what I am saying is that the laws really didn't hit this issue squarely so it wasn't us slam dunk to say, 'Yes, we all feel it's wrong and here is the law that says it's wrong. Instead, they said we all know it's wrong and we have to use this patchwork of laws that have grown up in different areas to cover this issue, which has no law on it yet.  

FierceMobileIT: How does BYOD affect data breaches? Does it increase the risk? Could companies face fines?

Konvisser: Let's say that I have an iPhone sitting on the desk in front of me. Let's say the iPhone has a complete sync with my contacts in Outlook. I have a lot of personal information on my iPhone, and I can use it to link into my corporate directory and find cellphone numbers for some of my colleagues. So now I have a device that goes around the world that somebody could easily get their hands on. It's just more distributed information. It's not that the device is fundamentally bad, it just it enables further distribution of sources of information. I can get a spreadsheet emailed to me that has whatever private information I get in connection with my business and it's on my iPhone. If you don't have good MDM on your phone, the way the iPhone works is you can just switch email accounts and move it to my personal email account and send it around the world and the corporation doesn't have controls. With the right type of MDM, you can protect against that. But the device naked allows that kind of behavior. It isn't inherently a privacy breach, but what it does is it makes it easier just by the mass distribution for privacy breaches to happen. The best way to deal with that is to train your employees on the risks and how to manage them.

FierceMobileIT: Are there any intellectual property issues related to BYOD?

Konvisser: Yes, absolutely. If you think about it, there is an IP and employment issue that is the same. When I'm doing work on a corporate device, it is pretty much assumed that it is the corporate intellectual property. So as an employee of a company, that which I develop is owned by the company--if I develop it for the company using company resources. Now let's say I come up with a brilliant idea, and I do it on my tablet, which is a personal-liable tablet. Who owned that? If I am an hourly worker, there is an interesting question: If I'm doing work outside of the work hours, which becomes an overtime issue. If I'm developing brilliant ideas as a full-time salaried employee, there is no distinction in my life between what I am working and when I'm not working. Suddenly, my brilliant side project--is that owned by the company? That's an untested question, but it is a question. It blurs the lines.

FierceMobileIT: Is there anything that the company can do to make sure that it retains intellectual property?

Konvisser: In your policy, you would say that any corporate work that you do becomes corporate, but it is really hard to write that without being overbroad. Unless you say we own everything, then it gets messy. That said, companies have been dealing with this issue for a long time. A company that does a lot of intellectual property work usually has an employment agreement that says, 'We own everything you think of, we own your brain.' Those are crafted very differently based on state law. For example, my brother lives in California and he works for a cellphone company. He asked me to take a look at the employment agreement that they put in front of them. It read very differently than a New York agreement because the laws in California are much more restrictive on what the company can require of its employee than they are in New York. California is a more employee friendly jurisdiction. It is state dependent, but by contract you can allocate intellectual property in an employment agreement when they sign up to get onto the BYOD policy.

FierceMobileIT: Are there any other legal issues that come to mind regarding BYOD?

Konvisser: Typically, the employee has an expectation of privacy, so the BYOD policy needs to override that expectation. We talked about the third-party information. In my example, I talked about protected health information. If it's a financial services entity or any financial information, you also have Gramm-Leach-Bliley that might protect the privacy of the information.

There are also export control issues. So if I have some software that is subject to export controls on my phone and I take the phone into another country, that is a potential risk if you are in a sensitive area. You could need to get a license to take your phone into another country, depending on the country. One thing that people worry about a lot, and this is something that people worried about with laptops and is really not a corporate versus personal-liable issue, but it is an issue and mobile, is getting stop at customs where you basically have no rights and they can insist that they take your device, look at it and suddenly private information has been exposed to the customs officers. That is an issue that people are living with now, but it has expanded by the growth in mobile.

One of the important ones that we touched on, but I'd like to touch on again, is the overtime issue because that is one where people have gotten tripped up when you have hourly employees. If you have hourly employees working on a BYOD device, you need to include in your policy restrictions that they not use the device for corporate purposes outside of business hours because, otherwise, you are going to end up owing overtime back pay.

In the securities industry, you have that two-week mandatory leave. In certain regulated parts of the securities industry, there is a mandatory two-week period where people are not supposed to work. The theory behind it is so that you can audit and make sure they are not doing any insider trading or other bad activity. You are not supposed to be on email or other work activity. If your corporate and personal devices are mingled, you need to think long and hard about how you are doing to manage that piece of the process.  Using some of the technologies can help you do that. It is something you need to think about if you are in that industry…

FierceMobileIT: What are some of the special legal issues that BYOD poses for regulated industries such as healthcare and financial?

Konvisser: The biggest issues are the privacy issues, but the privacy issues are just exacerbated by the specific laws that cover protection of the information that will undoubtedly end up on these phones or tablets. We talked about policies as the way the employer manages this. The trick is that you not only have to have a policy in place but you also have to have a policy that's enforceable. To have a policy in place and then blatantly ignore it is probably worse than having no policy. You can really get yourself in hot water that way. What it is saying to all of the regulators who might care is, 'Yes, I understand that there is an issue and I didn't do anything about it. We said that you need to draft your policy to allow you to do all these things, that needs to be tempered with, 'I don't want the policy to say something that I can't enforce because otherwise I look even worse if there is a problem that happens. If the policy says, If you do any of these things, we are doing to cut you off and take your phone, but you know that you are not actually going to be able to do that, don't say that. Write the policy in a way that you can enforce it and that you will enforce it.

Related Articles:
BYOD to make traditional phone systems obsolete, study says
BYOD is 'an unregulated mess,' says IT security expert

 

Read more about: Intellectual Property
back to top


This week's sponsor is Kony.
UnboundID
Webinar: CIO/CMO Extreme Collaboration: Mobile App Edition
Thursday, November 21st, 2pm ET / 11am PT | New Speaker Added!

Customers and employees alike are more mobile than ever, which means CIOs and CMOs have to partner more effectively than ever to deliver the goods. Join us as we discuss making mobile apps a critical point of teamwork between IT and marketing.
Register Today!

2. High-performing IT organizations embrace, support BYOD, says Accenture

By Fred Donovan Comment | Forward | Twitter | Facebook | LinkedIn

High performers in IT encourage and support their employees in using their own mobile devices at work, according to Accenture's fourth high-performance IT research report (.pdf).

The high-performance IT mindset "means that most high performers let their employees bring their own mobile phones and tablets to the workplace. They are well past the point where bring-your-own-device (BYOD) behaviors are seen chiefly as threats to data security; rather, far-sighted CIOs view employees' mobile tools as productivity multipliers, regardless of who bought the devices," relates the Accenture report.

For the high-performance IT research, Accenture gathered input from more than 1,700 chief information officers in 45 countries.

As part of empowering employees, high performers enable employees to handle their own IT support needs--everything from password reset to web-based tools for crowd-sourcing new product concepts, the report notes.

For high-performers, a full 71 percent of employee interactions are completely self-service; that number shrinks to 36 percent for other enterprises. For high-performers, 29 percent of customer interactions and 31 percent of supplier interactions are completely self-service, compared with 21 percent and 24 percent, respectively, for other enterprises.

Bill VanCuren, CIO of NCR Corp., comments: "What that means is that only the really complex problems now come to IT. We're not just a bunch of SQL programmers doing relational databases. The complex data analytics and big data problems come back to IT. The tool kit has become much more complex; it's more diverse. We have a lot of ways to solve problems today that we did not have before."

In its high-performance IT research, Accenture covers a range of steps that high performers take to stand out from the crowd. "High performers are using digital tools and systems to push for excellence across all three dimensions of high performance IT: IT innovation, IT agility and IT execution," the report observes.

For more:
- check out the Accenture report (.pdf)

Related Articles:
Enterprise mobility fuels demand for mobile app development platform vendors
BYOD is just warming up

Read more about: IT support, high-performaning IT organizations
back to top


3. BYOD stresses enterprise Wi-Fi networks, spurs gear deployment

By Fred Donovan Comment | Forward | Twitter | Facebook | LinkedIn

The BYOD trend is putting a strain on Wi-Fi networks and spurring demand for wireless local area network (WLAN) equipment deployments, according to the latest stats from Infonetics Research.

Almost two-third of enterprises surveyed by Infonetics allow their employees to bring their own devices into the enterprise, up from one-half in the previous year's survey. For the 2013 survey, the research firm polled purchase-decision makers at 162 medium-sized and large businesses in North America about their plans for delivering wireless connectivity in the workplace over the next two years.

"Thanks to the explosion in wireless devices and demand for network access, WLAN is already a $4 billion annual market, and our latest survey shows there's no end in sight to the great big wireless LAN build-out. Organizations tell us they're planning major increases in wireless coverage, growing their access points by more than 20 percent by 2015 to support wireless devices, user mobility and guest access," explains Matthias Machowinski, directing analyst for enterprise networks and video at Infonetics Research.

Companies are deploying new Wi-Fi technology, such as 802.11ac products, but also upgrading existing 802.11n equipment.

Enterprises surveyed by Infonetics have an average of 9,000 devices on their networks, with that number expected to increase 20 percent by 2015. Mobile devices are forecast to make up half of those devices by then.

According to Infonetics data, Cisco controlled 52.9 percent of the enterprise Wi-Fi gear market in the first quarter of this year. Aruba Networks was in a distant second place with a 10.5 percent market share, followed by HP with 5.4 percent of the market.

For more:
- see Infonetics WLAN survey data
- check out Infonetics Wi-Fi vendor stats

Related Articles:
Cisco widens leads over Aruba in enterprise Wi-Fi market
Infonetics: Cisco maintains lead over Ruckus, Ericsson in carrier Wi-Fi market

Read more about: BYOD, Cisco
back to top


Also Noted

This week's sponsor is Intel and Atos.

Webinar: Next Generation Data Center - Innovation, Transformation, and Management
Now Available On-Demand

Engage directly with Atos and Intel team members and see a live demonstration in unique approaches to innovation and transformation within the Data Center. Register to watch Now!


TODAY'S NEWS SCAN...

>> Oracle acquires MAM startup Bitzer Mobile

Oracle has acquired Bitzer Mobile, a provider of mobile application management products, for an undisclosed consideration. Bitzer offers a container that enables enterprise clients to securely run native and HTML5 apps on a range of mobile devices. "Together, Oracle and Bitzer Mobile are expected to provide organizations with a comprehensive solution to further manage security of enterprise information held on personal and company-owned mobile devices," Oracle says on its website. Earlier in the month, Bitzer announced that it raised $4.75 million in its first round of funding. Read more on Oracle's acquisition of Bitzer.

[More on Oracle: Enterprise mobility fuels demand for mobile app development platform vendors | Gartner: Microsoft, Oracle lag in mobile business intelligence offerings]

>> Most UK firms are not BYOD ready

A majority of U.K. firms say that their networks are not BYOD ready, and only one-third believe they have enough bandwidth to cover current and future requirements, according to a survey of 250 U.K. IT managers by TalkTalk Business. Almost two-thirds say they have experienced business disruption or compromise due to bandwidth restrictions, and one-third are not confident that their current network can support their voice traffic needs, according to an Information Age report on the survey results. A full 72 percent say they received complaints about poor app performance or VoIP quality, the survey found. Read more on the TalkTalk Business survey.

[More on BYOD in the U.K.: UK government provides advice to CIOs grappling with BYOD | UK firms choose 'CYOD' over 'BYOD']

>> Ford revs up mobile app development program

Ford is moving ahead with an aggressive program to encourage mobile app developers to work on new applications for the Microsoft Sync platform that the auto makers uses in its vehicles, according to a report by eWeek. Through its Ford Developer Program, the auto maker is encouraging developers to work on projects that range from a new button for a touch-control dashboard app to a new app to search for an open parking space.  Developers use Sync connectivity and Ford's application programming interface and software development kit. Read more on Ford's Developer Program.

[More on Ford: TechNavio: Telematics market to grow at a 22.7% CAGR through 2016 | Splunk teams up with Ford]

>> What's up with Icahn and Apple?

Billionaire investor Carl Icahn has increased his investment in Apple to 4.7 million shares or $2.5 billion, up from $1.9 billion at the end of September, according to a report by AllThingsD. Icahn recently tried but failed to thwart the effort by Michael Dell to take the company he founded private. Icahn has expressed his displeasure at the way Apple CEO Tim Cook is running the firm, particularly Cook's reluctance to more than double the firm's share buyback program from its current $60 billion. We'll see what Icahn has in mind with increased investment. Read more on Icahn's Apple plans.

[More on Icahn: Icahn's Apple meddling | Spotlight: Icahn could be ready to walk away from Dell bid]

>> Foxconn factory shuts down iPhone 5C production

Apple supplier Foxconn is reportedly shutting down production of the lower cost iPhone 5C at its factory in Zhengzhou in northern China in order to focus on production of the high-end iPhone 5S, according to a report by DigiTimes cited by AppleInsider. Foxconn only handles about 30 percent of the iPhone 5C production, with Pegatron Technology handling the rest. Earlier in the month, Pegatron announced disappointing profits, reportedly because of cuts to iPhone 5C orders . Read more on the Foxconn plans.

[More on the iPhone 5C: Kantar: Apple fueled 40% of U.S. smartphone sales ahead of iPhone 5s, 5c launch | Apple makes repairs]

Robots go mobile:
>> Orbotix taps Google Apps to bring robots to life (Google)

Is 5X battery boost near?:
>> U.S. quest for 5X battery boost seeks game-changing tech (Computerworld)

Apple's iOS App Store on top:
>> Apple's iOS App Store still handily trumps Google & Amazon offerings in new analysis (AppleInsider)

Is BYOD ruining your life?:
>> How not to let BYOD ruin your life (CITEworld)

Privacy ignorance is no excuse:
>> People's ignorance of online privacy puts employers at risk (CSO Magazine)

Social Scan:

50% of workers use their #smartphone instead of landline, straining #networks: http://t.co/3RHRLvdVXn via @eWEEKNews @eWeek_Michelle

The risk of not doing social is actually much bigger than the risk of doing it. – @dhinchcliffe #socbiz http://t.co/xrvazrQpJn

Solar-panel sunglasses recharge your iPhone in the evening - http://t.co/cac8tGqA7T

And Finally… Lincoln goes viral (Wired)

Webinars

> 8 Ways to Unify Your Web, Mobile & Apps Strategy- November 20, 2013, 2 pm ET/ 11 am PT

Companies can now unify their web, mobile and apps strategy with a single platform approach, saving time and money, and freeing up resources to focus on delivering incremental business value. Tune in to this webinar to see real life examples by Moovweb. Register here today.

> CIO/CMO Extreme Collaboration: Mobile App Edition - Thursday, November 21, 2pm ET / 11am PT

Customers and employees alike are more mobile than ever, which means CIOs and CMOs have to partner more effectively than ever to deliver the goods. Join us as we discuss making mobile apps a critical point of teamwork between IT and marketing. Register Today!

> Building a Strategic Road Map for Enterprise Mobility - December 11, 2pm ET / 11am PT

This FierceMobileIT webinar will explore how to use external subject matter experts to build a customized mobility strategy based on business priorities; simplify complexity and gain control through cross-platform solutions that align with existing information systems; develop standards-based mobile applications and processes that ensure seamless mobile transition and growth. Register Today!

> Next Generation Data Center - Innovation, Transformation, and Management - Now Available On-Demand!

Engage directly with Atos and Intel team members and see a live demonstration in unique approaches to innovation and transformation within the Data Center. Register to watch now!

Marketplace

> Whitepaper: Enterprise Job Scheduling: 12 Things You Should Know

What should you consider before automating your job scheduling system? Download White Paper Today.

> IT Made Easy with ManageEngine ServiceDesk Plus

ManageEngine ServiceDesk Plus is an ITIL-Ready Help Desk Software with integrated asset and project management. True to our tagline, "IT Made Easy", ServiceDesk Plus wins hands down when it comes to ease of use, out of the box settings and integration. Visit http://www.servicedeskplus.com/ to check out the list of features that come at just $995 and to download a 30-Day Free Trial!

> Whitepaper: DIY SharePoint - 6 Reasons to Enable Self-Service SharePoint Customization

More companies find that "citizen developers" – end users, not IT developers - are creating business applications. In this white paper, discover six ways to embrace citizen development in a way that minimizes risk and maximizes SharePoint. Learn More

> Whitepaper: Avoiding the top three challenges of custom-coded SharePoint applications

In this white paper, learn about the challenges of custom coded SharePoint applications. Then, see how you can overcome them to create the SharePoint sites you want. Download Today!

> Whitepaper: OTA Updating Simplified - Using SaaS to Update Android Devices

As Android becomes more and more popular and the preferred OS choice for many other non-mobile devices, like smart watches, ruggedized devices, cameras, TVs and others, having an over-the-air (OTA) update capability has become essential to every new Android manufacturer. Download this white paper today to learn more.

> Whitepaper: Your Guide to iOS 7

he new version of iOS marks a notable improvement over the last in terms of aesthetics and features, and this guide should get you up to speed with the changes and additions to what Apple calls the world’s most powerful mobile OS. Download today!

> Whitepaper: Next-generation Network Security

Learn how Intel and McAfee are helping enterprises counter security threats. Download Now!

> Whitepaper: Customer Experience for Service

This Executive Brief explores the role of service and support in creating great customer experiences, the service goals market leaders use related to customer experience and the Oracle approach for empowering new service experiences. Download today!

> Whitepaper: Know What Customers Want Before They Do

Today's consumers only want interactions that are relevant, personalized, and based on a customer’s situation and preferences. Discover the framework for creating effective NBOs for B2C and B2B companies. Download today.

> Whitepaper: The Future of Sales Performance Management

Download this document to learn new technologies and tools that are improving sales managers' ability to measure and enhance the performance of their sales teams. Download today.

> eBook: Making BYOD Work

Chief information officers and enterprise IT departments face a myriad of challenges when allowing employees to bring their own mobile devices into the work environment. FierceMobileIT explores how BYOD can work best for your enterprise to solve these problems. Download for free today.

> Whitepaper: Best Practices for Migrating to SharePoint 2013

SharePoint 2013 has the industry buzzing. It’s powerful and a vast improvement over previous versions. In this white paper, get best practice to ensure your migration to SharePoint 2013 is quick, easy and cost effective. Download Today!

> Whitepaper: How to Transform Your Mobile Customer Care Strategy

It's all about the SCI: the smart, connected interaction. It's not easy - mobility increases the number of variables going into each interaction, requires the preservation of context across channels, but it allows each interaction to naturally evolve. Read this document to learn how to go SCI and naturally connect with your customers.

> eBook: eBook | Content for the Mobile and Social Workforce

The smartphone and the cloud and the ability to share changed the whole notion of content management. In this eBook, FierceContentManagement looks at these shifts and make sense of them in the broader IT context as well as their influence on content management. Download for free today.

> eBook: Convergence of Mobility and the Cloud

As BYOD and cloud computing gain traction in the enterprise, CIOs need to understand how the two relate and how they can be leveraged to improve enterprise services while maintaining security. This eBook discusses the challenges CIOs and IT managers face in the application of cloud synchronization, and what to keep in mind while keeping up with the trend of applying cloud-based storage in companies' day-to-day work. Download it today.

> Whitepaper: Encryption of Cloud Data

Online data security is a complex, rapidly evolving landscape, requiring layered protections. Encryption is one tool in a comprehensive defense-in-depth strategy to mitigate the risk of accidental and intentional data breaches.
Download today to learn how to protect your data.


©2013 FierceMarkets This email was sent to ignoble.experiment@arconati.us as part of the FierceMobileIT email list which is administered by FierceMarkets, 1900 L Street NW, Suite 400, Washington, DC 20036, (202) 628-8778. Refer FierceMobileIT to a Colleague

Contact Us

Editor: Fred Donovan. VP sales and business development: Jack Fordi. Publisher: Ron Lichtinger.

Advertise

General advertising: Jack Fordi. Request a media kit.

Email Management

Manage your subscription

Change your email address

Unsubscribe from FierceMobileIT

No comments:

Post a Comment

Keep a civil tongue.

Label Cloud

Technology (1464) News (793) Military (646) Microsoft (542) Business (487) Software (394) Developer (382) Music (360) Books (357) Audio (316) Government (308) Security (300) Love (262) Apple (242) Storage (236) Dungeons and Dragons (228) Funny (209) Google (194) Cooking (187) Yahoo (186) Mobile (179) Adobe (177) Wishlist (159) AMD (155) Education (151) Drugs (145) Astrology (139) Local (137) Art (134) Investing (127) Shopping (124) Hardware (120) Movies (119) Sports (109) Neatorama (94) Blogger (93) Christian (67) Mozilla (61) Dictionary (59) Science (59) Entertainment (50) Jewelry (50) Pharmacy (50) Weather (48) Video Games (44) Television (36) VoIP (25) meta (23) Holidays (14)

Popular Posts