For the last follow-up in my series of Five Ways to Reduce Wireless Spend I d like go into more detail about how to Enable User Self Management.
For the third follow-up in my series of Five Ways to Reduce Wireless Spend I d like go into more detail about Developing your Wireless Strategy and Leveraging Tools for Enforcement.
Imagine this: putting away your handheld and your laptop, for an entire day. (Please remember to breathe.)
I recently posted a blog entitled Five Ways to Reduce Wireless Spend. When I wrote it I had to pare down a lot of the content in order to keep it easily digestible. Now I am following up my original blog with more data.
There should be no question that mobility is now a lifestyle. Based on my experience working with different mobility vendors and network providers, and trying to help solve our customers’ mobility problems, I’ve put together five guiding principles to help manage and reduce mobile usage and the associated spend,—which based on how fast this space is evolving will probably be irrelevant by the time you finish reading this.
I admit I need help. I can’t get the Wonder Pets song out of my head. You know, the Nickelodeon show where a baby duck, a guinea pig, and turtle save everything from a mermaid to a cow in outer space. It’s amusing and astounding to me (download it off iTunes—you’ll see). I think about them every day, not so much because my youngest daughter watches the show nonstop, but mostly because my office phone literally … doesn’t… stop… ringing.
The unveiling of the PlayBook from Research in Motion during the BlackBerry Developer conference in San Francisco last week may have some unintended consequences for the Mobile Device Management Community. The announcement will once again shine the light on the fact that RIM has set a very high bar with respect to how enterprise Smartphones are secured and managed. The folks at RIM offer the enterprise a compelling mix of functionality, ease of use and security on their ubiquitous, proprietary system. Contrast that to Apple, Android and even Microsoft that require an army of developers and consultants to bolt together a limited set of capabilities that can only hope to meet the basic requirements and may never reach the flexibility and comprehensiveness of the maligned BES server.
All indications are that Smartphones with Google’s Android-based Mobile Operating Systems are winning the market share battle and are poised to be the overall market leader in a few short months. For any individuals responsible for provisioning, configuring, securing and supporting mobile devices, this trend, coupled with the very strong desire of information workers to use personal devices for work, should be very troubling. The decision to approve the use of Android devices for access to corporate email and collaboration applications is not to be taken lightly.
Prior to taking on a product management role, I had worked for several years in Supply Chain Management, and I had the chance to dig through usage numbers when Mobile Broadband in the enterprise was still in its infancy. And truth is there’s no surprise to me (or most) that carriers are moving to usage-based pricing, or that 3% of AT&T users make up 40% of their network usage. In almost every different level of enterprise data I’ve seen, that’s happened across the board. In certain cases we actually took the extra step to see why there was such a surplus of data for these users, and, of those users, only a very small percent were actually business travelers using the service as providers intended (while streaming some music and videos along the way). The “problem” high usage accounts were users who wanted always-on connectivity at home, corporate test PCs hat were running all the time, the corporate back up in some cases, and always-on connections for IT/Infrastructure teams so they can constantly ping servers, etc. Funny, some people do actually think unlimited means unlimited!