BYOD Nightmare. Perfect Storm of Mobile Devices and Application in Hospitals
|
|
|
- Leona Anderson
- 10 years ago
- Views:
Transcription
1 BYOD Nightmare Perfect Storm of Mobile Devices and Application in Hospitals Neha Patel, MD MS Director of Mobile Strategy and Applications Director of Quality, Section of Hospital Medicine University of Pennsylvania Health System
2 Agenda Case for mobile strategy in health care Considerations for BYOD in health care Mechanics of UPHS BYOD policy 2
3 3
4 Driving factors Mobile devices and apps are ubiquitous Rising demand from patients, providers, and partners for mobile medicine Vendors accept that mobile is inevitable App creation culture expanding at Penn 4
5 Role for mobile health in hospitals Workaround Culture in healthcare organizations Focus on current, immediate patient care needs rather than on improving system for future patients Fragmented methods of communication and workflow Vicious cycle: bad process workarounds bad process Tethered to desktop Pagers Secured Mobile Paperless handoff Paper handoff Keyhole views Closed loop Real time data 5
6 Adoption not a problem Medview mobile Cureatr Rolodoc (organic) Carelign iantibiogram 6
7 Cureatr: secure messaging Mobile, real-time communication for providers HIPAA-secure, Inter- & intra-organization text messaging Web App ios Android 7
8 Mobile Chart Review & Handoff Tool
9 PERFECT STORM 9
10 Penn Medicine current state (July 2015) The Good 4507 Corporate provided Smartphones Mobile Device Management (MDM) Device Encryption Passcode Required Remote Clean/Wipe when Stolen/Lost The Not so Bad 6843 MDM licenses for Smartphones 1387 MDM licenses for Tablets The Ugly Frontline staff are using personal Smartphones (fellows, residents, nurses) in clinical setting 10
11 Use cases of personal smartphones by clinicians Cellular Medical reference Tactically speaking, bring your own device (BYOD) is an unstoppable user driven force. Texting/Pictures 11
12 Healthcare institutions are addressing mobility 190 organizations (56% AMC) surveyed in respondents 57% indicated that their organization has a mobile technology policy in place Items included in a Mobile Technology Policy Percent Means of securing devices (i.e. storing information on device) 85% Use of personal devices for clinical/work use 7% Management of lost/stolen devices 86% Ability to access data from remote locations 72% Types of applications approved for use 49% Brand/version of device 36% 86% including in future work Source: 2015 HIMSS Mobile Technology Survey. 12
13 Penn Medicine mobile device strategy While we work through the development of a mobile device strategy, there is an immediate need to manage users across the organization who currently use personal devices to access Penn Med business and clinical applications. Develop policy Enable mobile productivity Configuration standards Manage mobile risk Locate lost/stolen devices Device encryption Control Penn Medicine data moved to mobile environment 13
14 Considerations of a Bring Your Own Device policy Privacy and security Financial considerations Stipends Reimbursement User categories Devices and level of support 14
15 Close the gap between perception and reality when it comes to privacy and information protection on mobile devices Balance information protection and privacy interests in your mobility programs Less Privacy Expectations Corporate Provided Joint Ownership Personal Phone More Privacy Expectations 15
16 16
17 Containerization Strengths Enables separation of business and personal applications and data so that a single device Helps an enterprise manage the risk of sensitive data exposure through authentication, encryption, selective wipe and data use controls Provides a common user experience across multiple devices Potential to reduce enterprise support costs for mobility Weaknesses User experience is not the same as native applications on the device UI still has a poor reputation Users do not like the process of switching between the container and the main user screen Do not support the complete separation of phone and texting functions on mobile devices Can provide a single sign on capability across multiple applications 17
18 Privacy and security addressed in Penn Medicine s BYOD policy We bear the burden of establishing our employees privacy expectations when it comes to mobile devices and so offer two options for BYOD users: 1. Current Mobile Device Manager (Default) 2. MDM Containerization (Opt in) Workspace on the device that is defined and managed by IS Device (Personal Apps and Data) App App App App Data Container (Business Apps and Data) App App App Data 18
19 Beware: personal information IS sacred Data that is monitored Who What Data that can be wiped Selective wipe 19
20 Trojan horse strategy for shifting costs to employees? Corporate issued How much will be spent on each device Cost of a fully subsidized data plan Cost of recycling devices every few years Warranty plans IT time and labor in managing the program BYOD Cost of a partially subsidized data plan Eliminates cost of the device purchase Cost of mobile device management 20
21 Models to finance BYOD Employee pays Employees are responsible for all costs related to operating the device they own. Company pays service plan Company reimburses employee Company pays all operational costs associated with the employee owned device. Allows the enterprise to aggregate voice minutes and data usage, which often allows the enterprise to negotiate lower overall rates Requires regular payments to an employee that are designed to offset the cost of service plans and other operational investments May be considered taxable revenue Employee reimburses company Company makes the payments for the service plan and other costs and deducts them from an employees pay 21
22 Financing BYOD from the employer side Stipend: a fixed sum paid periodically (usually monthly) to defray a specific expenses; it is usually added on to an employee s regular pay as a gross up on their paycheck Reimbursement: a payment to the employee for a business expenses, typically after the expenses has been incurred and in response to the employee filing an expense report. Allowance: a fixed amount of money allocated on a periodic basis (often per year) for an employee to spend on specified goods or services related to his or her job. Advantage Disadvantage Fixed Payment (Stipend or Allowance) Low process overhead (just add to paycheck) No action is required on the user s part to initiate the payment Payroll tax implications for the organization Tax implications for the users (potential for income, social security, Medicare, and state taxes) Reimbursement Provides the user a chance to substantiate the expense Avoid taxes on reimbursement Increased process overhead for organization Administrated work for user (required to submit a bill) 22
23 Pay up: Is the free ride over for Corporate BYOD? 23
24 24
25 User categories for UPHS BYOD policy The BYOD program is intended to be voluntary for exempt employees. Incentive to enroll will be access to apps that add value to workflow Eligibility for participation in the BYOD Program will be assessed by the user s department manager. There is a justifiable business requirement for having mobile access to Penn Medicine information The user has elected to use his/her own device Human Resources approval is required before a nonexempt employee may participate in the BYOD Program 25
26 BYOD Initiatives Take on a variety of different approaches We are here INFORMAL Users can access apps and data from their personal device FORMAL BYOD policy, stipend, selfservice web site and support 26
27 Barriers to use of mobile technology Lack of Funding Limited Incentives for Use Immaturity of Vendors Lack of Standards/Interoperability Lack of IT Staff Inadequate Privacy/Security Lack of Staff Expertise Challenges Regarding Wireless Capabilities Lack of Executive Support Clinician Resistance to Technology Doesn't Fit in Workflow 13% 36% 32% 32% 32% 29% 27% 24% 22% 20% 51% N = 231 Source: 2015 HIMSS Mobile Technology Survey 27
28 Penn Medicine mhealth Governance focus Smartphones >> Tablets Corporate-BYOD Policy setting (security, eligibility) Infrastructure & Support Financial implications Mobile Devices Mobile Applications Functionalities Secured messaging Directory/schedules Workflow Resources Software Architecture Native vs Web App 28
29 Apps will change care delivery Courtesy of Glenn Steele, CEO of Geisinger EHR World Today The Future Benefits Data dispersed, not easily found, Useless Copy and Paste Workflows not efficient or userfriendly Minimum analytically supported clinical decision support Data extracted, reorganized and presented in a userfriendly way Workflow facilitated via clinical logic; results of analyses integrated into workflow Decision support based on analysis of data outside and inside of EHR Saves clinician time Improves quality of care Easier and less expensive to employ Difficult to implement changes Easy to program changes Increase coding scores and documentation requirements
30 Considerations of leveraging mobility in healthcare Design for today but need to anticipate tomorrow Develop and invest in existing talent (PI specialists, clinicians, designers) Incremental build start with an idea/prototype and get it into hands of frontline providers Build vs buy decisions Lack of scientific evidence to measure the efficacy of mobile apps Measure what we can, but not what counts Develop evaluation criteria focused on business cases and patient care benefits EMR integration To do or not to do Accept timeline of vendors? Partnership between Clinicians and IS 30
31 Join us 31
3 rd Annual HIMSS Analytics Mobile Survey. February 26, 2014. www.himssanalytics.org
3 rd Annual HIMSS Analytics Mobile Survey February 26, 2014 www.himssanalytics.org 2013 HIMSS Analytics Mobile Technology Survey Final Report February 26, 2014 For the first time in 2011, HIMSS explored
Mobile Device Management for CFAES
Mobile Device Management for CFAES What is Mobile Device Management? As smartphones and other mobile computing devices grow in popularity, management challenges related to device and data security are
What We Do: Simplify Enterprise Mobility
What We Do: Simplify Enterprise Mobility AirWatch by VMware is the global leader in enterprise-grade mobility solutions across every device, every operating system and every mobile deployment. Our scalable
AirWatch Solution Overview
AirWatch Solution Overview Marenza Altieri-Douglas - AirWatch Massimiliano Moschini Brand Specialist Itway 2014 VMware Inc. All rights reserved. Cloud Computing 2 BYOD 3 Device aziendali? 4 From Client/Server
Answers to these questions will determine which mobile device types and operating systems can be allowed to access enterprise data.
Mobility options and landscapes are evolving quickly for the corporate enterprise. Mobile platform providers such as Apple, Google and Microsoft, and leading device hardware vendors are constantly updating
Leveraging Technology to Power Transformation in Today's Healthcare Environment
Leveraging Technology to Power Transformation in Today's Healthcare Environment Healthcare executives, staff and clinicians consistently say they are both surprised and impressed at how new technology
Frequently Asked Questions & Answers: Bring Your Own Device (BYOD) Policy
Frequently Asked Questions & Answers: Bring Your Own Device (BYOD) Policy Converting a Device Whose phones will be wiped on Wednesday, January 30? If you continue to have a company-paid phone, you are
A CIO s Guide To Mobility Management
The Complimentary Reprint Of This Syndicated Research Report Has Been Sponsored By: A CIO s Guide To Mobility Management Written By: Maribel Lopez March 2013 Lopez Research LLC 2269 Chestnut Street #202
BYOD Guidelines A practical guide for implementing a successful BYOD Management program in an organization of any size.
April 2014 BYOD Guidelines A practical guide for implementing a successful BYOD Management program in an organization of any size. Bring your own device (BYOD) refers to the policy of permitting employees
Architecture of Enterprise Mobile Apps
Architecture of Enterprise Mobile Apps November 22, 2011 Sergey Zabaluev http://mobile.ctco.eu Setting the context Business trends need for speed and agility Highly competitive, global marketplace Increasing
Thou Shalt Allow BYOD
Thou Shalt Allow BYOD The rapid proliferation of mobile devices entering the workplace feels like divine intervention to many IT leaders. It s as if a voice boomed down from the mountain ordering all of
BYOD Strategies: Chapter I
Building Bring-Your-Own-Device (BYOD) Strategies This is the first part in a series designed to help organizations develop their BYOD (bring-your-own-device) strategies for personally-owned smartphones
Hands on, field experiences with BYOD. BYOD Seminar
Hands on, field experiences with BYOD. BYOD Seminar Brussel, 25 september 2012 Agenda Challenges RIsks Strategy Before We Begin Thom Schiltmans Deloitte Risk Services Security & Privacy Amstelveen [email protected]
UNIVERSITY OF NEBRASKA - LINCOLN CELLULAR PHONE USEAGE FAQ
UNIVERSITY OF NEBRASKA - LINCOLN CELLULAR PHONE USEAGE FAQ Why has this policy changed? The Department of the Treasury, through its Internal Revenue Service, issued new guidelines that clarified the taxability
How To Write A Mobile Device Policy
BYOD Policy Implementation Guide BYOD Three simple steps to legally secure and manage employee-owned devices within a corporate environment We won t bore you with the typical overview that speaks to the
How To Protect The Agency From Hackers On A Cell Phone Or Tablet Device
PRODUCT DESCRIPTION Product Number: 0.0.0 MOBILE DEVICE MANAGEMENT (MDM) Effective Date: Month 00, 0000 Revision Date: Month 00, 0000 Version: 0.0.0 Product Owner: Product Owner s Name Product Manager:
IT Self Service and BYOD Markku A Suistola
IT Self Service and BYOD Markku A Suistola Principal Presales Consultant Why IT Service need to evolve? David Coyle, research vice president at Gartner, 2010**: "IT self-service is a great concept, enabling
Nandan Banerjee Cogent Infotech Corporation COGENT INFOTECH CORPORATION
Nandan Banerjee Cogent Infotech Corporation Health Care Cost Better, Efficient, Valuable Health care services Stakeholders demand for metrics across clinical, operational and financial disciplines. Overcoming
Best Practices for Implementing an EHR System
Best Practices for Implementing an EHR System Robyn Leone Director, CO-REC [email protected] The Case for EHRs Healthcare spending as a percent of our Gross Domestic Product (GDP) at unprecedented high
How To Manage A Corporate Device Ownership (Byod) On A Corporate Network (For Employees) On An Iphone Or Ipad Or Ipa (For Non-Usenet) On Your Personal Device
Empowering BYOD and Mobile Security in the Enterprise Jeff Baum, APAC Managing Director Growth of Mobile Mobile worker population will reach 1.3 Billion in 2015 Source: IDC Worldwide Mobile Worker Population
perspective The battle between MDM and MAM: Where MAM fills the gap? Abstract - Payal Patel, Jagdish Vasishtha (Jags)
perspective The battle between MDM and MAM: Where MAM fills the gap? - Payal Patel, Jagdish Vasishtha (Jags) Abstract MDM Mobile Device Management and MAM Mobile Application Management are main Enterprise
A Guide to Choosing the Right EMR Software. A Guide to Choosing the Right EMR Software
A Guide to Choosing the Right EMR Software A Guide to Choosing the Right EMR Software Eight Important Benchmarks for Community and Critical Access Hospitals Eight Important Benchmarks for Community and
Compliance Management for Mobile Devices
Compliance Management for Mobile Devices MOBILE SOLUTIONS Agenda Mobile Device Use Today Mobile Device Use Tomorrow Mobile Device Configuration Challenges in the Mobile Device Environment Policy and Configuration
The BYOD of Tomorrow: BYOD 2.0. What is BYOD 1.0? What is BYOD 2.0? 3/27/2014. Cesar Picasso, MBA SOTI Inc. April 02, 2014
The BYOD of Tomorrow: BYOD 2.0 Cesar Picasso, MBA SOTI Inc. April 02, 2014 What is BYOD 1.0? BYOD 1.0 was the first wave of mobile device management that controlled the entire device BYOD 1.0 was inadequate
SOLUTION BRIEF Enterprise Mobility Management. Critical Elements of an Enterprise Mobility Management Suite
SOLUTION BRIEF Enterprise Mobility Management Critical Elements of an Enterprise Mobility Management Suite CA Technologies is unique in delivering Enterprise Mobility Management: the integration of the
Securing Patient Data in Today s Mobilized Healthcare Industry. A Good Technology Whitepaper
Securing Patient Data in Today s Mobilized Healthcare Industry Securing Patient Data in Today s Mobilized Healthcare Industry 866-7-BE-GOOD good.com 2 Contents Executive Summary The Role of Smartphones
Managing Mobility in the BYOD Era:
Managing Mobility in the BYOD Era: New technology requires new thinking Clint Adams Director of Mobile Technology Services [email protected] BYOD is Accelerating 350 million employee-owned devices in
Wireless Communication Device Allowance
Wireless Communication Device Allowance Policy Type: Administrative Responsible Office: Vice President for Finance and Administration Initial Policy Approved: 04/05/2012 Current Revision Approved: 12/11/2014
ENTERPRISE BYOD BEST PRACTICES POLICY AND SECURITY BEST PRACTICES FOR A SOUND ENTERPRISE MOBILITY PROGRAM
ENTERPRISE BYOD BEST PRACTICES 1 ENTERPRISE BYOD BEST PRACTICES POLICY AND SECURITY BEST PRACTICES FOR A SOUND ENTERPRISE MOBILITY PROGRAM BYOD, Bring Your Own Device, is a rapidly growing trend in which
OWA vs. MDM. Once important area to consider is the impact on security and compliance policies by users bringing their own devices (BYOD) to work.
OWA vs. MDM Introduction SmartPhones and tablet devices are becoming a common fixture in the corporate environment. As feature phones are replaced with new devices such as iphone s, ipad s, and Android
Embracing Complete BYOD Security with MDM and NAC
Embracing Complete BYOD Security with MDM and NAC Clint Adams, CISSP, Director, Mobility Solutions Keith Glynn, CISSP, Sr. Technical Solutions Engineer August 22, 2013 Today s Speakers Clint Adams, CISSP
BYOD. and Mobile Device Security. Shirley Erp, CISSP CISA November 28, 2012
BYOD and Mobile Device Security Shirley Erp, CISSP CISA November 28, 2012 Session is currently being recorded, and will be available on our website at http://www.utsystem.edu/compliance/swcacademy.html.
Mobile Device and Application Strategy. Right Technology, Right Design, Right Price
Mobile Device and Application Strategy Right Technology, Right Design, Right Price Agenda 1 Mobility Strategy Methodology 2 3 Mobile Device Strategy Mobile Application Development 4 Q &A Mobility Strategy
BYOD & MOBILE SECURITY: EMPOWERING EMPLOYEES WHLE SECURING CORPORATE ASSETS
BYOD & MOBILE SECURITY: EMPOWERING EMPLOYEES WHLE SECURING CORPORATE ASSETS Damian Bach AirWatch Session ID: SPO-T038 Session Classification: Intermediate Current & Future Mobile Landscape Number of mobile
Yes MAM: How Mobile Device Management Plus Mobile Application Management Protects and Addresses BYOD
STRATEGY ANALYTICS INSIGHT October 2012 Yes MAM: How Mobile Device Management Plus Mobile Application Management Protects and Addresses BYOD By Mark Levitt, Analyst/Director at Strategy Analytics BYOD
Mobile Device Security Is there an app for that?
Mobile Device Security Is there an app for that? Session Objectives. The security risks associated with mobile devices. Current UC policies and guidelines designed to mitigate these risks. An approach
Cisco Mobile Collaboration Management Service
Cisco Mobile Collaboration Management Service Cisco Collaboration Services Business is increasingly taking place on both personal and company-provided smartphones and tablets. As a result, IT leaders are
BYOD How-To Guide. How do I securely deliver my company s applications and data to BYOD?
BYOD How-To Guide How do I securely deliver my company s applications and data to BYOD? Table of Contents Harness the power of BYOD with Mobile Workspaces Why BYOD? Enterprise Mobile Requirements Mobile
Athena Mobile Device Management from Symantec
Athena Mobile Device Management from Symantec Scalable, Secure, and Integrated Device Management for ios and Android Data Sheet: Endpoint Management and Mobility Overview The rapid proliferation of mobile
MDM Mobile Device Management
Page 1 About 1Mobility 1Mobility has successfully established itself as a global company, offering cloud based, internationalized and scalable Enterprise Mobility Management (EMM) solution that monitors,
GOVERNMENT USE OF MOBILE TECHNOLOGY
GOVERNMENT USE OF MOBILE TECHNOLOGY Barriers, Opportunities, and Gap Analysis DECEMBER 2012 Product of the Digital Services Advisory Group and Federal Chief Information Officers Council Contents Introduction...
IL-HITREC P.O. Box 755 Sycamore, IL 60178 Phone 815-753-1136 Fax 815-753-2460 email [email protected] www.ilhitrec.org
IL-HITREC P.O. Box 755 Sycamore, IL 60178 Phone 815-753-1136 Fax 815-753-2460 email [email protected] www.ilhitrec.org INTRODUCTION BENEFITS CHALLENGES WHY NOW? HOW WE HELP SUMMARY Better patient care
Auditing the Security and Management of Smart Devices. ISACA Dallas Meeting February 13, 2014
Securely Manage your devices, applications and data. Deploy your corporate policies on smart devices. Comply with Regulatory Laws. Auditing the Security and Management of Smart Devices ISACA Dallas Meeting
Better patient care and better practice management
www.hitecla.org INTRODUCTION BENEFITS CHALLENGES WHY NOW? INCENTIVES FOR PROVIDERS HOW WE HELP SUMMARY Better patient care and better practice management Using Electronic Health Records in a meaningful
Sichere bewegliche Arbeitskräfte Trend Micro Safe Mobile Workforce
Sichere bewegliche Arbeitskräfte Trend Micro Safe Mobile Workforce Richard Javet, Partner Business Manager Gabriel Kälin, Technical Consultant Trend Micro Schweiz, August 2014 8/27/2014 Copyright 2013
03/06/2014. Bring Your Own Device: A Framework for Audit. Acknowledgement
Bring Your Own Device: A Framework for Audit Emily A Knopp, CPA, CISA Audit Director Angelo State University, Member of Texas Tech University System March 6, 2014 Texas Association of College of University
MINISTRY OF HEALTH ELECTRONIC MEDICAL RECORDS
MINISTRY OF HEALTH ELECTRONIC MEDICAL RECORDS MEXICO CITY November 10, 2010 OVERVIEW Why Electronic Medical Records (EMR)? Planning, Implementation & Challenges Observed Outcomes Valuable Lessons 1 EMR
CHOOSING AN MDM PLATFORM
CHOOSING AN MDM PLATFORM Where to Start the Conversation Whitepaper 2 Choosing an MDM Platform: Where to Start the Conversation There are dozens of MDM options on the market, each claiming to do more than
A Mobile Architecture, Not Just a Mobile App
A Mobile Architecture, Not Just a Mobile App Gary Audin Delphi, Inc. May 2013 CONTENTS 2 Meeting the Mobility Challenge 2 The Impact of BYOD 3 What to Gain with Mobile Communications 4 The Right Mobile
Dell World Software User Forum 2013
Dell World Software User Forum 2013 December 9-12 Austin, TX Introducing Dell Enterprise Mobility Management Brandon Herrin and Jason Moody Agenda Mobility/BYOD needs across the workforce Introducing Dell
#mstrworld. Support BYOD with MicroStrategy Mobile to cut costs and deploy to 1000s
#mstrworld Support BYOD with MicroStrategy Mobile to cut costs and deploy to 1000s!! Ivar Ljungberg Principal Consultant, MicroStrategy Mobile Advisory Team, EMEA BYOD Agenda What is BYOD? Why BYOD? Challenges
The. C s. of Mobile Device. Management
The AB C s of Mobile Device Management Hundreds of models, multiple carriers, OSs from Gingerbread to Jelly Bean Android fragmentation is scary for IT, but it s far from a problem with Mobile Device Management
50 shades of Siebel mobile
50 shades of Siebel mobile Markus Schneeweis ec4u expert consulting AG 1 Agenda Start Part 1 The disruption Part 2 What means mobile? Part 3 Siebel Mobile clash of the generations? Part 4 Our offer 7 Key
Mobile Device Usage and Agreement Policy
Page 1 of 10 1.0 Introduction Mobile Device Usage and Agreement Policy The State of Minnesota provides several electronic tools for employees whose job performance requires or would be enhanced by their
Mobile Device Management in the Systems Management Ecosystem. Katie Wiederholt, Dell Software
Mobile Device Management in the Systems Management Ecosystem Katie Wiederholt, The forces driving change in mobility Agenda The journey to MDM Where do we want to be and mobile security technologies 2
DECISION MAKER S GUIDE: DEVELOPING A BRING YOUR OWN DEVICE STRATEGY
GUIDE DECISION MAKER S GUIDE: DEVELOPING A BRING YOUR OWN DEVICE STRATEGY Giving you a head start in successfully developing and supporting the right BYOD strategy for your organisation TRANSFORMING COMMUNICATIONS
IT Resource Management vs. User Empowerment
Mobile Device Management Buyers Guide IT Resource Management vs. User Empowerment Business leaders and users are embracing mobility and enjoying the flexibility and productivity leading to rising mobile
1. What are the System Requirements for using the MaaS360 for Exchange ActiveSync solution?
MaaS360 FAQs This guide is meant to help answer some of the initial frequently asked questions businesses ask as they try to figure out the who, what, when, why and how of managing their smartphone devices,
Symantec Mobile Management 7.1
Scalable, secure, and integrated device management for healthcare Data Sheet: Industry Perspectives Healthcare Overview The rapid proliferation of mobile devices in the workplace is outpacing that of any
Effectively Managing EHR Projects: Guidelines for Successful Implementation
Phoenix Health Systems Effectively Managing EHR Projects: Guidelines for Successful Implementation Introduction Effectively managing any EHR (Electronic Health Record) implementation can be challenging.
Choosing an MDM Platform
Whitepaper Choosing an MDM Platform Where to Start the Conversation 2 Choosing an MDM Platform: Where to Start the Conversation There are dozens of MDM options on the market, each claiming to do more than
SAP BPC Forecasting: Anywhere, Anytime with Mobile Apps
September 9 11, 2013 Anaheim, California SAP BPC Forecasting: Anywhere, Anytime with Mobile Apps Susan Beyer NTT DATA, Inc. Agenda What is the whole buzz about Mobility? How to expand your BPC footprint
Mobilize your Enterprise in 60 Minutes!
Mobilize your Enterprise in 60 Minutes! Our Team Understands End User Computing Gartner does not endorse any vendor, product or service depicted in our research publications, and does not advise technology
How To Support Bring Your Own Device (Byod)
WHITE PAPER: EXPLOITING THE BUSINESS POTENTIAL OF BYOD........................................ Exploiting the business potential of BYOD (bring your own device) Who should read this paper This paper addresses
Gartner's View on 'Bring Your Own' in Client Computing
G00217298 Gartner's View on 'Bring Your Own' in Client Computing Published: 20 October 2011 Analyst(s): Leif-Olof Wallin Here, we bring together recently published research covering the hot topic of supporting
Simplifying Mobility Management. WhitePaper VERAMARK 2013 TEM SERIES, #3
Simplifying Mobility Management WhitePaper VERAMARK 2013 TEM SERIES, #3 Simplifying Mobility Management New solutions for the wireless world If you don t already have a mobility management strategy in
Managing Mobile Devices in a Device-Agnostic World Finding and Enforcing a Policy That Makes Business Sense
SAP White Paper SAP Partner Organization Mobile Device Management Managing Mobile Devices in a Device-Agnostic World Finding and Enforcing a Policy That Makes Business Sense Table of Content 4 Mobile Device
Enterprise Analytics Strategic Planning
Enterprise Analytics Strategic Planning June 5, 2013 1 "The first question a data driven organization needs to ask itself is not "what do we think?" but rather "what do we know? Big Data: The Management
