The Business-Technology Weave

May 12 2011   11:13AM GMT

Access, Access, Access

David Scott David Scott Profile: David Scott

 

Hey, if ya can’t access it, what good is it?  Well, it ain’t no good.  Also, “half-information” isn’t any good either (grammar mode back on).  You have to have comprehensive access to a little thing called “reinforcing content” in assembling the bloom and yield of the enterprise’s best information…  content…  knowledge

 

“Hey, I heard about this great new restaurant…”

 

“Excellent!  We were looking for somewhere new to go tonight!”

 

“Um, I forget the name, and I don’t know where it is…”

 

In accessing any organization’s information assets – its content, data, knowledge-base, etc. – one has to have an efficient access to the broad swath of existing and enhancing content, for a whole “best picture” view (within qualification for access, of course).  Business projections have to be accurate, statistics must be up-to-date (and therefore relevant), choices and new initiatives must not only be surveyed, but accurately splayed for the qualified eyes that have to assess initiatives and options.

 

Within these necessities, forward-thinking employees want to employ ever more devices (most personally owned) in accessing organization data.  Of course, personally owned assets generally do not enjoy the same, rigorous, scrutiny in relation to security – either for the devices’ status, nor for their actual use – a challenge for sure.

 

According to a survey sponsored by Trend Micro, 88% of small and medium sized business (SMB) report that some of their employees are using their own smartphones and tablet PCs for their business purposes.  In the past, we’ve discussed the peril in “friending” one moment, and “businessing” the next (please review if necessary):  Essentially, employees can be social networking one moment, and then accessing organizational resources and conducting business the next.  The danger in sending content to the wrong party is high; further, it is easy to blur business communications with over-familiarity, slang, jokes, etc., in this blurred environment.

 

Ready access to business process and content enhances efficiency.  Not only that, personally owned devices generally don’t cost the organization in terms of overhead:  The employees own their devices, service plans, and update their own assets.  Thus, no TCO (total cost of overhead).  What’s not to like?  Ah… but that pesky security issue.   

 

Part of the answer may lie in a recent report by Quocirca:   A value proposition for IT security.  Check out the free download, which discusses prudent, responsible, and secure ways to integrate the wealth of collateral devices into your enterprise, in making business process ever-more efficient and cost-friendly through ready access.

 

Access, access, access.  Access is King.  Or Queen.  Just make sure it’s not the Joker.

 

NP:  I Thought About You, Miles Davis, jazz24.org   

 

 Comment on this Post

 
There was an error processing your information. Please try again later.
Thanks. We'll let you know when a new response is added.
Send me notifications when other members comment.

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to: