Technology Brief/Technology Currents:
Technology Brief is our periodic newsletter and Technology Currents is our periodic report
analyzing important new technologies, changing market conditions, strategic directions, user
requirements and critical challenges in creating, deploying and implementing technology
solutions. To read selected issues , or to become a subscriber, please click here

Research Reports/White Papers

The Payback of Hardware-Enabled Endpoint Security
“This report will discuss the implications of deploying the latest generation of enterprise-class endpoint processors and how they significantly increase the security and privacy of enterprise environments…. The end goal of this report is to provide organizations with a path to being more secure while also reducing cost and potential security threats and liabilities…..”

Powering the 5G Network: The Platform Matters!
“This report will explore some of the issues involved in moving to a 5G stand alone environment, the need for an open and expansive ecosystem, and highlight some of the needed functions and platforms that are powering this transition……”

oneAPI: Software Abstraction for a Heterogeneous Computing World
“In this rapidly evolving world of new computing accelerators, moving to a cross-architecture model for application development can
save an organization more than 5 months and $300,000 each time a performance sensitive application is moved to a new
computing platform. This whitepaper will discuss what is needed for enterprises to move towards a new cross-architecture model,
how it will benefit organizations in cost and time savings, and oneAPI’s open approach to achieving this goal.”

It’s Not How Many Cores You Have, It’s What You Do With Them That Counts
This whitepaper will serve as guidance to understanding the rationale behind selecting multi-core systems, by analyzing the
various attributes that affect the operational efficiency and overall performance of current multi-core chips….”

The Business Benefits of Enabling the Modern Workspace
“Organizations must move to a Modern Workspace approach to enable a better user experience and improved productivity
engagement. This report will evaluate some of the challenges and benefits of maximizing productivity for workers, as well as
challenges faced by IT in providing optimized services. It will provide guidance on the potential costs associated with not
adequately providing the necessary tools and services to meet those challenges, as well as potential cost benefits….”

Unified Endpoint Management in the Cloud: Why it’s critical to the success of your company
“This report will analyze why moving to a holistic UEM approach for enterprises is required if a company wishes to remain
competitive longer term. Further, it will examine the cost tradeoffs of deploying a UEM solution in an internal data center versus
implementing a cloud-based SaaS solution…”

Your PC has an Identity Crisis: Saving the Cost of a Hack and Other Benefits of Enhanced
“PCs, including business clients, get hacked at an alarming rate. And most infiltrations result in significant data breach exposures
costing organizations potentially massive expense. But the majority of these hacks can be eliminated by dealing with the PC’s
“Identity Crisis”. And that’s not the only benefit. Updating to eliminate this “Identity Crisis” can result in a typical return on
investment (ROI) of up to 536%…..!.”

Leaving Productivity Behind Why All Business Clients Should Have a Cellular Connection
“We estimate that only 5%-10% of business clients currently deployed have enabled a wireless broadband modem connected to a
wireless data service. Often, this is because companies assume that the added expense of modeminstalled equipment, and the
recurring monthly service cost are not a good investment. However, our analysis shows that companies can achieve as much as
$8400 productivity benefit per employee per year by enabling wireless broadband connectivity.”

Opportunity Lost: The True Cost of Not Providing Mobile Business Apps
“Most organizations have a significant time lag between when mobile devices are available and when they are enabled for use
with business productivity apps… This gap presents a real lost opportunity for both users and ultimately for the organization… A
group of 100 users will have a lost opportunity cost of between $64,615 and $138,462 for delaying the deployment of any needed
mobile app by 14-20 weeks. And this amount is for a single app to a single group of users. Most organizations have many required
apps needing to be deployed, so this number can easily grow by 10-25 times!….”

Android in the Business Environment: Is It Safe?
“All mobile devices have inherent security risks associated with their use, no matter who made the device or what Operating System
(OS) powers it. With the massive growth of Android in the enterprise over the past couple of years, it’s time to see if there is more
that can be done to make it secure. Companies can create a strategy to minimize any risk Android may pose.”

Enterprise Apps at the Speed of Mobile!
“Mobility has brought a new mode of operation to most organizations, empowering workers to achieve productivity improvements
that more than compensate for any costs associated with deployment and support of the mobile workforce. Yet despite the ease of
acquisition and deployment of mobile devices, most organizations still struggle with mobile app development and deployment…The
age of mobility demands a totally new focus around worker enablement. Devices are extraordinary easy to obtain and utilize by
mobile workers. But the world of apps has lagged behind…. Successful organizations must find a way to establish a process where
immediate LOB requirements can be converted into useful mobile apps in a short period of time and with “good enough”
functionality to maximally empower mobile users…”

Moving Beyond Your Mobile Blind Spots
“The transition to Mobility has enabled workers to stay connected to corporate systems through a vast array of device types and
wireless connectivity options while increasing productivity and becoming more customer-centric…The increasing use of mobile
devices and apps, often selected by the end user without IT involvement, has created a mobile security blind spot threatening how
organizations protect their most valuable assets – their data.”

What’s Different About Mobile Security?
“Within the next 1-2 years, we expect the majority of worker interactions with corporate back office systems to take place over mobile
devices… Most organizations have done an inadequate job of preparing for the security challenges associated with this paradigm
shift…This report will examine the security implications and issues… and will suggest some solutions to the organizational
imperative to support a wide array of mobile devices while maintaining a strong security and compliance posture”

PCs in Small Business: Why Older is Not Better
“Smaller businesses often keep their PCs in production for many years past their prime, replacing them only when they fail. Indeed,
the notion that PC replacements are a major headache and expensive is quite common and many companies simply accept this as
fact. Yet much of this is legacy thinking. Many of the assumed challenges to upgrading to a new PC have largely been mitigated by
modern machines and process improvements. The ability to enable workers to get their jobs done more quickly, in a more secure
fashion, and with a substantially reduced burden on support services makes deploying newer machines advantageous for any

Intel vPro: Enhancing End User Productivity
“Many enterprise-class systems ship with vPro enabled chips. We believe that the new version of Intel vPro on 4th generation Core,
enhanced by a focus on end user productivity and the addition of business-class Atom support, will significantly increase its
acceptance and deployment… Enterprises should evaluate how the new functionality of vPro fits into their requirements and
enhances their end-user experience…”

Picking the Right Enterprise Tablet – Things to Consider
“The incredible growth of mobile workers has forced many enterprises to consider how to best empower their employees to be
connected and productive while in the field. Most have deployed applications to smartphones over the past several years.
Organizations are now enabling users with more feature and information rich tablets. This paper will focus on what enterprises
should consider when evaluating and deploying tablets to their mobile workforce”

Delivering on the Promise of Mobile ROI
The “Enterprization” of Mobile Apps
A Hueristic Approach to Mobile Security
Empowering Mobile Workers: Choosing the Right Device
IM and Presence: Achieving Mission Critical Status in the Enterprise
10 Steps to Mobile Security
Moving Beyond Mobile Data: Benefits of a Unified Communications Approach
Compliance in the Mobile Enterprise
Handhelds: In Search of an Enterprise Class Device
Managing Mobility in the Enterprise
The Mobile Imperative