Technology Brief/Technology Currents:
Technology Brief is our periodic newsletter and Technology Currents is our periodic report
analyzing important new technologies, changing market conditions, strategic directions, user
requirements and critical challenges in creating, deploying and implementing technology
solutions. To read selected issues , or to become a subscriber, please click here

Research Reports/White Papers

The Payback of Hardware-Enabled Endpoint Security
“This report will discuss the implications of deploying the latest generation of enterprise-class endpoint processors and how they significantly increase the security and privacy of enterprise environments…. The end goal of this report is to provide organizations with a path to being more secure while also reducing cost and potential security threats and liabilities…..”

Powering the 5G Network: The Platform Matters!
“This report will explore some of the issues involved in moving to a 5G stand alone environment, the need for an open and expansive ecosystem, and highlight some of the needed functions and platforms that are powering this transition……”

oneAPI: Software Abstraction for a Heterogeneous Computing World
“In this rapidly evolving world of new computing accelerators, moving to a cross-architecture model for application development can save an organization more than 5 months and $300,000 each time a performance sensitive application is moved to a new computing platform. This whitepaper will discuss what is needed for enterprises to move towards a new cross-architecture model, how it will benefit organizations in cost and time savings, and oneAPI’s open approach to achieving this goal.”

It’s Not How Many Cores You Have, It’s What You Do With Them That Counts
This whitepaper will serve as guidance to understanding the rationale behind selecting multi-core systems, by analyzing the various attributes that affect the operational efficiency and overall performance of current multi-core chips….”

The Business Benefits of Enabling the Modern Workspace
“Organizations must move to a Modern Workspace approach to enable a better user experience and improved productivity engagement. This report will evaluate some of the challenges and benefits of maximizing productivity for workers, as well as challenges faced by IT in providing optimized services. It will provide guidance on the potential costs associated with not adequately providing the necessary tools and services to meet those challenges, as well as potential cost benefits….”

Unified Endpoint Management in the Cloud: Why it’s critical to the success of your company
“This report will analyze why moving to a holistic UEM approach for enterprises is required if a company wishes to remain competitive longer term. Further, it will examine the cost tradeoffs of deploying a UEM solution in an internal data center versus implementing a cloud-based SaaS solution…”

Your PC has an Identity Crisis: Saving the Cost of a Hack and Other Benefits of Enhanced
“PCs, including business clients, get hacked at an alarming rate. And most infiltrations result in significant data breach exposures costing organizations potentially massive expense. But the majority of these hacks can be eliminated by dealing with the PC’s “Identity Crisis”. And that’s not the only benefit. Updating to eliminate this “Identity Crisis” can result in a typical return on investment (ROI) of up to 536%…..!.”

Leaving Productivity Behind Why All Business Clients Should Have a Cellular Connection
“We estimate that only 5%-10% of business clients currently deployed have enabled a wireless broadband modem connected to a wireless data service. Often, this is because companies assume that the added expense of modem installed equipment, and the recurring monthly service cost are not a good investment. However, our analysis shows that companies can achieve as much as $8400 productivity benefit per employee per year by enabling wireless broadband connectivity.”

Opportunity Lost: The True Cost of Not Providing Mobile Business Apps
“Most organizations have a significant time lag between when mobile devices are available and when they are enabled for use with business productivity apps… This gap presents a real lost opportunity for both users and ultimately for the organization… A group of 100 users will have a lost opportunity cost of between $64,615 and $138,462 for delaying the deployment of any needed mobile app by 14-20 weeks. And this amount is for a single app to a single group of users. Most organizations have many required apps needing to be deployed, so this number can easily grow by 10-25 times!….”

Android in the Business Environment: Is It Safe?
“All mobile devices have inherent security risks associated with their use, no matter who made the device or what Operating System (OS) powers it. With the massive growth of Android in the enterprise over the past couple of years, it’s time to see if there is more that can be done to make it secure. Companies can create a strategy to minimize any risk Android may pose.”

Enterprise Apps at the Speed of Mobile!
“Mobility has brought a new mode of operation to most organizations, empowering workers to achieve productivity improvements that more than compensate for any costs associated with deployment and support of the mobile workforce. Yet despite the ease of acquisition and deployment of mobile devices, most organizations still struggle with mobile app development and deployment…The age of mobility demands a totally new focus around worker enablement. Devices are extraordinary easy to obtain and utilize by mobile workers. But the world of apps has lagged behind…. Successful organizations must find a way to establish a process where immediate LOB requirements can be converted into useful mobile apps in a short period of time and with “good enough” functionality to maximally empower mobile users…”

Moving Beyond Your Mobile Blind Spots
“The transition to Mobility has enabled workers to stay connected to corporate systems through a vast array of device types and wireless connectivity options while increasing productivity and becoming more customer-centric…The increasing use of mobile devices and apps, often selected by the end user without IT involvement, has created a mobile security blind spot threatening how organizations protect their most valuable assets – their data.”

What’s Different About Mobile Security?
“Within the next 1-2 years, we expect the majority of worker interactions with corporate back office systems to take place over mobile devices… Most organizations have done an inadequate job of preparing for the security challenges associated with this paradigm shift…This report will examine the security implications and issues… and will suggest some solutions to the organizational imperative to support a wide array of mobile devices while maintaining a strong security and compliance posture”

PCs in Small Business: Why Older is Not Better
“Smaller businesses often keep their PCs in production for many years past their prime, replacing them only when they fail. Indeed, the notion that PC replacements are a major headache and expensive is quite common and many companies simply accept this as fact. Yet much of this is legacy thinking. Many of the assumed challenges to upgrading to a new PC have largely been mitigated by modern machines and process improvements. The ability to enable workers to get their jobs done more quickly, in a more secure fashion, and with a substantially reduced burden on support services makes deploying newer machines advantageous for any business…”

Intel vPro: Enhancing End User Productivity
“Many enterprise-class systems ship with vPro enabled chips. We believe that the new version of Intel vPro on 4th generation Core, enhanced by a focus on end user productivity and the addition of business-class Atom support, will significantly increase its acceptance and deployment… Enterprises should evaluate how the new functionality of vPro fits into their requirements and enhances their end-user experience…”

Picking the Right Enterprise Tablet – Things to Consider
“The incredible growth of mobile workers has forced many enterprises to consider how to best empower their employees to be connected and productive while in the field. Most have deployed applications to smartphones over the past several years. Organizations are now enabling users with more feature and information rich tablets. This paper will focus on what enterprises should consider when evaluating and deploying tablets to their mobile workforce”

Delivering on the Promise of Mobile ROI
The “Enterprization” of Mobile Apps
A Hueristic Approach to Mobile Security
Empowering Mobile Workers: Choosing the Right Device
IM and Presence: Achieving Mission Critical Status in the Enterprise
10 Steps to Mobile Security
Moving Beyond Mobile Data: Benefits of a Unified Communications Approach
Compliance in the Mobile Enterprise
Handhelds: In Search of an Enterprise Class Device
Managing Mobility in the Enterprise
The Mobile Imperativ