• The Four Hundred
  • Subscribe
  • Media Kit
  • Contributors
  • About Us
  • Contact
Menu
  • The Four Hundred
  • Subscribe
  • Media Kit
  • Contributors
  • About Us
  • Contact
  • Mobile Device Usage Among Enterprises to Jump Dramatically, Juniper Says

    April 7, 2009 Alex Woodie

    Driven by wider access to broadband mobile networks, the use of smart phones, PDAs, and laptops among enterprises will jump by 56 percent over the next five years and become a $284 billion business, according to a new study by Juniper Research. However, several obstacles to widespread adoption remain.

    Driving the move to mobile devices among enterprises will be the fast 3G mobile networks that the major carriers are currently building. Currently, only about 13 percent of devices are connected to this network. However, by 2014, almost 80 percent will be connected, according to Juniper’s report.

    In his whitepaper “Mobilising the Enterprise,” Juniper senior analyst Andrew Kitson gives his take on the current state of enterprise mobility, and makes his forecasts for future growth. As of 2008, laptops accounted for nearly one in five mobile devices, Kitson says, while PDAs accounted for just 2 percent. Smart phones dominate the market, with nearly an 80 percent market share.

    However, over the next five years, PDAs will disappear as a category and be subsumed into the “smart phone” category. Laptops will remain an integral component of the enterprise mobile space, according to Kitson, likely owing to the challenges presented by smart phones’ small screens. Smart phones will continue to account for between 70 and 80 percent of enterprise mobile devices, he says.

    A small screen and form factor was one of three challenges to widespread adoption of mobile devices in the enterprise, according to Juniper. The others include problems in adapting applications for mobiles while not compromising on usability, and, of course, security.

    To ensure security, enterprises must take total control over the devices their employees use, Kitson says. “To do this, they need to limit the types and numbers of devices connecting to their networks, deactivate or restrict devices that are lost or stolen, minimizing functionality and access, and employing user authentication, content encryption, and other security solutions as appropriate.”



                         Post this story to del.icio.us
                   Post this story to Digg
        Post this story to Slashdot

    Share this:

    • Reddit
    • Facebook
    • LinkedIn
    • Twitter
    • Email

    Tags:

    Sponsored by
    Maxava

    MAXAVA HA vs Assure MIMIX HA

    Price • Performance

    Support • No Compromise

    Join the biggest names & switch to Maxava HA today.

    Get Pricing Online

    Call us on 888 400 1541 or VISIT maxava.com

    Share this:

    • Reddit
    • Facebook
    • LinkedIn
    • Twitter
    • Email

    Sponsored Links

    ARCAD Software:  FREE Webinar - Managing ILE and SQL Development, April 22
    Fujitsu PROGRESSION:  RPG to .NET. . . Smart move made simple
    COMMON:  Join us at the 2009 annual meeting and expo, April 26-30, Reno, Nevada

    IT Jungle Store Top Book Picks

    Easy Steps to Internet Programming for AS/400, iSeries, and System i: List Price, $49.95
    The iSeries Express Web Implementer's Guide: List Price, $49.95
    The System i RPG & RPG IV Tutorial and Lab Exercises: List Price, $59.95
    The System i Pocket RPG & RPG IV Guide: List Price, $69.95
    The iSeries Pocket Database Guide: List Price, $59.00
    The iSeries Pocket SQL Guide: List Price, $59.00
    The iSeries Pocket Query Guide: List Price, $49.00
    The iSeries Pocket WebFacing Primer: List Price, $39.00
    Migrating to WebSphere Express for iSeries: List Price, $49.00
    Getting Started With WebSphere Development Studio Client for iSeries: List Price, $89.00
    Getting Started with WebSphere Express for iSeries: List Price, $49.00
    Can the AS/400 Survive IBM?: List Price, $49.00
    Chip Wars: List Price, $29.95

    IBM Delays Small Form Factor Disks for the Power 550 Power vs. Nehalem: Time to Double Up and Double Down

    Leave a Reply Cancel reply

Volume 9, Number 14 -- April 7, 2009
THIS ISSUE SPONSORED BY:

ProData Computer Services
Bytware
Maximum Availability
COMMON
RJS Software Systems

Table of Contents

  • ACOM Adds ‘Sticky Note’ Functionality to Content Manager
  • Lotus Collaboration in the Clouds
  • Safestone Gives Away Free PCI Assessments to i OS Customers
  • UC4 Addresses IT Complexity with Enhanced Job Scheduler
  • CGC Delivers Hosted HA with Avnet and iCluster
  • IBM Readies Unified Communications Integration
  • CCSS Enhances System i Disk Monitoring with Utility
  • Pennsylvania Hospitals Tap AHS for Medical Billing Solution
  • SpoolFlex Gets USPS Intelligent Barcode Support
  • Mobile Device Usage Among Enterprises to Jump Dramatically, Juniper Says

Content archive

  • The Four Hundred
  • Four Hundred Stuff
  • Four Hundred Guru

Recent Posts

  • Query Supervisor Gives Database Engineers New Power
  • IBM Unveils New and Improved IBM i Services
  • 3 Takeaways from the 2021 PowerTech Security Report
  • Four Hundred Monitor, April 14
  • IBM i PTF Guide, Volume 23, Number 15
  • Big Blue Unveils Spring 2021 IBM i Technology Refreshes
  • Thoroughly Modern: Innovative And Realistic Approaches To IBM i Modernization
  • Guru: Web Services, DATA-INTO and DATA-GEN, Part 2
  • Back To The Future With A New IBM i Logo
  • IBM i PTF Guide, Volume 23, Number 14

Subscribe

To get news from IT Jungle sent to your inbox every week, subscribe to our newsletter.

Pages

  • About Us
  • Contact
  • Contributors
  • Four Hundred Monitor
  • IBM i PTF Guide
  • Media Kit
  • Subscribe

Search

Copyright © 2021 IT Jungle

loading Cancel
Post was not sent - check your email addresses!
Email check failed, please try again
Sorry, your blog cannot share posts by email.