Companies are trying to integrate various mobile broadband cards from different vendors into a seamless mobility solution. Not easy.
With the iPass Open Device Framework, you can integrate your 3G, and now 4G, cards into our Open Mobile Platform quite simply. We’ve integrated over 200 mobile broadband cards, but there are so many more. Don’t feel locked into a technology choice or contract.
I wanted to highlight this tutorial again by Kimi Ushida, Sr. Systems Engineer, that explains how to integrate your cards in six steps.
While we are on the topic of Mobilocracy, you can get more details on the trends of the mobile workforce with our upcoming webcast. One of our frequent blog authors, Chris Witeck, will be hosting:
Mobility is no longer the exception – it’s the rule! During this session, you’ll learn:
The Top Five Mobile Workforce Trends of 2010
Predictions for 2011 and Beyond – including the rise of the mobilocracy
What implications a growing mobile workforce has on the enterprise
How companies can adapt to meet the needs of their mobile workers
Join us this Thursday, January 27, from 10:00 to 10:30am PT. If you can’t join, you can still register and hear the replay at your leisure – while at the office, the coffee shop, or wherever you happen to be connected.
For more enterprise mobility topics and trends, be sure to check out our list of archived webcasts in our Resource Center. Recent topics include:
How time flies! It’s time to start collecting data for our Q1 Mobile Workforce Report and we are calling all mobile workers!
For the chance to win an iPad, we are asking for a few minutes of your time to tell us about how you work and connect. Give us insight on your carrier service and, the apps you use, how you use Wi-Fi for your smartphone and more.
See how easy it is to use iPass to connect to Wi-Fi, avoiding bandwidth download limits, offloading your roaming charges and giving you faster bandwidth.
With iPassConnect on the iPhone 4, you do have to go to the Settings first to turn on Wi-Fi because iPhone does not allow apps to interact with the Wi-Fi radio. But once that’s done, the iPhone does the work.
See a faster and simpler connection experience with Open Mobile on an Android platform. Start the iPass app, and you can start Wi-Fi within the app and then immediately see all networks available. If there is a network that you’ve previously linked to, you will be auto-connected.
No, our headline does not imply your mobile workforce is going rogue and is about to attack HQ. I’m referring to a report out this week from Symantec, which highlights the importance of implementing acceptable usage policies and pre-connection procedures to protect a company’s assets.
“In general, more policy blocks overall are triggered by workers when they are out of the office, indicating rather intuitively that users are more compliant with usage policies when in the office,” said Paul Wood, MessageLabs Intelligence Senior Analyst. “More than one-third of workers that are both remote and desk-based trigger a greater number of policy blocks when they are out of the office perhaps taking the opportunity to visit a greater variety of websites than they would when at their desks.”
When you consider that research firm IDC puts the mobile workforce at one billion strong by the end of 2010, security becomes an even more pressing enterprise concern. As Sean Ryan, IDC research analyst said earlier this year: “Vast opportunities exist for bringing a variety of mobile technologies to the world’s workforce…Underserved mobile workers across all regions stand to benefit from the reach and flexibility offered by mobile solutions…the potential market for mobility solutions is enormous.”
As connectivity and security go hand-in-hand, the more secure your connection, the better it is for IT managers and HR managers to overcome the risks associated with both mobile and desk-based workers triggering a potentially damaging incident. Just look at the news this week about the Twitter security flaw. Arming a mobile workforce with the appropriate compliance and security policies and pre-connect procedures on their mobile devices enables enterprises to make their organizations more secure without having to try and develop written policies that fall on deaf ears.