Feeds

Mobile Instant Messaging? Not mentioned in Microsoft study...

Why so shy?

Security for virtualized datacentres

Microsoft has a software platform called Windows Mobile, which includes - free - an Instant Messenger client for MSN or Windows messenger. Microsoft has a research study out on IM. Mobile? Doesn't get a mention. Why so shy?

This research was conducted by Vanson Bourne amongst 800 Information Workers in the UK, on behalf of Microsoft's Unified Communications Group - and it suggests, unsurprisingly, that more business IT strategies should include IM. But the advantages of IM on a mobile platform seem to have eluded Vanson Bourne.

"Business and IT decision makers need to seriously consider incorporating IM technology into their IT strategy," said the official release, quoting Neil Laver, Head of Sales and Marketing, Unified Communications Group at Microsoft UK. Official sanction, he says, would "ensure their enterprises, irrespective of size, benefit from the increased productivity it brings," he concluded. "Corporate IM tools allow businesses to do this in a secure and manageable way ensuring their employees using it adhere to company policy compliance."

The research shows that the stable door is open, and the horse has bolted. Business use is flourishing: "Instant Messaging technology has become a vital communication and productivity tool for Information Workers across businesses in the UK with 50 per cent of employees using IM at work." But the software is not official; individual workers are installing it on their own PCs.

"People are primarily using IM to communicate with colleagues with 58 per cent using IM to communicate with colleagues in the same office and as many as 74 per cent communicating with their colleagues based in other offices," opines the writer of the report, adding: "An overwhelming 70 per cent of IM users believe the technology facilitates quick decision making therefore saving them, and their employers, time which is undoubtedly a key driver for its use across UK businesses of all sizes today."

Is it insecure? You bet it is: "Corporate IM tools allow businesses to do this in a secure and manageable way" - that's another way of saying that without the use of these corporate tools, these are consumer applications, written in the innocent days before Sarbanes-Oxley, and with no audit trail.

Is this also true of the IM client on a Windows mobile phone? Well, yes. Is that why the report fails to mention it? Well, duh...

Copyright © Newswireless.net

Intelligent flash storage arrays

More from The Register

next story
FCC, Google cast eye over millimetre wireless
The smaller the wave, the bigger 5G's chances of success
It's even GRIMMER up North after MEGA SKY BROADBAND OUTAGE
By 'eck! Eccles cake production thrown into jeopardy
Mobile coverage on trains really is pants
You thought it was just *insert your provider here*, but now we have numbers
Don't mess with Texas ('cos it's getting Google Fiber and you're not)
A bit late, but company says 1Gbps Austin network almost ready to compete with AT&T
HBO shocks US pay TV world: We're down with OTT. Netflix says, 'Gee'
This affects every broadcaster, every cable guy
prev story

Whitepapers

Forging a new future with identity relationship management
Learn about ForgeRock's next generation IRM platform and how it is designed to empower CEOS's and enterprises to engage with consumers.
Why and how to choose the right cloud vendor
The benefits of cloud-based storage in your processes. Eliminate onsite, disk-based backup and archiving in favor of cloud-based data protection.
Three 1TB solid state scorchers up for grabs
Big SSDs can be expensive but think big and think free because you could be the lucky winner of one of three 1TB Samsung SSD 840 EVO drives that we’re giving away worth over £300 apiece.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.