Feeds

Managing the change to connected mobile working

It's worth it

Reducing security risks from open source software

Background

Mobile working is nothing new. Travelling sales people and tradesmen have been with us for as long as anyone can remember and, in industry today, we have many more examples of workers operating outside of a fixed base - consultants on projects, accountants conducting audits, engineers on construction sites, and so on, not to mention managers roving from office to office as they go about their business.

Against this background, it's interesting to consider why everyone is talking so much about mobile working at the moment, given that it's essentially a very old concept. So what is it that's changed to put the mobile working conversation back on the management agenda?

In order to understand this, we need to consider some of the other changes that businesses have gone through over the past couple of decades. To begin with, for example, organisations today are now much more dependent on information technology, and access to IT systems has become either a mandatory part of many job functions or a key enabler of efficiency and effectiveness. Another trend that's had a huge impact is the degree to which everything is becoming connected electronically - people to people, business to business, market to market, etc.

The great thing about these trends is that people sitting at their desks or operating in some other location within the business are now much more plugged into both the immediate work environment and the wider world in which they and their business operate. Sending an email to query an order to a customer in the USA or a supplier in Korea from a desk in the UK is now something people take for granted.

The inclusive approach

Along the way, though, the mobile workforce has often been left out, as use of IT and communications has traditionally been dependent on being in a location that has physical access to the necessary systems. A big part of the discussion going on today, therefore, is not so much to do with implementing mobile working per se, but getting existing mobile workforces properly connected so they can participate in business processes and communications as efficiently and effectively as their office and depot dwelling colleagues. The business logic for doing this is pretty much the same as it has been for automation in general - better business visibility, increased accuracy of information, more effective decision making, shorter process cycle times, and a general lowering of operational costs and risks.

Having said this, providing mobile and remote access capability to solve the mobile worker disconnect also creates new opportunities, such as allowing previously fixed parts of the workforce the freedom to work from home or other locations. Businesses may be interested in enabling this for cost reasons, e.g. cutting office space related overheads, or flexibility reasons, e.g. allowing users to better dovetail their work and personal time, something which can increase both productivity and employee loyalty. Whatever the drivers, enabling connected mobile working is what it's really all about in the modern business environment, and this is such a natural extension of the other trends we have been discussing that moving in this direction is inevitable for most businesses.

Given this inevitability, it is probably worth thinking sooner rather than later about how the introduction and use of mobile technology will be managed if you are not doing so already. Otherwise, solutions will creep into the organisation in an uncontrolled manner from the bottom up through individual workgroups and users, potentially creating unwanted conflicts, risks and costs.

So what needs to be considered for those who want to be more proactive about embracing the change?

Eight steps to building an HP BladeSystem

Next page: Managing change

More from The Register

next story
BBC goes offline in MASSIVE COCKUP: Stephen Fry partly muzzled
Auntie tight-lipped as major outage rolls on
iPad? More like iFAD: We reveal why Apple fell into IBM's arms
But never fear fanbois, you're still lapping up iPhones, Macs
White? Male? You work in tech? Let us guess ... Twitter? We KNEW it!
Grim diversity numbers dumped alongside Facebook earnings
Bose says today IS F*** With Dre Day: Beats sued in patent battle
Music gear giant seeks some of that sweet, sweet Apple pie
HP, Microsoft prove it again: Big Business doesn't create jobs
SMEs get lip service - what they need is dinner at the Club
ITC: Seagate and LSI can infringe Realtek patents because Realtek isn't in the US
Land of the (get off scot) free, when it's a foreign owner
Amazon Reveals One Weird Trick: A Loss On Almost $20bn In Sales
Investors really hate it: Share price plunge as growth SLOWS in key AWS division
Dude, you're getting a Dell – with BITCOIN: IT giant slurps cryptocash
1. Buy PC with Bitcoin. 2. Mine more coins. 3. Goto step 1
prev story

Whitepapers

Top three mobile application threats
Prevent sensitive data leakage over insecure channels or stolen mobile devices.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.
Designing a Defense for Mobile Applications
Learn about the various considerations for defending mobile applications - from the application architecture itself to the myriad testing technologies.
Build a business case: developing custom apps
Learn how to maximize the value of custom applications by accelerating and simplifying their development.