Feeds

The practitioner's view of wireless

Just don't forget basic IT principles

3 Big data security analytics techniques

Mobile workshop Our recent wireless workshop has demonstrated yet again that the genuine experts in any area are the people out there doing it for real. Indeed, we saw a number of examples of pragmatic “non trendy” opinions coming back from experienced Reg Readers that don’t necessarily tally with some of the more idealistic views we often hear from the pundits and the press (Reg journalists excluded, of course).

On the topic of what’s important in a business class handheld device, for example, battery life and decent voice support were top of the list, with the more “newsworthy” stuff like cameras, GPS and Voice over WiFi coming towards the bottom. The big message to the mobile industry here is that business customers would much prefer vendors and service providers to get the basics right before messing around with bells and whistles.

This very pragmatic view is also reflected in the way in which those living in the real world deal with the opposing pulls of users wanting the latest, sexiest kit, while IT people want everything to be properly secured, managed and supported. Too often we hear the romantic view from analysts that modern mobile devices are breaking down the barriers between personal and business interests and that IT people have to accept the way this is changing user expectations of freedom of choice.

No romantics

All very well and philosophically “right on”, until your internal helpdesk and user satisfaction are crippled by users wanting assistance with a myriad of different devices that support technicians can’t possibly keep up with, and the development guys complain about the impossibility of designing, building and testing applications cost effectively when they have no idea of the spec and form factor of the target environment. It’s no surprise then that we were consistently told by those with more than a handful of mobile users that while it is important to take user wants and needs on board, the only practical approach is to stick to a pre-defined range of devices that IT is happy can be properly secured, managed and supported.

And the need to deal with IT realities such as these brings us onto another of the areas we looked at in the workshop - the question of BlackBerry versus Windows Mobile-based email architectures. Again, pragmatics came through strongly, and given the depth and volume of feedback received from readers with experience of these environments (often both of them), there can be little doubt that the BlackBerry solution wins hands down when it comes to management and control in a production environment.

Mixed emotions were clearly evident here, however, with some implying they wished things were otherwise because they perceived the Microsoft client platform to be more open, capable and flexible (now there’s a turn up for the books!). But when push comes to shove, you have to be able to manage stuff effectively, so for the time being, at least, BlackBerry remains the platform of choice for most IT professionals when considering serious deployments.

3 Big data security analytics techniques

Next page: Speed thrills

More from The Register

next story
A black box for your SUITCASE: Now your lost luggage can phone home – quite literally
Breakfast in London, lunch in NYC, and your clothes in Peru
Broadband Secretary of SHEEP sensationally quits Cabinet
Maria Miller finally resigns over expenses row
AT&T threatens to pull out of FCC wireless auctions over purchase limits
Company wants ability to buy more spectrum space in auction
EE dismisses DATA-BURNING glitch with Orange Mail app
Bug quietly slurps PAYG credit - yet EE denies it exists
Like Google, Comcast might roll its own mobile voice network
Says anything's possible if regulators approve merger with Time Warner
Turnbull leaves Australia's broadband blackspots in the dark
New Statement of Expectations to NBN Co offers get-out clauses for blackspot builds
Facebook claims 100 MEEELLION active users in India
Who needs China when you've got the next billion in your sights?
Facebook splats in-app chat, whacks brats into crack yakety-yak app
Jibber-jabbering addicts turfed out just as Zuck warned
prev story

Whitepapers

Designing a defence for mobile apps
In this whitepaper learn the various considerations for defending mobile applications; from the mobile application architecture itself to the myriad testing technologies needed to properly assess mobile applications risk.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Securing web applications made simple and scalable
In this whitepaper learn how automated security testing can provide a simple and scalable way to protect your web applications.