Feeds

The changing nature of end user computing

Remember those days?

  • alert
  • submit to reddit

Internet Security Threat Report 2014

Tech Panel Life used to be pretty straightforward. An employee joined the organisation, and they were allocated a desk with a PC on it. The IT department controlled what was on that PC, always knew where it was, and generally had pretty easy access to it.

Today it's different; at least for most organisations. The PC is now likely to be a laptop, and the employee is increasingly using one or more other mobile devices. But how far has this gone?

It's been a while since we've asked Reg readers about this, so we felt it was time for a check-up. Is it a case of everyone exaggerating the degree to which mobile devices are actually being used in business? Or perhaps the emergence of iPads, Android slates and next-gen smart phones is driving things much faster than any anyone anticipated.

Let us know what's going on in your organisation, and we will report back so you can judge how you measure up. And as usual, we'll also undoubtedly learn some lessons that will be useful for the Reg community as a whole.

Get started on our latest desktop and mobile survey here. ®

Remote control for virtualized desktops

More from The Register

next story
BIG FAT Lies: Porky Pies about obesity
What really shortens lives? Reading this sort of crap in the papers
Assange™ slumps back on Ecuador's sofa after detention appeal binned
Swedish court rules there's 'great risk' WikiLeaker will dodge prosecution
You think the CLOUD's insecure? It's BETTER than UK.GOV's DATA CENTRES
We don't even know where some of them ARE – Maude
prev story

Whitepapers

Why cloud backup?
Combining the latest advancements in disk-based backup with secure, integrated, cloud technologies offer organizations fast and assured recovery of their critical enterprise data.
A strategic approach to identity relationship management
ForgeRock commissioned Forrester to evaluate companies’ IAM practices and requirements when it comes to customer-facing scenarios versus employee-facing ones.
10 threats to successful enterprise endpoint backup
10 threats to a successful backup including issues with BYOD, slow backups and ineffective security.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
The next step in data security
With recent increased privacy concerns and computers becoming more powerful, the chance of hackers being able to crack smaller-sized RSA keys increases.