As is the case with any change agent, mobile-enabling arena is not devoid of setbacks and obstacles. Some of the common setbacks that an enterprise may encounter in their pursuit of mobility are:
Enterprise mobility depends a lot on user preferences. A workforce not used to smart mobile devices will have a higher learning curve (requiring significant orientation, demos and training sessions) and may hamper enterprise productivity (especially for time-sensitive industries). Unlike, traditional software services, mobile applications can be updated or changed completely including interface, workflow etc. in no time by harnessing the power of APIs and features, in current and updated mobile operating systems. This move has the potential to upset the workflow of end-users, who are already grappling with the functioning of the new mobile enterprise. In case of BYOD deployment, even technologically sound users may show reluctance to use their personal devices for enterprise computing, or carry multiple devices to keep personal and enterprise data separate.
Enterprise mobility depends on perpetual connectivity. There is no real-time data or instant analysis without uninterrupted connection to the backend infrastructure. Although cloud services can reduce the connectivity impact by offering quick access and storage for offline interaction, it is only a stop-gap solution. Corruption of data due to failure of connection midway and its recovery while simultaneously keeping the mobile enterprise functioning are areas of critical concern. Further, there are issues in serving across the globe with different cellular and wireless options, and confidentiality of encrypted data over unsecured and free WiFi hotspots.
Enterprise mobility may pose visibility issues. It is not possible to keep track of all deployed devices across multiple networks and platforms due to network problems and software hang ups. Planned updates may fail due to low battery or zero connectivity. Similarly secure deletion of sensitive data may prove futile, if the lost device is never connected to the Internet. Device IDs can get cloned in unsecured networks allowing backend systems to give access to rogue devices, slowing down the entire mobile infrastructure, and forfeiting the benefits of on the go computing.
If you have any questions about the post, please contact us by sending a mail to email@example.com