TRENDS IN NETWORK PROJECT MANAGEMENT
Straight Talk from the Corner Office
Coranet's series - Straight Talk from the Corner Office - shares research and perspectives on IT issues with our clients and contacts so they can be flexible and deliver increased value even in an environment where resources are scarce.
Issue #12 - Spring 2017
While cybercrime tends to draw the top headlines, Coranet's current issue focuses on a related, growing area of concern - the safeguarding of physical security. This paper includes an overview and key considerations in three areas: video monitoring, intrusion detection and access control.
Issue #11 - Fall 2016
Drawing on important trends covered previously in Straight Talk, this issue presents an arena where Mobility and Cloud come together - Cloud-Managed Mobility. Cloud-managed wireless networks provide benefits, but are complex. This paper outlines purchase decision criteria and considerations for Cloud-Managed WLANs.
Issue #10 - Spring 2016
Wireless technology is increasingly being used to create a personalized shopper experience in retail stores, for example by providing real-time suggestions for complimentary and alternative products. This paper reviews three key technical considerations when implementing wireless solutions for this environment - needs analysis, site survey and validation assessment.
Issue #9 - August 2015
This issue focuses on the Intelligent Office, an advanced technology solution that provides comprehensive management of a company’s technology in order to improve business speed and lower overall operating expense while increasing employee productivity and job satisfaction. We present data on the quantifiable benefits of these solutions, as well future growth projections.
Issue #8 - February 2015
In this issue, we provide the business justification for BYOD and mobility enablement, namely revenue growth, increased employee productivity and reduced customer attrition. We then explain three key elements in a successful implementation - a clear strategy, policies that incorporate key stakeholder input, and incorporation of major business applications.
Issue # 7 - October 2014
In this issue, we renew a focus on BYOD, based on the continued proliferation of mobile devices and tablets in the workplace. We explain a number of "do's and don'ts" for those formulating IT policies and introduce an alternative approach - COPE or "Company-Owned, Personally Enabled" devices.
Issue # 6 - June 2014
In this issue, we discuss whether Cloud growth rates represent the "Real Deal" (they do) and which type of companies are taking the plunge. We review the benefits of Cloud, as well as how to avoid the financial and security pitfalls.
Issue #5 - February 2014
Continuing the cybercrime theme from Issue #4, we identify FIVE ways to keep your business off the Cybercrime casualty list, including (a) implementation of security safeguards, policies and controls; (b) the need for ongoing intrusion testing; and (c) managing mobility and the cloud, two areas of increasing vulnerability.
Issue #4 - October 2013
We discuss the what, how and why of cyber threats to businesses. This issue reviews the major findings from the latest release of an annual consortium study of cybercrime and then discusses how to avoid becoming a cybercrime casualty.
Issue # 3 - April 2013
Building on Issue #2's focus on different support options, in this issue we share recent decision-maker research on five key drivers for a superior support relationship vs. one that falls short of the mark.
Issue #2 - October 2012
Here, we describe internally supported, externally supported and "shared responsibility zone" approaches across five key areas of technology support. We conclude with three important guidelines for organizations choosing an external network provider.
Issue #1 - July 2012
In this first issue, Coranet's CEO Margaret Marcucci looks at a rapidly evolving aspect of business mobility - the trend toward Bring Your Own Devices or BYOD. We believe that BYOD security is something that our clients cannot afford to ignore. Companies must take a proactive approach in the areas of mobile device management security, technology and financial support.