



<rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:media="http://search.yahoo.com/mrss/">
	<channel>
		<title>InsiderPro Jack Gold</title>
		<link>https://www.idginsiderpro.com</link>
		<description></description>
		<language>en-us</language>
		<pubDate>Mon, 16 Mar 2020 14:07:34 -0700</pubDate>
		<lastBuildDate>Mon, 16 Mar 2020 14:07:34 -0700</lastBuildDate>
		
			<image>
				<url>https://alt.idgesg.net/images/furniture/insiderpro/insider-pro-510x510.png</url>
				<title>InsiderPro</title>
				<link>www.idginsiderpro.com</link>
				<width>510</width>
				<height>510</height>
			</image>
		
		
			<image>
				<url>https://alt.idgesg.net/images/furniture/insiderpro/insider-pro-horizontal-logo-798x288.png</url>
				<title>InsiderPro</title>
				<link>www.idginsiderpro.com</link>
				<width>796</width>
				<height>288</height>
			</image>
		
		

	
		
			
				
				
					
						
							
							
						















	
		
		
		
		
	
	
	
	



	
	
	
	<item>

		<title>Is RPA really an AI process or much less?</title>

		<pubDate>Thu, 05 Mar 2020 08:38:00 -0800</pubDate>

		
		
		
		<author>Jack Gold</author>
		<dc:creator>Jack Gold</dc:creator>
		

		
		
		<description><![CDATA[<article>
	<section class="page">
<p>Although it’s been around for a few years, Robotic Process Automation (RPA) is the new “killer app” that companies are concentrating on deploying -- and an area that IT staff is enamored with.</p><h4>[ Related: <a href="https://www.idginsiderpro.com/article/3446657/4-steps-to-rpa-success.html">4 steps to RPA success</a> ]</h4>
<p>It’s touted as a way to take mundane, standard workflow-related tasks, fully automate them, and relieve workers of the tedium of manual processes (e.g., expense reports, invoice creations, HR related tasks, call center operations).</p><aside class="pullquote"><q>While RPA is not always a bad choice, it should not be a final destination.</q></aside>
<p>It’s essentially a way for computers to monitor a repetitive task, and then learn how to do it autonomously. Many have pointed to this technology as an AI process, but is it? And is it really worth the investment in time and expense, when true machine learning based AI capability is only a short time away? Finally, are you actually perpetuating a marginally productive or even inefficient process that should be drastically redesigned in the first place by installing at RPA solution?</p><p class="jumpTag"><a href="/article/3530377/is-rpa-really-an-ai-process-or-much-less.html#jump">To read this article in full, please click here</a></p></section></article>]]></description>

		<link>https://www.idginsiderpro.com/article/3530377/is-rpa-really-an-ai-process-or-much-less.html</link>
		
		
		
		
		
			
				
				
					<media:thumbnail
						url="https://images.idgesg.net/images/article/2017/08/robot_gear_automation_thinkstock_606703118_3x2-100732427-large.3x2.jpg" />
						<media:content url="https://images.idgesg.net/images/article/2017/08/robot_gear_automation_thinkstock_606703118_3x2-100732427-large.3x2.jpg"/>
				
			
		
		
		

		
		
			<categories>
				
				
					
				
				
					
				
				
					
				
				
					
				
				
					
				
				
					
				
				
			</categories>
 		
		
	</item>
 
					
				
			
		
			
				
				
					
						
							
							
						















	
		
		
		
		
	
	
	
	



	
	
	
	<item>

		<title>How to build a collaboration environment for a changing workforce</title>

		<pubDate>Wed, 19 Feb 2020 10:37:00 -0800</pubDate>

		
		
		
		<author>Jack Gold</author>
		<dc:creator>Jack Gold</dc:creator>
		

		
		
		<description><![CDATA[<article>
	<section class="page">
<p>Most enterprise today are not the unified “all workers in the same space” environment that they were just a few years ago, when virtually everyone was in a corporate location and able to literally walk to the next office to communicate and/or collaborate with coworkers, or use email or simple internal messaging tools.</p><p>Employee communications, vital to the efficient operation of any organization, are far more complex today. Indeed, we estimate that a typical corporate entity has from 20 percent to 35 percent of its workforce as contingent labor – working independently and usually from remote locations. Keeping these independent contractors, consultants, third-party partners, and even customers connected is of critical importance to the productivity and the overall success of the organization.</p><p class="jumpTag"><a href="/article/3527898/how-to-build-a-collaboration-environment-for-a-changing-workforce.html#jump">To read this article in full, please click here</a></p></section></article>]]></description>

		<link>https://www.idginsiderpro.com/article/3527898/how-to-build-a-collaboration-environment-for-a-changing-workforce.html</link>
		
		
		
		
		
			
				
				
					<media:thumbnail
						url="https://images.idgesg.net/images/article/2018/02/mobile_app_collaboration_tools_thinkstock_889225948-100749325-large.3x2.jpg" />
						<media:content url="https://images.idgesg.net/images/article/2018/02/mobile_app_collaboration_tools_thinkstock_889225948-100749325-large.3x2.jpg"/>
				
			
		
		
		

		
		
			<categories>
				
				
					
				
				
					
				
				
					
				
				
					
				
				
			</categories>
 		
		
	</item>
 
					
				
			
		
			
				
				
					
						
							
							
						















	
		
		
		
		
	
	
	
	



	
	
	
	<item>

		<title>Next-generation endpoint security goes beyond the endpoint</title>

		<pubDate>Thu, 06 Feb 2020 13:33:00 -0800</pubDate>

		
		
		
		<author>Jack Gold</author>
		<dc:creator>Jack Gold</dc:creator>
		

		
		
		<description><![CDATA[<article>
	<section class="page">
<p>Security remains in the top three concerns of most enterprises, as a plethora of end point devices (especially smartphones and tablets) are deployed. We’re also seeing a move to a distribution of corporate apps to on-device, on-prem data center and hybrid cloud approaches that provide a major challenge to implementing a consolidated approach to security and authentication.</p><aside class="pullquote"><q>Secure authentication will be based on analyzed behaviors like methods of typing, mouse movements, voice and physical appearance.</q></aside>
<p>One of the primary ways bad actors get into corporate systems is though stolen identity credentials. The old way of doing security for authentication (i.e., user name and password) are still dominant and won’t disappear quickly, but their usefulness as a secure solution is coming to an end.  </p><p class="jumpTag"><a href="/article/3520793/next-generation-endpoint-security-goes-beyond-the-endpoint.html#jump">To read this article in full, please click here</a></p></section></article>]]></description>

		<link>https://www.idginsiderpro.com/article/3520793/next-generation-endpoint-security-goes-beyond-the-endpoint.html</link>
		
		
		
		
		
			
				
				
					<media:thumbnail
						url="https://images.idgesg.net/images/article/2020/02/idea_opportunity_innovation_tiny_figures_move_toward_a_giant_lit_bulb_amid_a_line_of_unlit_bulbs_by_digtialstorm_gettyimages-515855048_abstract-circuits_and_digital_connections_by_peshkov_gettyimages-965785212_1200x800-100828834-large.3x2.jpg" />
						<media:content url="https://images.idgesg.net/images/article/2020/02/idea_opportunity_innovation_tiny_figures_move_toward_a_giant_lit_bulb_amid_a_line_of_unlit_bulbs_by_digtialstorm_gettyimages-515855048_abstract-circuits_and_digital_connections_by_peshkov_gettyimages-965785212_1200x800-100828834-large.3x2.jpg"/>
				
			
		
		
		

		
		
			<categories>
				
				
					
				
				
					
				
				
					
				
				
					
				
				
					
				
				
			</categories>
 		
		
	</item>
 
					
				
			
		
			
				
				
					
						
							
							
						















	
		
		
		
		
	
	
	
	



	
	
	
	<item>

		<title>Why multicloud security is your next big challenge</title>

		<pubDate>Thu, 16 Jan 2020 07:50:00 -0800</pubDate>

		
		
		
		<author>Jack Gold</author>
		<dc:creator>Jack Gold</dc:creator>
		

		
		
		<description><![CDATA[<article>
	<section class="page">
<p>Most companies who use cloud services to deploy applications, websites, databases and related solutions have a problem.</p><p>While each cloud vendor may have a secure solution for their own cloud service and offer a rich set of security tools to its customers, how can companies ensure that they are protected across all the different boundaries of cloud implementations they employ? This is especially important if they don’t want to implement multiple independent security mechanisms, or have to deal with security logs and data flows that are incompatible?</p><h2><strong>Managing multiple cloud service (and your legacy data center products)</strong></h2>
<p>Why is this an issue? Because the average company has three-five different instances of cloud services deployed in their business– from public cloud to private cloud to hybrid cloud, to on-prem cloud -- in addition to legacy data center implementations. All of these have their own way of protecting the organization from malware, data exfiltration and more general attacks. And with increased emphasis on regulatory compliance requirements, the capability to manage all these disparate systems is crucial.</p><p class="jumpTag"><a href="/article/3514669/why-multicloud-security-is-your-next-big-challenge.html#jump">To read this article in full, please click here</a></p></section></article>]]></description>

		<link>https://www.idginsiderpro.com/article/3514669/why-multicloud-security-is-your-next-big-challenge.html</link>
		
		
		
		
		
			
				
				
					<media:thumbnail
						url="https://images.idgesg.net/images/article/2019/02/multicloud-100788234-large.3x2.jpg" />
						<media:content url="https://images.idgesg.net/images/article/2019/02/multicloud-100788234-large.3x2.jpg"/>
				
			
		
		
		

		
		
			<categories>
				
				
					
				
				
					
				
				
					
				
				
					
				
				
					
				
				
					
				
				
					
				
				
					
				
				
			</categories>
 		
		
	</item>
 
					
				
			
		
			
				
				
					
						
							
							
						















	
		
		
		
		
	
	
	
	



	
	
	
	<item>

		<title>What’s next for 5G: A look at Release 17</title>

		<pubDate>Thu, 09 Jan 2020 04:59:00 -0800</pubDate>

		
		
		
		<author>Jack Gold</author>
		<dc:creator>Jack Gold</dc:creator>
		

		
		
		<description><![CDATA[<article>
	<section class="page">
<p>The current crop of what are called “projects” – definitions and standardized ways of implementing the technology</p><p>We’ve barely rolled out 5G, and we’re already looking at what’s next! But as with all tech, the evolution of 5G service isn’t standing still for very long. Here’s a look at what is coming in the next two years as we see the next version of 5G (known as Release 17) rolled out, and what it means to users.</p><aside class="fakesidebar">
<h4><strong>[ Don't miss: </strong> <a href="https://www.idginsiderpro.com/author/Jack-Gold/"> Industry analyst Jack Gold on Insider Pro </a> ]</h4>
</aside>
<p>The current version of 5G is known in the standards bodies as Release 16, which is powering the current generation of 5G deployments. Release 17 was just ratified by the 3GPP – the international organization responsible for the standards definitions for 5G and previous versions of the cellular standards going all the way back to 3G (from where it got its name).</p><p class="jumpTag"><a href="/article/3512826/what-s-next-for-5g-a-look-at-release-17.html#jump">To read this article in full, please click here</a></p></section></article>]]></description>

		<link>https://www.idginsiderpro.com/article/3512826/what-s-next-for-5g-a-look-at-release-17.html</link>
		
		
		
		
		
			
				
				
					<media:thumbnail
						url="https://images.idgesg.net/images/article/2019/02/5g_wireless_technology_connections_network_by_irina_strelnikova_gettyimages-996724926_3x2-100787546-large.3x2.jpg" />
						<media:content url="https://images.idgesg.net/images/article/2019/02/5g_wireless_technology_connections_network_by_irina_strelnikova_gettyimages-996724926_3x2-100787546-large.3x2.jpg"/>
				
			
		
		
		

		
		
			<categories>
				
				
					
				
				
					
				
				
					
				
				
					
				
				
					
				
				
					
				
				
			</categories>
 		
		
	</item>
 
					
				
			
		
			
				
				
					
						
							
							
						















	
		
		
		
		
	
	
	
	



	
	
	
	<item>

		<title>Will 5G accelerate edge computing as a service?</title>

		<pubDate>Tue, 17 Dec 2019 09:29:00 -0800</pubDate>

		
		
		
		<author>Jack Gold</author>
		<dc:creator>Jack Gold</dc:creator>
		

		
		
		<description><![CDATA[<article>
	<section class="page">
<p>Mobile edge computing has been talked about for a couple of years now as the way to bring cloud computing downstream to the local processing needs of a variety of compute intensive and privacy concerned workloads. But without 5G, is it just wishful thinking? And can network operators create a market for their implementation of edge computing as a service?</p><p>Bringing compute resources to the edge means reducing the amount of data that needs to be sent up to the cloud. Indeed, for many data-intensive applications like video surveillance/security, natural speech recognition, health/wellness related monitoring, etc. the need to process data as close to the source as possible is mission critical.</p><p class="jumpTag"><a href="/article/3505879/will-5g-accelerate-edge-computing-as-a-service.html#jump">To read this article in full, please click here</a></p></section></article>]]></description>

		<link>https://www.idginsiderpro.com/article/3505879/will-5g-accelerate-edge-computing-as-a-service.html</link>
		
		
		
		
		
			
				
				
					<media:thumbnail
						url="https://images.idgesg.net/images/article/2019/02/edge_computing_by_miakievy_gettyimages-957694592_2400x1600-100788315-large.3x2.jpg" />
						<media:content url="https://images.idgesg.net/images/article/2019/02/edge_computing_by_miakievy_gettyimages-957694592_2400x1600-100788315-large.3x2.jpg"/>
				
			
		
		
		

		
		
			<categories>
				
				
					
				
				
					
				
				
					
				
				
					
				
				
					
				
				
					
				
				
					
				
				
					
				
				
			</categories>
 		
		
	</item>
 
					
				
			
		
			
				
				
					
						
							
							
						















	
		
		
		
		
	
	
	
	



	
	
	
	<item>

		<title>How IBM plans to compete in the cloud</title>

		<pubDate>Tue, 03 Dec 2019 13:22:00 -0800</pubDate>

		
		
		
		<author>Jack Gold</author>
		<dc:creator>Jack Gold</dc:creator>
		

		
		
		<description><![CDATA[<article>
	<section class="page">
<p>IBM has been pushing hard on being a competitive threat in <a href="https://www.idginsiderpro.com/article/3431152/where-in-the-cloud-is-it-headed.html">enterprise cloud</a>, but is far behind the leaders like Amazon AWS, Microsoft Azure and Google Cloud. It’s latest strategy to become more relevant, in addition to buying RedHat for its cloud expertise, is to develop a series of “easy on-ramp” Cloud Paks that it claims can significantly reduce the amount of time necessary for enterprises to be cloud-enabled. But is this enough to change the capability of IBM to compete in a highly competitive modern cloud environment?</p><aside class="pullquote"><q>Many of its customers, particularly the largest enterprises in verticals like financial services, healthcare and government agencies, still look to IBM for its expertise.</q></aside>
<p>While much hype has been produced about the rapid pace of enterprise cloud deployments, in reality we estimate less than 25 percent of enterprise workloads are currently being run in the cloud. That doesn’t negate the importance of the growth of cloud computing – but it does set some parameters around just how prevalent it currently is, and how difficult it is to move enterprise workloads to a cloud architecture.</p><p class="jumpTag"><a href="/article/3487558/how-ibm-plans-to-compete-in-the-cloud.html#jump">To read this article in full, please click here</a></p></section></article>]]></description>

		<link>https://www.idginsiderpro.com/article/3487558/how-ibm-plans-to-compete-in-the-cloud.html</link>
		
		
		
		
		
			
				
				
					<media:thumbnail
						url="https://images.idgesg.net/images/article/2017/08/primary-100732918-large.3x2.jpg" />
						<media:content url="https://images.idgesg.net/images/article/2017/08/primary-100732918-large.3x2.jpg"/>
				
			
		
		
		

		
		
			<categories>
				
				
					
				
				
					
				
				
					
				
				
					
				
				
					
				
				
					
				
				
					
				
				
					
				
				
					
				
				
			</categories>
 		
		
	</item>
 
					
				
			
		
			
				
				
					
						
							
							
						















	
		
		
		
		
	
	
	
	



	
	
	
	<item>

		<title>Why enterprise computing is living on the edge</title>

		<pubDate>Mon, 04 Nov 2019 06:30:00 -0800</pubDate>

		
		
		
		<author>Jack Gold</author>
		<dc:creator>Jack Gold</dc:creator>
		

		
		
		<description><![CDATA[<article>
	<section class="page">
<p>People talk about cloud as the way to scale out infrastructure needs. And indeed, cloud and hybrid cloud infrastructure provides an attractive way for enterprises to deliver compute where and when needed at an attractive price. But with an ever-increasing amount of “things” being deployed, from sensors to mobile devices to intelligent assets of all types, the capability to process information locally and react quickly is becoming a necessity.</p><aside class="pullquote"><q>Carriers are placing increasing emphasis on edge computing as they scale out their 5G networks and create computing platforms at their towers and intermediate control sites that reflect the move to NFV.</q></aside>
<p>This movement of compute resources into proximity to the input/output, and which are often analog resources, is what’s driving the rapid rise of edge computing.</p><p class="jumpTag"><a href="/article/3451569/why-enterprise-computing-is-living-on-the-edge.html#jump">To read this article in full, please click here</a></p></section></article>]]></description>

		<link>https://www.idginsiderpro.com/article/3451569/why-enterprise-computing-is-living-on-the-edge.html</link>
		
		
		
		
		
			
				
				
					<media:thumbnail
						url="https://images.idgesg.net/images/article/2017/09/wireless_network_management_world_map_iot_internet_of_things_edge_computing_thinkstock_684807514_3x2_1200x800-100736491-large.3x2.jpg" />
						<media:content url="https://images.idgesg.net/images/article/2017/09/wireless_network_management_world_map_iot_internet_of_things_edge_computing_thinkstock_684807514_3x2_1200x800-100736491-large.3x2.jpg"/>
				
			
		
		
		

		
		
			<categories>
				
				
					
				
				
					
				
				
					
				
				
					
				
				
			</categories>
 		
		
	</item>
 
					
				
			
		
			
				
				
					
						
							
							
						















	
		
		
		
		
	
	
	
	



	
	
	
	<item>

		<title>Why 5G means new business models and user benefits </title>

		<pubDate>Thu, 17 Oct 2019 06:30:00 -0700</pubDate>

		
		
		
		<author>Jack Gold</author>
		<dc:creator>Jack Gold</dc:creator>
		

		
		
		<description><![CDATA[<article>
	<section class="page">
<p>While everyone is focused, and rightly so, on what 5G will mean to the billions of users of smartphones, there is a less visible but equally as important side to 5G that will have profound effects on consumers and enterprises.</p><aside class="pullquote"><q>While 5G has been primarily influenced by the need for mobile, it also offers major potential in private managed networks, particularly for higher frequency mmWave systems.</q></aside>
<p>5G will enable new business models that will bring new services to a vast number of people and companies. Further, it will provide a profitable adjunct to network operators that can add a significant contribution to their bottom line and may even be able to partially subsidize consumer services that will be highly price competitive longer term. And, finally, it will open up new competitive markets for internet services that have long been non competitive or marginally competitive.</p><p class="jumpTag"><a href="/article/3446476/why-5g-means-new-business-models-and-user-benefits.html#jump">To read this article in full, please click here</a></p></section></article>]]></description>

		<link>https://www.idginsiderpro.com/article/3446476/why-5g-means-new-business-models-and-user-benefits.html</link>
		
		
		
		
		
			
				
				
					<media:thumbnail
						url="https://images.idgesg.net/images/article/2019/01/4g-versus-5g_horizon_sunrise-100784230-large.3x2.jpg" />
						<media:content url="https://images.idgesg.net/images/article/2019/01/4g-versus-5g_horizon_sunrise-100784230-large.3x2.jpg"/>
				
			
		
		
		

		
		
			<categories>
				
				
					
				
				
					
				
				
					
				
				
					
				
				
					
				
				
			</categories>
 		
		
	</item>
 
					
				
			
		
			
				
				
					
						
							
							
						















	
		
		
		
		
	
	
	
	



	
	
	
	<item>

		<title>Will 5G increase mobile security?</title>

		<pubDate>Fri, 04 Oct 2019 08:22:00 -0700</pubDate>

		
		
		
		<author>Jack Gold</author>
		<dc:creator>Jack Gold</dc:creator>
		

		
		
		<description><![CDATA[<article>
	<section class="page">
<p>There is no question that mobile devices are mainstream access and productivity tools for most enterprise users. Indeed, in some organizations, smartphones surpass traditional PCs as the preferred way to access back-end corporate applications such as ERP. SFA and CRM. In fact, no major enterprise application vendor offers a PC-only-based solution anymore. Companies like IBM, Oracle, SAP, VMware, Microsoft, Citrix and Salesforce have ported most of their functionality for access with mobile clients. But as much as mobile has become a mainstream productivity tool, it also has a darker side – it’s now become a primary vector for security breaches.</p><aside class="pullquote"><q>Companies would be better-served to equip all devices (including PCs) with cellular connectivity to avoid a major attack vector and protect against a very costly data breach.</q></aside>
<p>How significant a security threat is mobile? The 2019 Verizon Mobile Security Index showed an increase from 27 percent in 2017 to 33 percent in 2019 in reported mobile incidents. However, it’s highly likely that the number of security incidents is even greater, given the lack of full visibility many organizations have when it comes to security breaches and how they infiltrated into company.</p><p class="jumpTag"><a href="/article/3444180/will-5g-increase-mobile-security.html#jump">To read this article in full, please click here</a></p></section></article>]]></description>

		<link>https://www.idginsiderpro.com/article/3444180/will-5g-increase-mobile-security.html</link>
		
		
		
		
		
			
				
				
					<media:thumbnail
						url="https://images.idgesg.net/images/article/2018/01/endpoint-security_hacker_vulnerablility_secure_mobile-security-app-100747401-large.3x2.jpg" />
						<media:content url="https://images.idgesg.net/images/article/2018/01/endpoint-security_hacker_vulnerablility_secure_mobile-security-app-100747401-large.3x2.jpg"/>
				
			
		
		
		

		
		
			<categories>
				
				
					
				
				
					
				
				
					
				
				
					
				
				
					
				
				
					
				
				
			</categories>
 		
		
	</item>
 
					
				
			
		
			
				
				
					
						
							
							
						















	
		
		
		
		
	
	
	
	



	
	
	
	<item>

		<title>3 ways to improve PC security</title>

		<pubDate>Fri, 20 Sep 2019 10:09:00 -0700</pubDate>

		
		
		
		<author>Jack Gold</author>
		<dc:creator>Jack Gold</dc:creator>
		

		
		
		<description><![CDATA[<article>
	<section class="page">
<p>Companies continue to struggle with ensuring their PCs are protected from malware attacks, data breaches and miscellaneous “bad actor” attacks (e.g. ransomware, identity theft, data exfiltration). A new revelation of a security breach every day seems to come every day.</p><aside class="pullquote"><q>Our research determined that 70 percent of companies have had a security breach. The research also showed that there was a major correlation between how likely a PC is to have a breach and how old the machine is.</q></aside>
<p>While there are literally hundreds of add-on security solutions in the marketplace, it’s difficult to know if the PC end-point devices themselves are being maximally protected. Should enterprises expect their PC vendors to secure them? The answer is, yes, and enterprise-class device makers are doing a lot, which is not always apparent to organizations purchasing devices.</p><p class="jumpTag"><a href="/article/3440072/3-ways-to-improve-pc-security.html#jump">To read this article in full, please click here</a></p></section></article>]]></description>

		<link>https://www.idginsiderpro.com/article/3440072/3-ways-to-improve-pc-security.html</link>
		
		
		
		
		
			
				
				
					<media:thumbnail
						url="https://images.idgesg.net/images/article/2019/05/network_security_network_traffic_scaning_by_hywards_gettyimages-693643766_2400x1600-100796828-large.3x2.jpg" />
						<media:content url="https://images.idgesg.net/images/article/2019/05/network_security_network_traffic_scaning_by_hywards_gettyimages-693643766_2400x1600-100796828-large.3x2.jpg"/>
				
			
		
		
		

		
		
			<categories>
				
				
					
				
				
					
				
				
					
				
				
					
				
				
					
				
				
					
				
				
			</categories>
 		
		
	</item>
 
					
				
			
		
			
				
				
					
						
							
							
						















	
		
		
		
		
	
	
	
	



	
	
	
	<item>

		<title>Don’t be blinded by 5G: Why you can’t neglect Wi-Fi 6</title>

		<pubDate>Fri, 06 Sep 2019 11:20:00 -0700</pubDate>

		
		
		
		<author>Jack Gold</author>
		<dc:creator>Jack Gold</dc:creator>
		

		
		
		<description><![CDATA[<article>
	<section class="page">
<p>Everyone seems fixated on the emerging 5G technology as the next great way to connect. And it’s true – 5G is an important technology not only for smartphones, but many other connected devices, particularly those that are mobile and/or remote (e.g., cars, meters, smart sensors, etc.). But as important as 5G is, often overlooked is an equally important next generation wireless technology for our increasingly connected world – Wi-Fi 6.</p><aside class="pullquote"><q>Wi-Fi networks are going to exhibit massive growth in connections and data consumption. The problem is, older Wi-Fi tech just wasn’t designed for this type of network loading.</q></aside>
<p>Most people are familiar with Wi-Fi as a way to connect their laptops to the internet while at home, in public places or in the office. But most current Wi-Fi access points (APs) are at least two generations behind on the technology. I estimate that at least 75 percent of existing installations of Wi-Fi are on 802.11n, a wireless standard approved in 2009.</p><p class="jumpTag"><a href="/article/3436781/don-t-be-blinded-by-5g-why-you-can-t-neglect-wi-fi-6.html#jump">To read this article in full, please click here</a></p></section></article>]]></description>

		<link>https://www.idginsiderpro.com/article/3436781/don-t-be-blinded-by-5g-why-you-can-t-neglect-wi-fi-6.html</link>
		
		
		
		
		
			
				
				
					<media:thumbnail
						url="https://images.techhive.com/images/article/2015/08/thinkstockphotos-482253373-100610269-primary.idge.jpg" />
						<media:content url="https://images.techhive.com/images/article/2015/08/thinkstockphotos-482253373-100610269-primary.idge.jpg"/>
				
			
		
		
		

		
		
			<categories>
				
				
					
				
				
					
				
				
					
				
				
					
				
				
			</categories>
 		
		
	</item>
 
					
				
			
		
			
				
				
					
						
							
							
						















	
		
		
		
		
	
	
	
	



	
	
	
	<item>

		<title>Can you be mobile AND secure?</title>

		<pubDate>Mon, 26 Aug 2019 05:45:00 -0700</pubDate>

		
		
		
		<author>Jack Gold</author>
		<dc:creator>Jack Gold</dc:creator>
		

		
		
		<description><![CDATA[<article>
	<section class="page">
<p>Most companies today allow their workforce to employ mobile devices to access corporate back office systems (e.g., email, sale force automation, ERP, HR, data collection, form filling, collaboration, etc.). And while these devices can be convenient, it’s important that organizations know how to maximize the security of these corporately connected devices – both devices furnished by the company and through Bring Your Own Device (BYOD).</p><aside class="pullquote"><q>II expect to see more security acquisitions going forward as UEM and mobile security become even more closely intertwined.</q></aside>
<p>In fact, many companies I speak with say that they believe (or are unaware of) any mobile data breaches within their organization. Research we’ve done at J.Gold Associates shows that IT believes about 65 percent of mobile devices have never had a breach or are unaware of one happening (e.g., lost, stolen, attacked by malware), while greater than 50 percent of end users admit to having a breach on their device, although not all exposed corporate data, and most never got reported to IT.</p><p class="jumpTag"><a href="/article/3434059/can-you-be-mobile-and-secure.html#jump">To read this article in full, please click here</a></p></section></article>]]></description>

		<link>https://www.idginsiderpro.com/article/3434059/can-you-be-mobile-and-secure.html</link>
		
		
		
		
		
			
				
				
					<media:thumbnail
						url="https://images.idgesg.net/images/article/2018/02/mobile_security_threat_detection_thinkstock_488641023-100750733-large.3x2.jpg" />
						<media:content url="https://images.idgesg.net/images/article/2018/02/mobile_security_threat_detection_thinkstock_488641023-100750733-large.3x2.jpg"/>
				
			
		
		
		

		
		
			<categories>
				
				
					
				
				
					
				
				
					
				
				
			</categories>
 		
		
	</item>
 
					
				
			
		
			
				
				
					
						
							
							
						















	
		
		
		
		
	
	
	
	



	
	
	
	<item>

		<title>When should enterprises move to 5G?</title>

		<pubDate>Mon, 12 Aug 2019 07:04:00 -0700</pubDate>

		
		
		
		<author>Jack Gold</author>
		<dc:creator>Jack Gold</dc:creator>
		

		
		
		<description><![CDATA[<article>
	<section class="page">
<p>One of the biggest areas of hype these days centers around how 5G will change the wireless world. Carriers are ramping up their rhetoric, which not always matched with actual deployment. End users are being bombarded with 5G news from carriers, device makers and app providers. But is 5G really ready for prime time? There is no doubt 5G will have a major impact, but should enterprises be making immediate plans to deploy 5G?</p><p>The reality is that there are lots of short-term issues around 5G, especially as it relates to enterprises, who in most cases have a variety of users scattered over wide areas with many differing needs. These issues primarily revolve around coverage, devices and apps.</p><p class="jumpTag"><a href="/article/3431537/when-should-enterprises-move-to-5g.html#jump">To read this article in full, please click here</a></p></section></article>]]></description>

		<link>https://www.idginsiderpro.com/article/3431537/when-should-enterprises-move-to-5g.html</link>
		
		
		
		
		
			
				
				
					<media:thumbnail
						url="https://images.idgesg.net/images/article/2019/02/5g_4g_wireless-speed_wireless-network_devices-100787473-large.3x2.jpg" />
						<media:content url="https://images.idgesg.net/images/article/2019/02/5g_4g_wireless-speed_wireless-network_devices-100787473-large.3x2.jpg"/>
				
			
		
		
		

		
		
			<categories>
				
				
					
				
				
					
				
				
					
				
				
			</categories>
 		
		
	</item>
 
					
				
			
		
	
	




	</channel>
</rss>