You cannot view this unit as you're not logged in yet.
Mobile Strategy
24 Minute CIO

0 POINTS
Complete the units, enroll in new courses, answer survey questions
By gaining points, you can win a personalised one on one coaching session
Complete the course to see how your learning has improved and gain 10 points
Answer the questions in each unit to generate your custom action plan and gain points
Collect points to be able to ask an expert any question you may have
Module 1 | 24minCIO | |
---|---|---|
Unit 1 | 24 Minute CIO Pretest | |
Unit 2 | Business Strategy | |
Unit 3 | Innovation | |
Unit 4 | Business-IT Alignment | |
Unit 5 | Cloud Computing | |
Unit 6 | Data Centre Infrastructure | |
Unit 7 | Storage Solution Implementation | |
Unit 8 | Servers' Benefits | |
Unit 9 | IT Infrastructure | |
Unit 10 | Mobile Strategy | |
Unit 11 | Leadership Skills | |
Unit 12 | Talent Development | |
Unit 13 | Project Management | |
Unit 14 | 24 minute CIO Posttest |
Survey Questions
Hi, in this video you will learn the three consideration to think of when developing mobile strategy. The global growth of mobile devices has been phenomenal and continues to expand at an amazingly fast pace. CIO’s need to have a mobile strategy as part of the overall CIT strategy.
Here are three considerations to take into account as you develop your mobile strategy:
-
Bring your own device is BYOD has become a key expectation of employees and as such you need to be able to deploy internal services to employees taking into account that very personal devices operating systems.
-
Mobile first strategy the process of launching your services and offerings by focusing on the mobile users first instead of a traditional PC users is a requirement in most industries and this will continue to expand to cover more users. Organization that stay abreast of the latest developments taking place in mobile technologies would be able to innovate products and services that benefit their clients.
-
Security concerns are highlighted further as employees and climb store so much information on these very personal devices. A multi-platform security architecture needs to be deployed across internal and external services.