Tablet Adoption – Enterprise Is Returning To The Terminal

Tablet Adoption – Enterprise Is Returning To The Terminal

We spend a lot of time talking about the cloud, apps and mobile these days. The language is new, but it really represents a return to a mode of technology that enterprise-level organizations have always loved. Tablet adoption is up among enterprise users, especially iPads. And with that adoption rate, laptop use is dropping. Among iPad owners in enterprise, 12 percent report that their tablets have entirely replaced their laptops.

With a tablet and the right suite of apps, an organization can effectively return to the terminal model. Data is saved to the cloud, accessible both from employees’ tablets and any other computer they might use. There are a lot that tablets (and terminals) aren’t capable of, but for the data-entry and communications that make up a large portion of what an employee might do during the course of the day, they are sufficient.

The Benefits of a Terminal-Based World

For enterprise-level organizations, handing out tablets to employees, rather than laptops, has some serious benefits.

Organizations have more control over their data. Not only does having all data stored remotely in a system that the organization controls limit the potential for theft of that data, it also means that managers can keep a closer eye on how employees are using company resources.

It’s easier to safeguard a server or a mainframe from the sorts of accidents that happen to the hardware that employees use everyday. If someone destroys a tablet, very little data will actually be lost.

Costs can be better controlled when you can configure software once and then allow a variety of hardware to access it. The costs of tablets are continuing to drop and many app builders have focused on creating versions of their products that an organization can set up on its own servers with minimal customization.

Many large companies never entirely got away from the terminal model because of these benefits: having most employees work on workstations that could be networked together to simplify sharing files and other resources is necessary when you’re talking about larger teams. Having more then ten people email around copies of a file just doesn’t work. Even those sections of an organization that embraced laptops (such as sales) still expect their hardware to connect to the network.

The Tablet’s Advantage Over the Terminal

With the ‘always on’ nature of business today, a tablet does have advantages over a traditional terminal beyond what you might expect from the advancing march of technology. While many tablet users rely on WiFi, the ability to connect through mobile networks means that even when an employee isn’t in the office, she may be sitting in on a meeting, editing a memo or otherwise taking part in the daily activities of the company.

Having immediate access to organizational documents, project management tools and the like is crucial if you’re going to deal with a team that is not constantly in the office. Even for teams that are not distributed all over the world, it’s becoming the norm for team members to choose to work outside of the office on a regular basis.

Tablets do need the right tools in order to come into their own as enterprise tools. What works for an individual or a handful of people may not work for a company with thousands of employees who need to interact. The crucial differences come down to how data is handled. Data must be secure. A number of cloud-based products also offer on-premise solutions that allow an organization to control its own data more diligently.

There are some jobs that a tablet cannot currently do and may not be able to handle in the near future. Running the software necessary to design a building falls into that category. But there are entire departments at most enterprise-level organizations that could be moved over to tablets tomorrow. Human resources professionals, for instance, can fulfill most of their responsibilities on an iPad, especially if they can plug in a keyboard for particularly lengthy bouts of typing. The tools necessary for enterprise adoption of tablets are already here, offering big organizations better options for controlling their data and easier options for working with distributed work forces.

By Clement Tse

Clement Tse is Chief System Engineer of Anywhere Pad by Azeus. For over a decade, he has focused on selecting and evaluating applicable technologies for their enterprise projects, determining how they can work together, and identifying their strengths and weaknesses.

About CloudTweaks

Established in 2009, CloudTweaks is recognized as one of the leading authorities in connected technology information and services.

We embrace and instill thought leadership insights, relevant and timely news related stories, unbiased benchmark reporting as well as offer green/cleantech learning and consultive services around the world.

Our vision is to create awareness and to help find innovative ways to connect our planet in a positive eco-friendly manner.

In the meantime, you may connect with CloudTweaks by following and sharing our resources.

View All Articles

Sorry, comments are closed for this post.

Comics
Are Cloud Solutions Secure Enough Out-of-the-box?

Are Cloud Solutions Secure Enough Out-of-the-box?

Out-of-the-box Cloud Solutions Although people may argue that data is not safe in the Cloud because using cloud infrastructure requires trusting another party to look after mission critical data, cloud services actually are more secure than legacy systems. In fact, a recent study on the state of cloud security in the enterprise market revealed that…

Achieving Network Security In The IoT

Achieving Network Security In The IoT

Security In The IoT The network security market is experiencing a pressing and transformative change, especially around access control and orchestration. Although it has been mature for decades, the network security market had to transform rapidly with the advent of the BYOD trend and emergence of the cloud, which swept enterprises a few years ago.…

Three Challenges of Network Deployment in Hyperconverged Infrastructure for Private Cloud

Three Challenges of Network Deployment in Hyperconverged Infrastructure for Private Cloud

Hyperconverged Infrastructure In this article, we’ll explore three challenges that are associated with network deployment in a hyperconverged private cloud environment, and then we’ll consider several methods to overcome those challenges. The Main Challenge: Bring Your Own (Physical) Network Some of the main challenges of deploying a hyperconverged infrastructure software solution in a data center are the diverse physical…

Beacons Flopped, But They’re About to Flourish in the Future

Beacons Flopped, But They’re About to Flourish in the Future

Cloud Beacons Flying High When Apple debuted cloud beacons in 2013, analysts predicted 250 million devices capable of serving as iBeacons would be found in the wild within weeks. A few months later, estimates put the figure at just 64,000, with 15 percent confined to Apple stores. Beacons didn’t proliferate as expected, but a few…

2017 Brings DLP Technology and IoT’s Weaknesses to Light

2017 Brings DLP Technology and IoT’s Weaknesses to Light

DLP Technology In regards to data loss prevention (DLP), in the last five years many companies rushed to implement DLP solutions without taking the time to first identify the data that should not transit egress points. Most of these rushed implementations have not been successful. Security analysts, in particular 451 Research, have been recommending that…

Using Cloud Technology In The Education Industry

Using Cloud Technology In The Education Industry

Education Tech and the Cloud Arguably one of society’s most important functions, teaching can still seem antiquated at times. Many schools still function similarly to how they did five or 10 years ago, which is surprising considering the amount of technical innovation we’ve seen in the past decade. Education is an industry ripe for innovation…

Lavabit, Edward Snowden and the Legal Battle For Privacy

Lavabit, Edward Snowden and the Legal Battle For Privacy

The Legal Battle For Privacy In early June 2013, Edward Snowden made headlines around the world when he leaked information about the National Security Agency (NSA) collecting the phone records of tens of millions of Americans. It was a dramatic story. Snowden flew to Hong Kong and then Russia to avoid deportation to the US,…

The Importance of Cloud Backups: Guarding Your Data Against Hackers

The Importance of Cloud Backups: Guarding Your Data Against Hackers

The Importance of Cloud Backups Cloud platforms have become a necessary part of modern business with the benefits far outweighing the risks. However, the risks are real and account for billions of dollars in losses across the globe per year. If you’ve been hacked, you’re not alone. Here are some other companies in the past…

Cyber Criminals Are Business People Too

Cyber Criminals Are Business People Too

Cyber Crime Business You’re on the morning train on the way to work and take a look at the guy next to you. He’s clean-cut, wearing a crisp suit and holding a leather briefcase just like dozens of others. Just another worker headed to the office, right?. Yes, but not in the way you think…