Tablet Adoption – Enterprise Is Returning To The Terminal

Tablet Adoption – Enterprise Is Returning To The Terminal

We spend a lot of time talking about the cloud, apps and mobile these days. The language is new, but it really represents a return to a mode of technology that enterprise-level organizations have always loved. Tablet adoption is up among enterprise users, especially iPads. And with that adoption rate, laptop use is dropping. Among iPad owners in enterprise, 12 percent report that their tablets have entirely replaced their laptops.

With a tablet and the right suite of apps, an organization can effectively return to the terminal model. Data is saved to the cloud, accessible both from employees’ tablets and any other computer they might use. There are a lot that tablets (and terminals) aren’t capable of, but for the data-entry and communications that make up a large portion of what an employee might do during the course of the day, they are sufficient.

The Benefits of a Terminal-Based World

For enterprise-level organizations, handing out tablets to employees, rather than laptops, has some serious benefits.

Organizations have more control over their data. Not only does having all data stored remotely in a system that the organization controls limit the potential for theft of that data, it also means that managers can keep a closer eye on how employees are using company resources.

It’s easier to safeguard a server or a mainframe from the sorts of accidents that happen to the hardware that employees use everyday. If someone destroys a tablet, very little data will actually be lost.

Costs can be better controlled when you can configure software once and then allow a variety of hardware to access it. The costs of tablets are continuing to drop and many app builders have focused on creating versions of their products that an organization can set up on its own servers with minimal customization.

Many large companies never entirely got away from the terminal model because of these benefits: having most employees work on workstations that could be networked together to simplify sharing files and other resources is necessary when you’re talking about larger teams. Having more then ten people email around copies of a file just doesn’t work. Even those sections of an organization that embraced laptops (such as sales) still expect their hardware to connect to the network.

The Tablet’s Advantage Over the Terminal

With the ‘always on’ nature of business today, a tablet does have advantages over a traditional terminal beyond what you might expect from the advancing march of technology. While many tablet users rely on WiFi, the ability to connect through mobile networks means that even when an employee isn’t in the office, she may be sitting in on a meeting, editing a memo or otherwise taking part in the daily activities of the company.

Having immediate access to organizational documents, project management tools and the like is crucial if you’re going to deal with a team that is not constantly in the office. Even for teams that are not distributed all over the world, it’s becoming the norm for team members to choose to work outside of the office on a regular basis.

Tablets do need the right tools in order to come into their own as enterprise tools. What works for an individual or a handful of people may not work for a company with thousands of employees who need to interact. The crucial differences come down to how data is handled. Data must be secure. A number of cloud-based products also offer on-premise solutions that allow an organization to control its own data more diligently.

There are some jobs that a tablet cannot currently do and may not be able to handle in the near future. Running the software necessary to design a building falls into that category. But there are entire departments at most enterprise-level organizations that could be moved over to tablets tomorrow. Human resources professionals, for instance, can fulfill most of their responsibilities on an iPad, especially if they can plug in a keyboard for particularly lengthy bouts of typing. The tools necessary for enterprise adoption of tablets are already here, offering big organizations better options for controlling their data and easier options for working with distributed work forces.

By Clement Tse

Clement Tse is Chief System Engineer of Anywhere Pad by Azeus. For over a decade, he has focused on selecting and evaluating applicable technologies for their enterprise projects, determining how they can work together, and identifying their strengths and weaknesses.

About CloudTweaks

Established in 2009, CloudTweaks is recognized as one of the leading authorities in connected technology information and services.

We embrace and instill thought leadership insights, relevant and timely news related stories, unbiased benchmark reporting as well as offer green/cleantech learning and consultive services around the world.

Our vision is to create awareness and to help find innovative ways to connect our planet in a positive eco-friendly manner.

In the meantime, you may connect with CloudTweaks by following and sharing our resources.

View All Articles

Sorry, comments are closed for this post.

Adopting A Cohesive GRC Mindset For Cloud Security

Adopting A Cohesive GRC Mindset For Cloud Security

Cloud Security Mindset Businesses are becoming wise to the compelling benefits of cloud computing. When adopting cloud, they need a high level of confidence in how it will be risk-managed and controlled, to preserve the security of their information and integrity of their operations. Cloud implementation is sometimes built up over time in a business,…

Beacons Flopped, But They’re About to Flourish in the Future

Beacons Flopped, But They’re About to Flourish in the Future

Cloud Beacons Flying High When Apple debuted cloud beacons in 2013, analysts predicted 250 million devices capable of serving as iBeacons would be found in the wild within weeks. A few months later, estimates put the figure at just 64,000, with 15 percent confined to Apple stores. Beacons didn’t proliferate as expected, but a few…

Why Security Practitioners Need To Apply The 80-20 Rules To Data Security

Why Security Practitioners Need To Apply The 80-20 Rules To Data Security

The 80-20 Rule For Security Practitioners  Everyday we learn about yet another egregious data security breach, exposure of customer data or misuse of data. It begs the question why in this 21st century, as a security industry we cannot seem to secure our most valuable data assets when technology has surpassed our expectations in other regards.…

Is Machine Learning Making Your Data Scientists Obsolete?

Is Machine Learning Making Your Data Scientists Obsolete?

Machine Learning and Data Scientists In a recent study, almost all the businesses surveyed stated that big data analytics were fundamental to their business strategies. Although the field of computer and information research scientists is growing faster than any other occupation, the increasing applicability of data science across business sectors is leading to an exponential…

7 Common Cloud Security Missteps

7 Common Cloud Security Missteps

Cloud Security Missteps Cloud computing remains shrouded in mystery for the average American. The most common sentiment is, “It’s not secure.” Few realize how many cloud applications they access every day: Facebook, Gmail, Uber, Evernote, Venmo, and the list goes on and on… People flock to cloud services for convenient solutions to everyday tasks. They…

Using Private Cloud Architecture For Multi-Tier Applications

Using Private Cloud Architecture For Multi-Tier Applications

Cloud Architecture These days, Multi-Tier Applications are the norm. From SharePoint’s front-end/back-end configuration, to LAMP-based websites using multiple servers to handle different functions, a multitude of apps require public and private-facing components to work in tandem. Placing these apps in entirely public-facing platforms and networks simplifies the process, but at the cost of security vulnerabilities. Locating everything…

Having Your Cybersecurity And Eating It Too

Having Your Cybersecurity And Eating It Too

The Catch 22 The very same year Marc Andreessen famously said that software was eating the world, the Chief Information Officer of the United States was announcing a major Cloud First goal. That was 2011. Five years later, as both the private and public sectors continue to adopt cloud-based software services, we’re interested in this…

5% Of Companies Have Embraced The Digital Innovation Fostered By Cloud Computing

5% Of Companies Have Embraced The Digital Innovation Fostered By Cloud Computing

Embracing The Cloud We love the stories of big complacent industry leaders having their positions sledge hammered by nimble cloud-based competitors. Saleforce.com chews up Oracle’s CRM business. Airbnb has a bigger market cap than Marriott. Amazon crushes Walmart (and pretty much every other retailer). We say: “How could they have not seen this coming?” But, more…

Cost of the Cloud: Is It Really Worth It?

Cost of the Cloud: Is It Really Worth It?

Cost of the Cloud Cloud computing is more than just another storage tier. Imagine if you’re able to scale up 10x just to handle seasonal volumes or rely on a true disaster-recovery solution without upfront capital. Although the pay-as-you-go pricing model of cloud computing makes it a noticeable expense, it’s the only solution for many…