BYOD and Service Desks

Service Desks

BYOD and Service Desks

Randstand Technologies, a successful IT firm and thought leader in service desk operations, recently put out a compelling Infographic called “The Future of Service Desks: All About User Experience.” IT service desks have become a staple of many businesses within the past few years. Mobile technology and social media are basically forcing IT help desks to improve or be left behind. Many professionals say it’s about time.

From Jeff Brandt of Randstad Technologies: “Connected devices and social media are a mainstay of today’s mobile workforce and many end-users seek IT service desk support while away from their desks.”

Some interesting points from the Infographic:

  • Social engagement: Social media and forums will be used to brainstorm solutions and receive incoming service requests.
  • Mobile applications: Connected mobile users will be able to schedule appointments, check the status of a service ticket, or receive maintenance alerts right on their smartphones.
  • Virtual assistance: Users will can start and instant chat with a technician or even access answers to questions, all without the hassle of getting up and walking to the physical service desk.
  • Traditional phone support: Fear not, robots are not taking over yet, and no IT department will cut its call-in lines anytime soon. Users will always be in need of immediate support and many customers still prefer talking to a live person.

IT service desks have become increasingly popular over the last few years in a recent surge of “Bring Your Own Device” (BYOD) solutions provided to customers. Some experts are predicting the BYOD industry could see as many as 328 million workers in 2017. This is a significant increase of job growth, up from 175 million workers in 2014. This means that not only will companies have to evolve to allocate resources for the cloud and big data, but for service desk resources as well.

What new changes have you seen with BYOD applications or virtual service desks? Let us know in the comment section below!

See the Infographic below courtesy of Randstad.

BYOD and Service Desks

Mark Barrenechea

Security is Job 1: Machines vs. Machines

Digital is redefining cybercrime and cyberwarfare Cyberattacks today are multi-stage, hard to discover and highly targeted. Some security threats are accidental, stemming from unauthorized employee access. As much as 38% of attacks come from internal ...
Anita Raj

A Winning Data Strategy Series Part 3: From Data-driven To An Insight-driven Organization

Insight-driven Organization This is the third piece of a 5-part series on plugging the obvious but overlooked gaps in achieving digital success through a refined data strategy. Data is essential, yes. But the whole idea ...
Google Prog

Working with security researchers to make the web safer for everyone

Working with security researchers What do a 19-year-old researcher from Uruguay, a restaurant owner from Cluj, Romania and a Cambridge professor have in common? They’re all security researchers—a global community of professionals, academics, students and ...
Aarti Parikh

Serverless Multi-Tier Architecture on AWS

Serverless Multi-Tier Architecture Multi-tier Architecture Multi-tier Architecture is also known as n-tier architecture. In such architecture, an application is developed and distributed in more than one layer. The number of layers depend on business requirements ...
Or Lenchner

Using an IPPN to fight ad fraud: your questions, answered

Using an IPPN to fight ad fraud It’s a well-known fact: the internet is a marketer’s dream, offering brands the chance to engage with consumers on a one-to-one basis, on a huge scale. Ads can ...
Martin Mendelsohn

The Growth of Third Party Risk Management (TPRM) Firms

Cybersecurity and the Continued Risks Back in the day, we played cops and robbers with sticks and plastic squirt guns.  Sometimes you were pursued, at other times you were the pursuer.  There wasn’t much more ...