Posts

Showing posts from February, 2013

Add new user to SUP

http://scn.sap.com/community/mobile/blog/2012/08/22/configure-sup-to-use-opendj-as-authentication-provider

Workflow for SUP 2.1.3 examples Client Initiated and Server Initiated

Unavoidable: Over 60 percent of companies to allow BYOD soon

As more and more employees bring their personal smartphones, tablets and laptops to the office, or use them offsite as they take their work home, IT departments are grappling with the growing Bring Your Own Device (BYOD) trend. This change in how people work and the devices they’re working on is leading to many IT departments setting BYOD guidelines to protect company security as employees access email and other potentially proprietary data on their own devices. By setting guidelines, access to data is controlled and productivity can be extended to these devices. BYOD is both a menace as well as an essential. Hence there should be control as well as availability. Every person is unique and is comfortable with a particular device/brand of his own. As a company it can be a financial bomb to supply all employees with their own type of device. In such cases it is easier to let employees bring their own devices. According to our research,The advantages of BYOD are as below Shift costs to