Three Laws of Mobility is a little known setup from two former Google executives Gaurav Mathur and Tom Moss. They have setup a business which wants to create enterprise-class security that beats BlackBerry. On their website they state, quite simply, what they’re about
- Protect your user. A mobile device may not harm its user or, through inaction, allow its user to come to harm though malicious code or content.
- Protect yourself. A mobile device must protect itself and the integrity of its data and secured communications.
- Obey. A mobile device must let the user use the device freely, as long as such usage does not conflict with the First or Second Law.
What does the acquisition by Motorola of 3LM mean to the Android platform as a whole? Firstly, 3LM Inc will be an independently run organisation which will be wholly owned by Motorola but not device-locked. They have strategic partnerships with HTC and Sharp. But what is the 3LM technology and how will it change Android enterprise computing?
3LM platform will help IT managers to better secure their infrastructure and how they go about this by allowing managers to better administer their users and more importantly devices. Therefore ICT Managers who have a pre-defined LDAP and/or Active Directory groups can have better control of their users/devices. With this system in place network administrators can remotely install, wipe, lock out, recall or perform any other corporate ICT policy objective with ease.
Secure enterprise computing with Android Is that possible? With 3LM’s platform yes it is. With their secure enterprise link technology it takes away the requirement of password credentials and links via an encrypted connection to the internet, corporate resources and intranet simultaneously. And on top of this it links with Corporate Exchange servers to deliver quick and up-to-date mission critical information from calendars, documents to email. These combined elements will create an Android enterprise platform which could surpass even BlackBerry.
2011 is going to be the year of the Tablet and added to this will be the increase in smart phones sales. Business organisations are now looking at these devices as viable replacements of Laptops and even desktop devices. These devices can increase productivity and allow a greater distribution of resources in different environments without losing your businesses security or data integrity.
Although, market research firm Gartner Analysis predicted in 2010 that Tablet PC’s wont account for more than 10% of the enterprise-class computing device market before 2015. Gartner adds that it will take the consumer market to ‘push’ the enterprise-class market into changing. This is because it is cheaper for personal consumer users to upgrade than enterprise-class overhauls. Yet, does the increase in smartphones being brought to work which is a challenge to ICT professionals and the boom in tablets mean ICT professionals will be forced to think about ways of securing their organisations data integrity?
Only time will tell whether Motorola’s acquisition and the broader partnership with HTC et al will bring about a change in the Smartphone/Tablet enterprise-level market and break the BlackBerry monopoly?