The challenge is the effective adaptation of your business processes to the possibilities of mobility.
At a time when almost no one is already discussing the ability of mobile technologies to offer new perspectives and possibilities, the challenges faced by companies seeking to modernize themselves with the use of mobile-based systems and platforms are still related, more than with the expansion of communication channels with its customers – which for years have been buying and reporting from their smartphones and tablets – with the effective adaptation of their business processes to the possibilities of mobility.
Business processes – and, in particular, the operational part of them – are still too based on the fixed or traditional workplace, which forces the technician to wait to get to the office to dump remote sensor readings, the Project manager to still need the traditional PC to work, or that prevent dispersed machines from communicating in real time their operating parameters. Mobility is reducing, and should do much more in the near future, the distance between processes – or between commercials and their managers, between measuring devices and plant engineers, or between patients and their doctors – so it is one of the key foundations of what has been called the digital explosion, even more promise than reality, indoors, in many Spanish companies.
Assuming the innovation component in business processes, organizations will have to continue to pay attention to certain keys (not known, less salient) in order to advance in the deployment of mobile technologies: first – and not necessarily for (ERP, CRM, BI, SCM, M2M …), and the underlying processes, calibrating the consequences of this for their models and technological services commitments. Second, they will have to end up incorporating personal mobility (employees, customers, suppliers … and also, things) into their technological ecosystems, still reluctant, in many cases, to accept other people’s elements. Thirdly, and closely related to this, they must improve the way in which they are adapting security policies, procedures and technologies to the problem of loss of control – and new threats as a result – inherent in the dissemination of Critical information systems in mobile devices, of unknown origin and in the hands of anyone.
On the other hand, manufacturers will have to continue to deal with the oldest, most limiting problem – inexplicably for many – worse solved to date: that of accumulation and energy consumption in their devices.