Application Optimization Application Performance Application Placement Application Rationalization Data Center Data Center Migration Data Center Strategy Hybrid Data Center Data Center Facilities Financial Leasing Infrastructure Optimization Network Optimization Server Optimization Storage Optimization IT Management C-Suite Collaboration IT Workforce IT Security Big Data Security Cloud Security Data Security Mobile Security Virtual Security Workspace Security IT Strategy Maintenance Managed Services Most Popular Articles Recoverability Business Continuity & Disaster Recovery Data Protection & Recovery Management Service Management Sourcing Transformational Technologies Cloud Convergence Mobility Virtualization Workspace Communications & Collaboration End-User Computing
Application Optimization Application Performance Application Placement Application Rationalization Data Center Data Center Migration
Videos SlideShares White Papers Webinars Slideshows Infographics
Stay Connected get our newsletter Subscribe Now
IT FOCUS AREA: Network Optimization
more in Network Optimization

Is Your Network Ready to Mobilize?

Mobile Workforce and the Network

Today's worker uses more than three mobile devices. This extends the workday and the places where employees can work. It also broadens the access areas for connecting to the corporate network.

To give our readers a better understanding of how mobility is affecting the network, FOCUS Magazine did some research on this topic and created the below infographic.


Some things to think about when you read it:


  • The number of network-connected devices will be three times the global population in 2016.
  • Global mobile data traffic will increase by 400 percent by 2016.
  • Two-thirds of the world’s mobile data traffic will be video by 2016.
  • Public Wi-Fi hotspots are on the rise, expected to increase by 350 percent by 2015.
  • The wireless power on a tablet is less than that of a laptop, increasing the need for network access points.

Network Optimization Infographic

Leave A Comment

Policy for Comments

Please make sure your comments follow these guidelines:

- Use your real name, not keywords
- No signature links in your comments
- No foul language (please)

Readers are solely responsible for the content of the comments they post here. Comments are subject to the site's terms and conditions of use and do not reflect the opinion or approval of Forsythe Technology. Readers whose comments violate the terms of use may have their comments removed.

You might also like

Network Optimization
Network Optimization

Is Your Network Ready for Mobility?

Your workforce is going mobile. Can your network keep up with the demand?
Mobile Security
Mobile Security

Is Your Company Ready for Mobile Tech Gifts?

Learn how to develop the right mobile security strategy for your organization.
Mobile Security
Mobile Security

3 Steps to BYOD Security

How to protect your organization from security risks associated with employees bringing their own devices to work.
Subscribe To Our Newsletter