SlideShare a Scribd company logo
1 of 19
TEC H | 10/04/2013 @ 6:15PM | 15,497 views
“Cell phones” at work are not new. Nor are smart phones. Many
credit
Blackberry for inventing the concept, but few would argue that
Apple with its
iPhone, more than other device created this explosive
phenomena called
BYOD – Bring Your Own Device to work.
Most of what BYOD seems to represent so far is an unbalanced
equation in
favor of employees. Employees may be happier because they
can carry their
favorite device to get company email, but it is not clear that
employers are
happy with the results. Keep in mind, that 90%+ of BYOD
activities are
email, calendar, personal banking, news, family life
coordination, Twitter
and Facebook, but little else.
In my conversations with business and technology leaders,
many
organizations are asking themselves if the fully loaded costs of
~$5.50/month/employee, in addition to any device or services
subsidy, is
worth it to the company.
If BYOD 1.0 is about employees, what might a BYOD 2.0 look
like?
What are enterprises looking to get out of BYOD going
forward? With this in
mind, I have been asking a lot of CIO’s, Directors of IT and
other smart
people what they think.
Once such person is Yaacov Cohen, CEO of harmon.ie, a fast
growing
enterprise mobility company. Yaacov talks to senior executives
around the
world about how better collaborated ideas and increased
productivity can
take place via personal use of mobile devices at work – and he
has some
pretty interesting insights to share.
1. Yaacov, how do we move from this Bring Your Own Device
(BYOD)
paradigm into BYOD 2.0, which you talk about as more of a
“Use Your Own
Device” mentality?
“Everyone has been talking about BYOD, which should be more
than
bringing their devices to work and then putting them to the side
and saying,
“Hey, stay quiet. Don’t disturb me. I’ve got a lot of work to
do.” And they go
to their laptops and do most of their work.”
“We want to change that. Business leaders are looking for
change. The
mobile enterprise and BYOD 2.0 is not about bringing devices
to work; it is
about using devices for work. How does business turn these
shiny new toys
into business tools?”
“That means allowing employees to work with customers,
review contracts,
write blog posts – do real work on mobile devices.”
2. Is BYOD a good idea in a practical sense?
“BYOD essentially means freedom of choice. Today’s IT
professionals
recognize the need to work with users rather than impose
procedures and
systems on them. BYOD is an expression of our world, which is
becoming
more democratic and more engaging.”
“We’ve gotten stuck on the infrastructure side of things. It is
true that mobile
brings a lot of questions about security. What happens if I lose
my device?
What happens if an employee leaves the company with sensitive
records on
his mobile device? We need to address these issues and then we
need to
move beyond them.”
3. What are the key business drivers for how enterprise should
invest in
BYOD 2.0?
“The primary business driver is getting work done. Business
users do not
want to compromise. The want convenience. They want to be
able to do the
work without being tethered to their laptops. People deserve and
demand a
great user experience.”
“There are other drivers too. There are growing worries about
the high costs
of data leakage and redundant licenses caused when business
users ‘go
rogue’. Employee use of unsanctioned IT resources that are
outside the
Bob Egan, Contributor
I write about mobile
BYOD As We Know It Is Dead - Forbes
http://www.forbes.com/sites/bobegan/2013/10/04/byod-as-we-
know-it-is...
1 of 2 1/30/2014 1:38 PM
This article is available online at:
http://www.forbes.com/sites/bobegan/2013/10/04/byod-as-we-
know-it-is-dead/
supervision of corporate IT is rampant. I worry a lot about the
potential for
U.S. businesses facing billions in cleanup costs caused by
unintentional data
leakage, and to use a Bob Egan phrase “the digital exhaust”.
Let’s not
forget the hundreds of millions more in redundant licenses that
are likely to
become more visible over time. It should be common sense that
employees
are going to use whatever they need to do to get work done.
This will not
change until IT and the business leaders sort out how to make
enterprise
collaboration services easily mobile accessible.”
4. How significant are Cloud services for BYOD?
“The cloud is essential to the mobile enterprise. Documents are
still the
foundation of business: spreadsheets, presentations, documents
where I put
my thoughts down or write business proposals. So we need to
enable
document collaboration at the office and on-the-go. Microsoft
with Office
365 has done a terrific job of creating an office-enabled cloud,
and vendors
like harmon.ie bring full-featured, native Office 365 and
SharePoint access to
multiple devices – iPads, iOS devices and Blackberry.”
5. It’s not always about investing in new applications. Existing
tools and
solutions relevant too. True?
“Absolutely. I think mobility is not about introducing new tools
that I’m not
comfortable using. “I’m just doing it for the sake of being
mobile, being cool,
being a technologist. A lot of people are not ready to give up on
Excel. Let’s
face it. Some might like it; some might hate it – but can you
live without it?
Sometimes we end up switching between the means and the
purpose. The
purpose is getting things complete, not learning new tools.”
6. What are the top three best practices that are trending
through your
conversations with company leaders?
#1 – Enterprise mobility is the right way to go and we need to
provide
mobility to end-users. The trend is about thinking beyond the
device and
much more about using mobile to get real work done that drives
revenue for
a company and improves customer satisfaction.
#2 – IT needs to switch from being a gatekeeper to being a
technology
opener. It is not about chief information officer. It is about
chief innovation
officer.
#3 – Do not confuse innovation and disruption. Provide an
innovation
that is easily absorbable by your mainstream business users.
“Business users do not care about IT – and that is something
that IT folks
tend to forget. The last thing they care about is a name. They do
not care if it
comes from Microsoft or Box or Java, or from IBM, or Google.
They care
that they want to get their jobs done so that they can get home
to do other
things. The Enterprise IT has yet to deliver.”
In Summary:
If BYOD 1.0 has been responding to the needs of the employee,
BYOD 2.0
efforts will focus more on the needs of where the enterprise and
the
employee intersect. Perhaps the most valuable key attribute of
BYOD 2.0 will
be to provide right- time experience (user interface + user
experience) to the
systems, solutions and points of collaboration that are mutually
relevant to
the company and to the employee.
Over the next month, I will writing more about developing and
bringing very
scalable, great experiences to employees – and to customers,
through the
mobile channel. I’m also planning more executive interviews. In
the
meantime, let me know what you think !
BYOD As We Know It Is Dead - Forbes
http://www.forbes.com/sites/bobegan/2013/10/04/byod-as-we-
know-it-is...
2 of 2 1/30/2014 1:38 PM
Exploring new mobile and cloud platforms without a
governance strategy can
have consequences.
At the beginning of my IT career, I witnessed a number of
decisions and project management practices which, at the
time, just didn't seem to make sense. But I was young, and I
often thought to myself that the people involved must have
some other reasoning, some justification for their actions that I
was just not privy to.
In short, I remained quiet when I should have spoken up. What
two decades of experience has taught me is that there
is rarely reasoning or justification behind actions that, at a gut-
level, are clearly bad IT practices. We inherently
recognize when common sense has taken a back seat.
There is most definitely a dark side to BYOD. For the most
part, I am an advocate for the consumerization of IT (using
non-standard apps and tools as a way to increase end user
engagement and productivity) and support the bring-your-
own-device model.
However, as a seasoned manager and IT operations leader, I
recognize the risks that come with the model if
organizations do not properly plan out their strategies, putting
sufficient protections and governance practices in place
to manage the potential risks that could come from these
unsupported devices and applications. End users often want
what’s NEW, but there are valid reasons for imposing and
enforcing safeguards when giving mobile business users
access to your otherwise secure, scalable, and compliant
systems.
Some people equate governance with bureaucracy and
hierarchical systems, but those perceptions often come from a
lack of appreciation for the potential risks involved.
Governance is about checks and balances -- supporting the tools
and systems your end users want, but in a way that is
manageable and which follows defined protocols.
Examples of rogue IT practices
A (http://harmon.ie/blog/new-survey-reveals-mobile-rogue-it-
costing-us-organizations-almost-2b)recent uSamp survey
(http://harmon.ie/blog/new-survey-reveals-mobile-rogue-it-
costing-us-organizations-almost-2b) found that 41% of US
mobile business
users have used unsanctioned services to share or sync files,
despite 87% saying they are aware that their company
has a document sharing policy that prohibits this practice. And,
27% of mobile business users who “went rogue”,
reported immediate and direct repercussions, from lost business
to expensive lawsuits and financial penalties that cost
$2 billion.
While most IT professionals understand these risks viscerally,
some business users need to crash and burn before
they are willing to adjust their risky behaviors, which is not a
message your employer wants to hear. Luckily, there is
another way: learning from the mistakes of others. This month,
I am one of six mobile security and IT experts judging a
(http://www.rogueitstories.com/)"Rogue IT" contest
(http://www.rogueitstories.com/). We’re collecting anonymous
stories from the
community about mobile and cloud-based app failures caused by
business and IT users who disregard corporate
BYOD AND THE CONSUMERIZATION OF IT
The dark side of BYOD
By Guest Contributor in Tech Decision Maker, October 13,
2013, 5:00 PM PST
Page 1 of 5The dark side of BYOD - TechRepublic
1/30/2014http://www.techrepublic.com/blog/tech-decision-
maker/the-dark-side-of-byod/
governance practices. These real-world horror stories are great
examples of the prevalence of rogue IT behaviors at
work, and the very real risks they bring.
For example, within a $500 million health and wellness
company, a consultant was hired to audit their IT systems to
ensure their systems and practices were compliant with industry
regulations and best practices. It was very quickly
identified that end users were sharing sensitive customer data
(credit card numbers, bank routing numbers) using
public email channels (Hotmail, Gmail) and through consumer
instant messaging platforms (AOL Messenger, Yahoo
Messenger, MSN Messenger), despite approved and documented
communications processes.
Because the consultant was required to report the violations, the
CFO immediately took steps to lock down all
unauthorized collaboration tools, and instituted immediate
policy changes. The company was given just days to
comply, with hefty fines for each violation identified plus more
fines for each day their systems were found to be non-
compliant.
In another example, a European company was getting an
increasing number of requests from its users to connect
personal iPads and smartphones to company systems. While IT
resisted these requests for several months, the
company finally decided to open up its email systems to a
“select number of executives” and shared the necessary
passwords. Six weeks later, IT ran an audit on the system and
found ten-times the number of employees connected
into the corporate back end environment as had been approved.
The passwords had apparently been shared across
the organization.
And at a large non-profit, the security team found out that
several teams using Dropbox without IT authorization had
recently been hacked. To understand how their system had been
compromised, they contacted the popular cloud-
storage vendor, telling the person over the phone that they
wanted to know more about how their organization had
been using the platform. The phone rep volunteered more data
than they had expected, telling them "We have a list of
1600 user names and their email addresses. Would you like that
list?" The cloud-storage vendor was clearly interested
in moving to them to the enterprise version, and was willing to
share a customer list without even authenticating the
person who called!
Proactive governance
There are similar traits that run through each of these real-world
examples. For one, individuals subverting established
processes and informed IT leaders with the goal of “getting
work done faster." On the flip side, many IT organizations
are not listening to the needs of their employees, causing some
to feel that they have no other choice but to "go
around" IT so that they can get their jobs accomplished.
In each case, the lack of clearly documented -- and transparent -
- change management practices may be at the root
cause of the problem; practices that provide a more open dialog
between IT and end users about what is needed, and
how some consumer-driven tools and practices may not be the
best fit for an enterprise.
Governance should not be feared or ignored, but looked at by
both management and end users as an important aspect
of the change management model. Organization make
governance and change management a priority are able to
more quickly recognize new requests as they come in, validate
requirements to make sure requests are aligned with
business activities, and ensure that all new tools and apps meet
the standards and regulations, reducing the risks of
data meltdowns and unintentional-but-potentially-significant
losses.
Page 2 of 5The dark side of BYOD - TechRepublic
1/30/2014http://www.techrepublic.com/blog/tech-decision-
maker/the-dark-side-of-byod/
Christian Buckley is the Chief Evangelist at Metalogix. Keep an
eye out here for more coverage from Christian's stint as
judge at the "Rogue IT" contest.
Add your Comment
You Might Have Forgotten
About These 20 Actors We
Lost Too Soon
— Rant Lifestyle
If You've Ever Thought of
Buying an iPad You Need
to Read This
— Life Factopia
Little known way to pay off
mortgage
— Weekly Financial
Solution
Experts Select The Best
Credit Cards of 2014
— Next Advisor
You May Also Like about these links
Editor's Picks
Page 3 of 5The dark side of BYOD - TechRepublic
1/30/2014http://www.techrepublic.com/blog/tech-decision-
maker/the-dark-side-of-byod/
WHITE PAPERS // FROM ARUBA NETWORKS
Aruba Networks - MOVE Architecture - Video
This 2 minute video displays how Mobile Virtual Enterprise
(MOVE) Architecture delivers secure
BYOD and a mobility experience for everyday work.
Watch it here now.
WATCH NOW
WHITE PAPERS // FROM IBM
Security Essentials for CIOs: Enabling Mobility - Their device,
your data
DOWNLOAD NOW
WHITE PAPERS // FROM IBM
[Research Report] Putting mobile first: best practices of mobile
technology leaders
DOWNLOAD NOW
WHITE PAPERS // FROM IBM
The flexible workplace: Unlocking value in the "bring your own
device" era
DOWNLOAD NOW
The big data question to
ask about every project
10 things you should
know about Google
Now
Internet of Things
botnet may include TVs
and a fridge
Bodhi Linux could
become a desktop
distribution contender
White Papers, Webcasts, and Downloads
Don't Miss Our Latest Updates
Page 4 of 5The dark side of BYOD - TechRepublic
1/30/2014http://www.techrepublic.com/blog/tech-decision-
maker/the-dark-side-of-byod/
See what best practices for SMBs are emerging. Visit ZDNet
today!
Editor's Daily Picks
Week in Review
IT Buying Cycle Learn more
Discover Investigate Compare Justify Optimize
Reality check for Obama's six proposed tech hubs: Job growth
not immediate
IT Employment // January 29, 2014, 1:42 PM PST
Malicious intent can turn Chrome speech recognition into
spying device
Security // January 29, 2014, 11:43 AM PST
Welcome Matt Asay, TechRepublic's newest enterprise
columnist
Open Source // January 29, 2014, 10:31 AM PST
Resource Center
Useful content from our premier sponsors
Page 5 of 5The dark side of BYOD - TechRepublic
1/30/2014http://www.techrepublic.com/blog/tech-decision-
maker/the-dark-side-of-byod/

More Related Content

Similar to TEC H 10042013 @ 615PM 15,497 viewsCell phone.docx

Consider byoc as part of desktop as service strategy
Consider byoc as part of desktop as service strategyConsider byoc as part of desktop as service strategy
Consider byoc as part of desktop as service strategyInfo-Tech Research Group
 
The key business drivers for Enterprise Mobility
The key business drivers for Enterprise MobilityThe key business drivers for Enterprise Mobility
The key business drivers for Enterprise MobilitySanjay Abraham
 
Strategy Report for NextGen BI
Strategy Report for NextGen BIStrategy Report for NextGen BI
Strategy Report for NextGen BINeil Raden
 
Managing Cloud Computing Brings Complex Duality Between IT and Business
Managing Cloud Computing Brings Complex Duality Between IT and BusinessManaging Cloud Computing Brings Complex Duality Between IT and Business
Managing Cloud Computing Brings Complex Duality Between IT and BusinessDana Gardner
 
BYOD - Highlights of "Consumerization"
BYOD - Highlights of "Consumerization"BYOD - Highlights of "Consumerization"
BYOD - Highlights of "Consumerization"NEORIS
 
2014 Guide to Backroom-to-Boardroom Payroll and HR
2014 Guide to Backroom-to-Boardroom Payroll and HR2014 Guide to Backroom-to-Boardroom Payroll and HR
2014 Guide to Backroom-to-Boardroom Payroll and HRPaylocity
 
Mti byod wp_uk
Mti byod wp_ukMti byod wp_uk
Mti byod wp_ukJ
 
What 2014 holds for Internal Communications
What 2014 holds for Internal CommunicationsWhat 2014 holds for Internal Communications
What 2014 holds for Internal CommunicationsTrefor Smith
 
A Business-Driven Approach to Mobile Enterprise Security
A Business-Driven Approach to Mobile Enterprise SecurityA Business-Driven Approach to Mobile Enterprise Security
A Business-Driven Approach to Mobile Enterprise SecurityТранслируем.бел
 
I AM NOT A NUMBER WHY USER EMPOWERMENT IS GAINING GROUND IN FORWARD-THINKING ...
I AM NOT A NUMBER WHY USER EMPOWERMENT IS GAINING GROUND IN FORWARD-THINKING ...I AM NOT A NUMBER WHY USER EMPOWERMENT IS GAINING GROUND IN FORWARD-THINKING ...
I AM NOT A NUMBER WHY USER EMPOWERMENT IS GAINING GROUND IN FORWARD-THINKING ...1E: Software Lifecycle Automation
 
BYOD Blue Paper
BYOD Blue PaperBYOD Blue Paper
BYOD Blue Paper4imprint
 
BT On The Productivity Puzzle in Collaboration
BT On The Productivity Puzzle in CollaborationBT On The Productivity Puzzle in Collaboration
BT On The Productivity Puzzle in CollaborationLeon Benjamin
 
2014 GUIDE TO BACKROOM TO BOARDROOM: PAYROLL AND HR
2014 GUIDE TO BACKROOM TO BOARDROOM: PAYROLL AND HR2014 GUIDE TO BACKROOM TO BOARDROOM: PAYROLL AND HR
2014 GUIDE TO BACKROOM TO BOARDROOM: PAYROLL AND HRJennifer Blair
 
[Report] Power to the People: Identify and Empower Your Mobile Workforce, by ...
[Report] Power to the People: Identify and Empower Your Mobile Workforce, by ...[Report] Power to the People: Identify and Empower Your Mobile Workforce, by ...
[Report] Power to the People: Identify and Empower Your Mobile Workforce, by ...Altimeter, a Prophet Company
 
201306 Technology Outlook 2013 CGi
201306 Technology Outlook 2013  CGi201306 Technology Outlook 2013  CGi
201306 Technology Outlook 2013 CGiFrancisco Calzado
 
Bring your own... Everything! The Rise of the Networked Individual
Bring your own... Everything! The Rise of the Networked IndividualBring your own... Everything! The Rise of the Networked Individual
Bring your own... Everything! The Rise of the Networked IndividualSharon Richardson
 
Technology Allows us to Reimagine Everything
Technology Allows us to Reimagine EverythingTechnology Allows us to Reimagine Everything
Technology Allows us to Reimagine EverythingASAE
 

Similar to TEC H 10042013 @ 615PM 15,497 viewsCell phone.docx (20)

Consider byoc as part of desktop as service strategy
Consider byoc as part of desktop as service strategyConsider byoc as part of desktop as service strategy
Consider byoc as part of desktop as service strategy
 
The key business drivers for Enterprise Mobility
The key business drivers for Enterprise MobilityThe key business drivers for Enterprise Mobility
The key business drivers for Enterprise Mobility
 
Strategy Report for NextGen BI
Strategy Report for NextGen BIStrategy Report for NextGen BI
Strategy Report for NextGen BI
 
Managing Cloud Computing Brings Complex Duality Between IT and Business
Managing Cloud Computing Brings Complex Duality Between IT and BusinessManaging Cloud Computing Brings Complex Duality Between IT and Business
Managing Cloud Computing Brings Complex Duality Between IT and Business
 
BYOD - Highlights of "Consumerization"
BYOD - Highlights of "Consumerization"BYOD - Highlights of "Consumerization"
BYOD - Highlights of "Consumerization"
 
2014 Guide to Backroom-to-Boardroom Payroll and HR
2014 Guide to Backroom-to-Boardroom Payroll and HR2014 Guide to Backroom-to-Boardroom Payroll and HR
2014 Guide to Backroom-to-Boardroom Payroll and HR
 
Mti byod wp_uk
Mti byod wp_ukMti byod wp_uk
Mti byod wp_uk
 
What 2014 holds for Internal Communications
What 2014 holds for Internal CommunicationsWhat 2014 holds for Internal Communications
What 2014 holds for Internal Communications
 
A Business-Driven Approach to Mobile Enterprise Security
A Business-Driven Approach to Mobile Enterprise SecurityA Business-Driven Approach to Mobile Enterprise Security
A Business-Driven Approach to Mobile Enterprise Security
 
Navigating the Flood of BYOD
Navigating the Flood of BYODNavigating the Flood of BYOD
Navigating the Flood of BYOD
 
I AM NOT A NUMBER WHY USER EMPOWERMENT IS GAINING GROUND IN FORWARD-THINKING ...
I AM NOT A NUMBER WHY USER EMPOWERMENT IS GAINING GROUND IN FORWARD-THINKING ...I AM NOT A NUMBER WHY USER EMPOWERMENT IS GAINING GROUND IN FORWARD-THINKING ...
I AM NOT A NUMBER WHY USER EMPOWERMENT IS GAINING GROUND IN FORWARD-THINKING ...
 
User empowerment and choice in downloading software
User empowerment and choice in downloading softwareUser empowerment and choice in downloading software
User empowerment and choice in downloading software
 
Consumerization of IT
Consumerization of ITConsumerization of IT
Consumerization of IT
 
BYOD Blue Paper
BYOD Blue PaperBYOD Blue Paper
BYOD Blue Paper
 
BT On The Productivity Puzzle in Collaboration
BT On The Productivity Puzzle in CollaborationBT On The Productivity Puzzle in Collaboration
BT On The Productivity Puzzle in Collaboration
 
2014 GUIDE TO BACKROOM TO BOARDROOM: PAYROLL AND HR
2014 GUIDE TO BACKROOM TO BOARDROOM: PAYROLL AND HR2014 GUIDE TO BACKROOM TO BOARDROOM: PAYROLL AND HR
2014 GUIDE TO BACKROOM TO BOARDROOM: PAYROLL AND HR
 
[Report] Power to the People: Identify and Empower Your Mobile Workforce, by ...
[Report] Power to the People: Identify and Empower Your Mobile Workforce, by ...[Report] Power to the People: Identify and Empower Your Mobile Workforce, by ...
[Report] Power to the People: Identify and Empower Your Mobile Workforce, by ...
 
201306 Technology Outlook 2013 CGi
201306 Technology Outlook 2013  CGi201306 Technology Outlook 2013  CGi
201306 Technology Outlook 2013 CGi
 
Bring your own... Everything! The Rise of the Networked Individual
Bring your own... Everything! The Rise of the Networked IndividualBring your own... Everything! The Rise of the Networked Individual
Bring your own... Everything! The Rise of the Networked Individual
 
Technology Allows us to Reimagine Everything
Technology Allows us to Reimagine EverythingTechnology Allows us to Reimagine Everything
Technology Allows us to Reimagine Everything
 

More from mattinsonjanel

The changes required in the IT project plan for Telecomm Ltd would.docx
The changes required in the IT project plan for Telecomm Ltd would.docxThe changes required in the IT project plan for Telecomm Ltd would.docx
The changes required in the IT project plan for Telecomm Ltd would.docxmattinsonjanel
 
The Catholic University of America Metropolitan School of .docx
The Catholic University of America Metropolitan School of .docxThe Catholic University of America Metropolitan School of .docx
The Catholic University of America Metropolitan School of .docxmattinsonjanel
 
The Case of Frank and Judy. During the past few years Frank an.docx
The Case of Frank and Judy. During the past few years Frank an.docxThe Case of Frank and Judy. During the past few years Frank an.docx
The Case of Frank and Judy. During the past few years Frank an.docxmattinsonjanel
 
The Case of MikeChapter 5 • Common Theoretical Counseling Perspe.docx
The Case of MikeChapter 5 • Common Theoretical Counseling Perspe.docxThe Case of MikeChapter 5 • Common Theoretical Counseling Perspe.docx
The Case of MikeChapter 5 • Common Theoretical Counseling Perspe.docxmattinsonjanel
 
THE CHRONICLE OF HIGHER EDUCATIONNovember 8, 2002 -- vol. 49, .docx
THE CHRONICLE OF HIGHER EDUCATIONNovember 8, 2002 -- vol. 49, .docxTHE CHRONICLE OF HIGHER EDUCATIONNovember 8, 2002 -- vol. 49, .docx
THE CHRONICLE OF HIGHER EDUCATIONNovember 8, 2002 -- vol. 49, .docxmattinsonjanel
 
The chart is a guide rather than an absolute – feel free to modify.docx
The chart is a guide rather than an absolute – feel free to modify.docxThe chart is a guide rather than an absolute – feel free to modify.docx
The chart is a guide rather than an absolute – feel free to modify.docxmattinsonjanel
 
The Challenge of Choosing FoodFor this forum, please read http.docx
The Challenge of Choosing FoodFor this forum, please read http.docxThe Challenge of Choosing FoodFor this forum, please read http.docx
The Challenge of Choosing FoodFor this forum, please read http.docxmattinsonjanel
 
The Civil Rights Movem.docx
The Civil Rights Movem.docxThe Civil Rights Movem.docx
The Civil Rights Movem.docxmattinsonjanel
 
The Churchill CentreReturn to Full GraphicsThe Churchi.docx
The Churchill CentreReturn to Full GraphicsThe Churchi.docxThe Churchill CentreReturn to Full GraphicsThe Churchi.docx
The Churchill CentreReturn to Full GraphicsThe Churchi.docxmattinsonjanel
 
The Categorical Imperative (selections taken from The Foundati.docx
The Categorical Imperative (selections taken from The Foundati.docxThe Categorical Imperative (selections taken from The Foundati.docx
The Categorical Imperative (selections taken from The Foundati.docxmattinsonjanel
 
The cave represents how we are trained to think, fell or act accor.docx
The cave represents how we are trained to think, fell or act accor.docxThe cave represents how we are trained to think, fell or act accor.docx
The cave represents how we are trained to think, fell or act accor.docxmattinsonjanel
 
The Case Superior Foods Corporation Faces a ChallengeOn his way.docx
The Case Superior Foods Corporation Faces a ChallengeOn his way.docxThe Case Superior Foods Corporation Faces a ChallengeOn his way.docx
The Case Superior Foods Corporation Faces a ChallengeOn his way.docxmattinsonjanel
 
The Case You can choose to discuss relativism in view of one .docx
The Case You can choose to discuss relativism in view of one .docxThe Case You can choose to discuss relativism in view of one .docx
The Case You can choose to discuss relativism in view of one .docxmattinsonjanel
 
The Case Study of Jim, Week Six The body or text (i.e., not rest.docx
The Case Study of Jim, Week Six The body or text (i.e., not rest.docxThe Case Study of Jim, Week Six The body or text (i.e., not rest.docx
The Case Study of Jim, Week Six The body or text (i.e., not rest.docxmattinsonjanel
 
The Case of Missing Boots Made in ItalyYou can lead a shipper to.docx
The Case of Missing Boots Made in ItalyYou can lead a shipper to.docxThe Case of Missing Boots Made in ItalyYou can lead a shipper to.docx
The Case of Missing Boots Made in ItalyYou can lead a shipper to.docxmattinsonjanel
 
The Cardiovascular SystemNSCI281 Version 51University of .docx
The Cardiovascular SystemNSCI281 Version 51University of .docxThe Cardiovascular SystemNSCI281 Version 51University of .docx
The Cardiovascular SystemNSCI281 Version 51University of .docxmattinsonjanel
 
The Cardiovascular SystemNSCI281 Version 55University of .docx
The Cardiovascular SystemNSCI281 Version 55University of .docxThe Cardiovascular SystemNSCI281 Version 55University of .docx
The Cardiovascular SystemNSCI281 Version 55University of .docxmattinsonjanel
 
The Case of Jeff Pedophile in InstitutionJeff is a 35-year-old .docx
The Case of Jeff Pedophile in InstitutionJeff is a 35-year-old .docxThe Case of Jeff Pedophile in InstitutionJeff is a 35-year-old .docx
The Case of Jeff Pedophile in InstitutionJeff is a 35-year-old .docxmattinsonjanel
 
The British Airways Swipe Card Debacle case study;On Friday, Jul.docx
The British Airways Swipe Card Debacle case study;On Friday, Jul.docxThe British Airways Swipe Card Debacle case study;On Friday, Jul.docx
The British Airways Swipe Card Debacle case study;On Friday, Jul.docxmattinsonjanel
 
The Case Abstract Accuracy International (AI) is a s.docx
The Case  Abstract  Accuracy International (AI) is a s.docxThe Case  Abstract  Accuracy International (AI) is a s.docx
The Case Abstract Accuracy International (AI) is a s.docxmattinsonjanel
 

More from mattinsonjanel (20)

The changes required in the IT project plan for Telecomm Ltd would.docx
The changes required in the IT project plan for Telecomm Ltd would.docxThe changes required in the IT project plan for Telecomm Ltd would.docx
The changes required in the IT project plan for Telecomm Ltd would.docx
 
The Catholic University of America Metropolitan School of .docx
The Catholic University of America Metropolitan School of .docxThe Catholic University of America Metropolitan School of .docx
The Catholic University of America Metropolitan School of .docx
 
The Case of Frank and Judy. During the past few years Frank an.docx
The Case of Frank and Judy. During the past few years Frank an.docxThe Case of Frank and Judy. During the past few years Frank an.docx
The Case of Frank and Judy. During the past few years Frank an.docx
 
The Case of MikeChapter 5 • Common Theoretical Counseling Perspe.docx
The Case of MikeChapter 5 • Common Theoretical Counseling Perspe.docxThe Case of MikeChapter 5 • Common Theoretical Counseling Perspe.docx
The Case of MikeChapter 5 • Common Theoretical Counseling Perspe.docx
 
THE CHRONICLE OF HIGHER EDUCATIONNovember 8, 2002 -- vol. 49, .docx
THE CHRONICLE OF HIGHER EDUCATIONNovember 8, 2002 -- vol. 49, .docxTHE CHRONICLE OF HIGHER EDUCATIONNovember 8, 2002 -- vol. 49, .docx
THE CHRONICLE OF HIGHER EDUCATIONNovember 8, 2002 -- vol. 49, .docx
 
The chart is a guide rather than an absolute – feel free to modify.docx
The chart is a guide rather than an absolute – feel free to modify.docxThe chart is a guide rather than an absolute – feel free to modify.docx
The chart is a guide rather than an absolute – feel free to modify.docx
 
The Challenge of Choosing FoodFor this forum, please read http.docx
The Challenge of Choosing FoodFor this forum, please read http.docxThe Challenge of Choosing FoodFor this forum, please read http.docx
The Challenge of Choosing FoodFor this forum, please read http.docx
 
The Civil Rights Movem.docx
The Civil Rights Movem.docxThe Civil Rights Movem.docx
The Civil Rights Movem.docx
 
The Churchill CentreReturn to Full GraphicsThe Churchi.docx
The Churchill CentreReturn to Full GraphicsThe Churchi.docxThe Churchill CentreReturn to Full GraphicsThe Churchi.docx
The Churchill CentreReturn to Full GraphicsThe Churchi.docx
 
The Categorical Imperative (selections taken from The Foundati.docx
The Categorical Imperative (selections taken from The Foundati.docxThe Categorical Imperative (selections taken from The Foundati.docx
The Categorical Imperative (selections taken from The Foundati.docx
 
The cave represents how we are trained to think, fell or act accor.docx
The cave represents how we are trained to think, fell or act accor.docxThe cave represents how we are trained to think, fell or act accor.docx
The cave represents how we are trained to think, fell or act accor.docx
 
The Case Superior Foods Corporation Faces a ChallengeOn his way.docx
The Case Superior Foods Corporation Faces a ChallengeOn his way.docxThe Case Superior Foods Corporation Faces a ChallengeOn his way.docx
The Case Superior Foods Corporation Faces a ChallengeOn his way.docx
 
The Case You can choose to discuss relativism in view of one .docx
The Case You can choose to discuss relativism in view of one .docxThe Case You can choose to discuss relativism in view of one .docx
The Case You can choose to discuss relativism in view of one .docx
 
The Case Study of Jim, Week Six The body or text (i.e., not rest.docx
The Case Study of Jim, Week Six The body or text (i.e., not rest.docxThe Case Study of Jim, Week Six The body or text (i.e., not rest.docx
The Case Study of Jim, Week Six The body or text (i.e., not rest.docx
 
The Case of Missing Boots Made in ItalyYou can lead a shipper to.docx
The Case of Missing Boots Made in ItalyYou can lead a shipper to.docxThe Case of Missing Boots Made in ItalyYou can lead a shipper to.docx
The Case of Missing Boots Made in ItalyYou can lead a shipper to.docx
 
The Cardiovascular SystemNSCI281 Version 51University of .docx
The Cardiovascular SystemNSCI281 Version 51University of .docxThe Cardiovascular SystemNSCI281 Version 51University of .docx
The Cardiovascular SystemNSCI281 Version 51University of .docx
 
The Cardiovascular SystemNSCI281 Version 55University of .docx
The Cardiovascular SystemNSCI281 Version 55University of .docxThe Cardiovascular SystemNSCI281 Version 55University of .docx
The Cardiovascular SystemNSCI281 Version 55University of .docx
 
The Case of Jeff Pedophile in InstitutionJeff is a 35-year-old .docx
The Case of Jeff Pedophile in InstitutionJeff is a 35-year-old .docxThe Case of Jeff Pedophile in InstitutionJeff is a 35-year-old .docx
The Case of Jeff Pedophile in InstitutionJeff is a 35-year-old .docx
 
The British Airways Swipe Card Debacle case study;On Friday, Jul.docx
The British Airways Swipe Card Debacle case study;On Friday, Jul.docxThe British Airways Swipe Card Debacle case study;On Friday, Jul.docx
The British Airways Swipe Card Debacle case study;On Friday, Jul.docx
 
The Case Abstract Accuracy International (AI) is a s.docx
The Case  Abstract  Accuracy International (AI) is a s.docxThe Case  Abstract  Accuracy International (AI) is a s.docx
The Case Abstract Accuracy International (AI) is a s.docx
 

Recently uploaded

Meghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media ComponentMeghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media ComponentInMediaRes1
 
Blooming Together_ Growing a Community Garden Worksheet.docx
Blooming Together_ Growing a Community Garden Worksheet.docxBlooming Together_ Growing a Community Garden Worksheet.docx
Blooming Together_ Growing a Community Garden Worksheet.docxUnboundStockton
 
DATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersDATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersSabitha Banu
 
Capitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptxCapitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptxCapitolTechU
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatYousafMalik24
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxSayali Powar
 
AmericanHighSchoolsprezentacijaoskolama.
AmericanHighSchoolsprezentacijaoskolama.AmericanHighSchoolsprezentacijaoskolama.
AmericanHighSchoolsprezentacijaoskolama.arsicmarija21
 
Gas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptxGas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptxDr.Ibrahim Hassaan
 
Roles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceRoles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceSamikshaHamane
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...Marc Dusseiller Dusjagr
 
Pharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfPharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfMahmoud M. Sallam
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17Celine George
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxthorishapillay1
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxEPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxRaymartEstabillo3
 
Types of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxTypes of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxEyham Joco
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxmanuelaromero2013
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Educationpboyjonauth
 
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfEnzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfSumit Tiwari
 

Recently uploaded (20)

Meghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media ComponentMeghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media Component
 
9953330565 Low Rate Call Girls In Rohini Delhi NCR
9953330565 Low Rate Call Girls In Rohini  Delhi NCR9953330565 Low Rate Call Girls In Rohini  Delhi NCR
9953330565 Low Rate Call Girls In Rohini Delhi NCR
 
Blooming Together_ Growing a Community Garden Worksheet.docx
Blooming Together_ Growing a Community Garden Worksheet.docxBlooming Together_ Growing a Community Garden Worksheet.docx
Blooming Together_ Growing a Community Garden Worksheet.docx
 
DATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersDATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginners
 
Capitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptxCapitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptx
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice great
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
 
AmericanHighSchoolsprezentacijaoskolama.
AmericanHighSchoolsprezentacijaoskolama.AmericanHighSchoolsprezentacijaoskolama.
AmericanHighSchoolsprezentacijaoskolama.
 
Gas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptxGas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptx
 
Roles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceRoles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in Pharmacovigilance
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
 
Pharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfPharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdf
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptx
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
 
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxEPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
 
Types of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxTypes of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptx
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptx
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Education
 
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfEnzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
 

TEC H 10042013 @ 615PM 15,497 viewsCell phone.docx

  • 1. TEC H | 10/04/2013 @ 6:15PM | 15,497 views “Cell phones” at work are not new. Nor are smart phones. Many credit Blackberry for inventing the concept, but few would argue that Apple with its iPhone, more than other device created this explosive phenomena called BYOD – Bring Your Own Device to work. Most of what BYOD seems to represent so far is an unbalanced equation in favor of employees. Employees may be happier because they can carry their favorite device to get company email, but it is not clear that employers are happy with the results. Keep in mind, that 90%+ of BYOD activities are email, calendar, personal banking, news, family life coordination, Twitter and Facebook, but little else. In my conversations with business and technology leaders, many organizations are asking themselves if the fully loaded costs of ~$5.50/month/employee, in addition to any device or services subsidy, is worth it to the company. If BYOD 1.0 is about employees, what might a BYOD 2.0 look
  • 2. like? What are enterprises looking to get out of BYOD going forward? With this in mind, I have been asking a lot of CIO’s, Directors of IT and other smart people what they think. Once such person is Yaacov Cohen, CEO of harmon.ie, a fast growing enterprise mobility company. Yaacov talks to senior executives around the world about how better collaborated ideas and increased productivity can take place via personal use of mobile devices at work – and he has some pretty interesting insights to share. 1. Yaacov, how do we move from this Bring Your Own Device (BYOD) paradigm into BYOD 2.0, which you talk about as more of a “Use Your Own Device” mentality? “Everyone has been talking about BYOD, which should be more than bringing their devices to work and then putting them to the side and saying, “Hey, stay quiet. Don’t disturb me. I’ve got a lot of work to do.” And they go to their laptops and do most of their work.” “We want to change that. Business leaders are looking for change. The mobile enterprise and BYOD 2.0 is not about bringing devices to work; it is
  • 3. about using devices for work. How does business turn these shiny new toys into business tools?” “That means allowing employees to work with customers, review contracts, write blog posts – do real work on mobile devices.” 2. Is BYOD a good idea in a practical sense? “BYOD essentially means freedom of choice. Today’s IT professionals recognize the need to work with users rather than impose procedures and systems on them. BYOD is an expression of our world, which is becoming more democratic and more engaging.” “We’ve gotten stuck on the infrastructure side of things. It is true that mobile brings a lot of questions about security. What happens if I lose my device? What happens if an employee leaves the company with sensitive records on his mobile device? We need to address these issues and then we need to move beyond them.” 3. What are the key business drivers for how enterprise should invest in BYOD 2.0? “The primary business driver is getting work done. Business users do not want to compromise. The want convenience. They want to be able to do the
  • 4. work without being tethered to their laptops. People deserve and demand a great user experience.” “There are other drivers too. There are growing worries about the high costs of data leakage and redundant licenses caused when business users ‘go rogue’. Employee use of unsanctioned IT resources that are outside the Bob Egan, Contributor I write about mobile BYOD As We Know It Is Dead - Forbes http://www.forbes.com/sites/bobegan/2013/10/04/byod-as-we- know-it-is... 1 of 2 1/30/2014 1:38 PM This article is available online at: http://www.forbes.com/sites/bobegan/2013/10/04/byod-as-we- know-it-is-dead/ supervision of corporate IT is rampant. I worry a lot about the potential for U.S. businesses facing billions in cleanup costs caused by unintentional data leakage, and to use a Bob Egan phrase “the digital exhaust”. Let’s not forget the hundreds of millions more in redundant licenses that are likely to
  • 5. become more visible over time. It should be common sense that employees are going to use whatever they need to do to get work done. This will not change until IT and the business leaders sort out how to make enterprise collaboration services easily mobile accessible.” 4. How significant are Cloud services for BYOD? “The cloud is essential to the mobile enterprise. Documents are still the foundation of business: spreadsheets, presentations, documents where I put my thoughts down or write business proposals. So we need to enable document collaboration at the office and on-the-go. Microsoft with Office 365 has done a terrific job of creating an office-enabled cloud, and vendors like harmon.ie bring full-featured, native Office 365 and SharePoint access to multiple devices – iPads, iOS devices and Blackberry.” 5. It’s not always about investing in new applications. Existing tools and solutions relevant too. True? “Absolutely. I think mobility is not about introducing new tools that I’m not comfortable using. “I’m just doing it for the sake of being mobile, being cool, being a technologist. A lot of people are not ready to give up on Excel. Let’s face it. Some might like it; some might hate it – but can you live without it?
  • 6. Sometimes we end up switching between the means and the purpose. The purpose is getting things complete, not learning new tools.” 6. What are the top three best practices that are trending through your conversations with company leaders? #1 – Enterprise mobility is the right way to go and we need to provide mobility to end-users. The trend is about thinking beyond the device and much more about using mobile to get real work done that drives revenue for a company and improves customer satisfaction. #2 – IT needs to switch from being a gatekeeper to being a technology opener. It is not about chief information officer. It is about chief innovation officer. #3 – Do not confuse innovation and disruption. Provide an innovation that is easily absorbable by your mainstream business users. “Business users do not care about IT – and that is something that IT folks tend to forget. The last thing they care about is a name. They do not care if it comes from Microsoft or Box or Java, or from IBM, or Google. They care that they want to get their jobs done so that they can get home to do other things. The Enterprise IT has yet to deliver.”
  • 7. In Summary: If BYOD 1.0 has been responding to the needs of the employee, BYOD 2.0 efforts will focus more on the needs of where the enterprise and the employee intersect. Perhaps the most valuable key attribute of BYOD 2.0 will be to provide right- time experience (user interface + user experience) to the systems, solutions and points of collaboration that are mutually relevant to the company and to the employee. Over the next month, I will writing more about developing and bringing very scalable, great experiences to employees – and to customers, through the mobile channel. I’m also planning more executive interviews. In the meantime, let me know what you think ! BYOD As We Know It Is Dead - Forbes http://www.forbes.com/sites/bobegan/2013/10/04/byod-as-we- know-it-is... 2 of 2 1/30/2014 1:38 PM Exploring new mobile and cloud platforms without a governance strategy can have consequences.
  • 8. At the beginning of my IT career, I witnessed a number of decisions and project management practices which, at the time, just didn't seem to make sense. But I was young, and I often thought to myself that the people involved must have some other reasoning, some justification for their actions that I was just not privy to. In short, I remained quiet when I should have spoken up. What two decades of experience has taught me is that there is rarely reasoning or justification behind actions that, at a gut- level, are clearly bad IT practices. We inherently recognize when common sense has taken a back seat. There is most definitely a dark side to BYOD. For the most part, I am an advocate for the consumerization of IT (using non-standard apps and tools as a way to increase end user engagement and productivity) and support the bring-your- own-device model. However, as a seasoned manager and IT operations leader, I recognize the risks that come with the model if organizations do not properly plan out their strategies, putting sufficient protections and governance practices in place to manage the potential risks that could come from these unsupported devices and applications. End users often want what’s NEW, but there are valid reasons for imposing and enforcing safeguards when giving mobile business users
  • 9. access to your otherwise secure, scalable, and compliant systems. Some people equate governance with bureaucracy and hierarchical systems, but those perceptions often come from a lack of appreciation for the potential risks involved. Governance is about checks and balances -- supporting the tools and systems your end users want, but in a way that is manageable and which follows defined protocols. Examples of rogue IT practices A (http://harmon.ie/blog/new-survey-reveals-mobile-rogue-it- costing-us-organizations-almost-2b)recent uSamp survey (http://harmon.ie/blog/new-survey-reveals-mobile-rogue-it- costing-us-organizations-almost-2b) found that 41% of US mobile business users have used unsanctioned services to share or sync files, despite 87% saying they are aware that their company has a document sharing policy that prohibits this practice. And, 27% of mobile business users who “went rogue”, reported immediate and direct repercussions, from lost business to expensive lawsuits and financial penalties that cost $2 billion. While most IT professionals understand these risks viscerally, some business users need to crash and burn before
  • 10. they are willing to adjust their risky behaviors, which is not a message your employer wants to hear. Luckily, there is another way: learning from the mistakes of others. This month, I am one of six mobile security and IT experts judging a (http://www.rogueitstories.com/)"Rogue IT" contest (http://www.rogueitstories.com/). We’re collecting anonymous stories from the community about mobile and cloud-based app failures caused by business and IT users who disregard corporate BYOD AND THE CONSUMERIZATION OF IT The dark side of BYOD By Guest Contributor in Tech Decision Maker, October 13, 2013, 5:00 PM PST Page 1 of 5The dark side of BYOD - TechRepublic 1/30/2014http://www.techrepublic.com/blog/tech-decision- maker/the-dark-side-of-byod/ governance practices. These real-world horror stories are great examples of the prevalence of rogue IT behaviors at work, and the very real risks they bring. For example, within a $500 million health and wellness company, a consultant was hired to audit their IT systems to ensure their systems and practices were compliant with industry regulations and best practices. It was very quickly
  • 11. identified that end users were sharing sensitive customer data (credit card numbers, bank routing numbers) using public email channels (Hotmail, Gmail) and through consumer instant messaging platforms (AOL Messenger, Yahoo Messenger, MSN Messenger), despite approved and documented communications processes. Because the consultant was required to report the violations, the CFO immediately took steps to lock down all unauthorized collaboration tools, and instituted immediate policy changes. The company was given just days to comply, with hefty fines for each violation identified plus more fines for each day their systems were found to be non- compliant. In another example, a European company was getting an increasing number of requests from its users to connect personal iPads and smartphones to company systems. While IT resisted these requests for several months, the company finally decided to open up its email systems to a “select number of executives” and shared the necessary passwords. Six weeks later, IT ran an audit on the system and found ten-times the number of employees connected into the corporate back end environment as had been approved. The passwords had apparently been shared across
  • 12. the organization. And at a large non-profit, the security team found out that several teams using Dropbox without IT authorization had recently been hacked. To understand how their system had been compromised, they contacted the popular cloud- storage vendor, telling the person over the phone that they wanted to know more about how their organization had been using the platform. The phone rep volunteered more data than they had expected, telling them "We have a list of 1600 user names and their email addresses. Would you like that list?" The cloud-storage vendor was clearly interested in moving to them to the enterprise version, and was willing to share a customer list without even authenticating the person who called! Proactive governance There are similar traits that run through each of these real-world examples. For one, individuals subverting established processes and informed IT leaders with the goal of “getting work done faster." On the flip side, many IT organizations are not listening to the needs of their employees, causing some to feel that they have no other choice but to "go around" IT so that they can get their jobs accomplished. In each case, the lack of clearly documented -- and transparent -
  • 13. - change management practices may be at the root cause of the problem; practices that provide a more open dialog between IT and end users about what is needed, and how some consumer-driven tools and practices may not be the best fit for an enterprise. Governance should not be feared or ignored, but looked at by both management and end users as an important aspect of the change management model. Organization make governance and change management a priority are able to more quickly recognize new requests as they come in, validate requirements to make sure requests are aligned with business activities, and ensure that all new tools and apps meet the standards and regulations, reducing the risks of data meltdowns and unintentional-but-potentially-significant losses. Page 2 of 5The dark side of BYOD - TechRepublic 1/30/2014http://www.techrepublic.com/blog/tech-decision- maker/the-dark-side-of-byod/ Christian Buckley is the Chief Evangelist at Metalogix. Keep an eye out here for more coverage from Christian's stint as judge at the "Rogue IT" contest. Add your Comment
  • 14. You Might Have Forgotten About These 20 Actors We Lost Too Soon — Rant Lifestyle If You've Ever Thought of Buying an iPad You Need to Read This — Life Factopia Little known way to pay off mortgage — Weekly Financial Solution Experts Select The Best Credit Cards of 2014
  • 15. — Next Advisor You May Also Like about these links Editor's Picks Page 3 of 5The dark side of BYOD - TechRepublic 1/30/2014http://www.techrepublic.com/blog/tech-decision- maker/the-dark-side-of-byod/ WHITE PAPERS // FROM ARUBA NETWORKS Aruba Networks - MOVE Architecture - Video This 2 minute video displays how Mobile Virtual Enterprise (MOVE) Architecture delivers secure BYOD and a mobility experience for everyday work. Watch it here now. WATCH NOW
  • 16. WHITE PAPERS // FROM IBM Security Essentials for CIOs: Enabling Mobility - Their device, your data DOWNLOAD NOW WHITE PAPERS // FROM IBM [Research Report] Putting mobile first: best practices of mobile technology leaders DOWNLOAD NOW WHITE PAPERS // FROM IBM The flexible workplace: Unlocking value in the "bring your own device" era DOWNLOAD NOW The big data question to ask about every project
  • 17. 10 things you should know about Google Now Internet of Things botnet may include TVs and a fridge Bodhi Linux could become a desktop distribution contender White Papers, Webcasts, and Downloads Don't Miss Our Latest Updates Page 4 of 5The dark side of BYOD - TechRepublic
  • 18. 1/30/2014http://www.techrepublic.com/blog/tech-decision- maker/the-dark-side-of-byod/ See what best practices for SMBs are emerging. Visit ZDNet today! Editor's Daily Picks Week in Review IT Buying Cycle Learn more Discover Investigate Compare Justify Optimize Reality check for Obama's six proposed tech hubs: Job growth not immediate IT Employment // January 29, 2014, 1:42 PM PST Malicious intent can turn Chrome speech recognition into spying device Security // January 29, 2014, 11:43 AM PST
  • 19. Welcome Matt Asay, TechRepublic's newest enterprise columnist Open Source // January 29, 2014, 10:31 AM PST Resource Center Useful content from our premier sponsors Page 5 of 5The dark side of BYOD - TechRepublic 1/30/2014http://www.techrepublic.com/blog/tech-decision- maker/the-dark-side-of-byod/