This document summarizes a presentation about mobile consumerization trends in businesses. It discusses how consumer mobile devices like smartphones and tablets are increasingly being used in the workplace. This brings both organizational benefits like reduced costs and improved productivity, but also challenges around security, management of personal devices on business networks, and maintaining a separation between work and personal life. It provides an example of a company that successfully implemented a "bring your own device" policy. Finally, it discusses future trends of more mobile devices being used for both personal and work purposes, requiring companies to adapt policies to embrace this trend while mitigating risks.
The trend towards personally owned devices in the workplace is on the rise, requiring IT organizations to address this concept with flexibility, yet without compromising security and regulatory requirements.
Download the slide deck as C/D/H discusses:
■Why the move to personal devices?
■How and what technologies are involved?
■Advantages and disadvantages of personal devices
■Managing personal devices
■Four different corporate policies
■What’s next
For more information about C/D/H, contact us at (616) 776-1600 or (248) 546-1800.
The Presentation was presented by Dr. Robert Sutor, Vice President, IBM Mobile Platform at the Mobile World Congress 2012 at Barcelona, earlier this year. It has illustrations of IBM’s Mobile Strategy along with details on Worklight, IBM’s latest acquisition.
BYOD addresses the rising need for employees to be mobile and more productive. They will appreciate the ability to customize how and where they work. With a BYOD policy, businesses will rest easier knowing there’s a level of transparency and specific rules to point to when employees have questions. By clearly communicating company BYOD policies, a business will build trust and good rapport with employees while ensuring that company information remains safe.
BYOD (Bring Your Own Device) Risks And BenefitsModis
Today, most companies tell their employees that it's okay to bring their own devices to work. However, while there are many benefits to your company that go hand-in-hand with this policy, when you allow employees to BYOD (Bring Your Own Device), you are also allowing them to bring in a host of challenges for your IT department, your security, and your budget.
In this powerpoint, we explore the pros and cons of BYOD and discuss the development of a BYOD policy that makes sense for your business.
The trend towards personally owned devices in the workplace is on the rise, requiring IT organizations to address this concept with flexibility, yet without compromising security and regulatory requirements.
Download the slide deck as C/D/H discusses:
■Why the move to personal devices?
■How and what technologies are involved?
■Advantages and disadvantages of personal devices
■Managing personal devices
■Four different corporate policies
■What’s next
For more information about C/D/H, contact us at (616) 776-1600 or (248) 546-1800.
The Presentation was presented by Dr. Robert Sutor, Vice President, IBM Mobile Platform at the Mobile World Congress 2012 at Barcelona, earlier this year. It has illustrations of IBM’s Mobile Strategy along with details on Worklight, IBM’s latest acquisition.
BYOD addresses the rising need for employees to be mobile and more productive. They will appreciate the ability to customize how and where they work. With a BYOD policy, businesses will rest easier knowing there’s a level of transparency and specific rules to point to when employees have questions. By clearly communicating company BYOD policies, a business will build trust and good rapport with employees while ensuring that company information remains safe.
BYOD (Bring Your Own Device) Risks And BenefitsModis
Today, most companies tell their employees that it's okay to bring their own devices to work. However, while there are many benefits to your company that go hand-in-hand with this policy, when you allow employees to BYOD (Bring Your Own Device), you are also allowing them to bring in a host of challenges for your IT department, your security, and your budget.
In this powerpoint, we explore the pros and cons of BYOD and discuss the development of a BYOD policy that makes sense for your business.
In this presentation by InTechnology’s Mobile specialist, Richard Allgate, looks at the growing trend of Bring Your Own Device (BYOD). It covers the drivers behind the growing trend, how to implement a successful BYOD policy and the common pitfalls and business considerations.
BYOD is an acronym that stands for bring your own device. It has been defined as an IT policy that facilitates for employees to utilize their personal mobile devices such as smart phones and tablets at work (Singh, 2012). Bring your own device can be viewed as a policy because any organization planning to adopt it needs to specify rules and regulations for the introduction and use of personal mobile devices at the workplace.
It can also be defined as an emerging trend that involves employees carrying their personal mobile devices to work for usage and connectivity to an enterprise network (Ravindra & Sadana, 2013). A trend can be defined as a novel (new) and fashionable way of doing something. In this context, a bring your own device trend can be viewed as a new cost effective and convenient way or method used by organizations to enable employees access the company infrastructure.
Smarter Commerce Summit - IBM MobileFirst ServicesChris Pepin
IBM's industry-leading business and technology services for strategy/design and development/deployment of mobile applications, devices, communication and IT networks are an integral component of the IBM MobileFirst portfolio. Learn how we can help you begin, accelerate and manage your journey to becoming a mobile-first enterprise.
In most of the small businesses, the employees might own latest and more advanced devices like tablets, Ultrabooks or laptops while their employers provide them with desktop computers which are at least 2 or 3 years outdated. So this would be a good opportunity for the businesses to compete with the rival companies. But there are a set of risks that go along with this concept as well, such as the data risk.
How to develop an effective strategy, framework and support model to enable BYOD or mobility in your organisation. Martin Lindeman, a Logicalis solutions consultant and ex-Cisco consulting systems engineer, goes through a 5-step process that provides a practical methodology for implementing BYOD.
An Introduction on Design and Implementation on BYOD and Mobile SecuritySina Manavi
Agenda:
What are mobile devices?
Mobile device threads
BYOD
BYOD Pros and Cons
4 Steps to design BYOD:
BYOD Strategy
Mobile Hacking techniques demo:
Android Phone
Mobile Application Security
Laptop
Pendrives
BYOD or BYOA
How to Secure the data storages and transportation
More and more employees are bringing their own devices and preferred applications into the enterprise, creating what we call the BYODA (BYOD plus Applications) phenomenon. Workers’ behavior and expectations are contributing to the consumerization of IT, where lines of business and users themselves are having an enormous influence on the types of technologies and applications used. While employees expect anytime, anywhere access to their content to get their work done, their CIOs are now expected to support BYOD within their corporate environment.
Bring Your Own Device - DesktopDirect by Array NetworksIntellicomp GmbH
Array DesktopDirect ist ein Remote-Desktop-Zugriffsmodul für Unternehmen, das eigenständig oder in Verbindung mit anderen Zugangslösungen auf allen Plattformen der SPX- und AG Serie verfügbar ist.
Weitere Informationen unter:
http://www.intellicomp.de/array-desktopdirect.html
IBM Announce Intent to Acquire Fiberlink Analyst PresentationRon Favali
Earlier today IBM announced the intention to acquire Fiberlink, a leader in mobile management and security. Here's the presentation used to brief the worldwide IT analyst community.
In this presentation by InTechnology’s Mobile specialist, Richard Allgate, looks at the growing trend of Bring Your Own Device (BYOD). It covers the drivers behind the growing trend, how to implement a successful BYOD policy and the common pitfalls and business considerations.
BYOD is an acronym that stands for bring your own device. It has been defined as an IT policy that facilitates for employees to utilize their personal mobile devices such as smart phones and tablets at work (Singh, 2012). Bring your own device can be viewed as a policy because any organization planning to adopt it needs to specify rules and regulations for the introduction and use of personal mobile devices at the workplace.
It can also be defined as an emerging trend that involves employees carrying their personal mobile devices to work for usage and connectivity to an enterprise network (Ravindra & Sadana, 2013). A trend can be defined as a novel (new) and fashionable way of doing something. In this context, a bring your own device trend can be viewed as a new cost effective and convenient way or method used by organizations to enable employees access the company infrastructure.
Smarter Commerce Summit - IBM MobileFirst ServicesChris Pepin
IBM's industry-leading business and technology services for strategy/design and development/deployment of mobile applications, devices, communication and IT networks are an integral component of the IBM MobileFirst portfolio. Learn how we can help you begin, accelerate and manage your journey to becoming a mobile-first enterprise.
In most of the small businesses, the employees might own latest and more advanced devices like tablets, Ultrabooks or laptops while their employers provide them with desktop computers which are at least 2 or 3 years outdated. So this would be a good opportunity for the businesses to compete with the rival companies. But there are a set of risks that go along with this concept as well, such as the data risk.
How to develop an effective strategy, framework and support model to enable BYOD or mobility in your organisation. Martin Lindeman, a Logicalis solutions consultant and ex-Cisco consulting systems engineer, goes through a 5-step process that provides a practical methodology for implementing BYOD.
An Introduction on Design and Implementation on BYOD and Mobile SecuritySina Manavi
Agenda:
What are mobile devices?
Mobile device threads
BYOD
BYOD Pros and Cons
4 Steps to design BYOD:
BYOD Strategy
Mobile Hacking techniques demo:
Android Phone
Mobile Application Security
Laptop
Pendrives
BYOD or BYOA
How to Secure the data storages and transportation
More and more employees are bringing their own devices and preferred applications into the enterprise, creating what we call the BYODA (BYOD plus Applications) phenomenon. Workers’ behavior and expectations are contributing to the consumerization of IT, where lines of business and users themselves are having an enormous influence on the types of technologies and applications used. While employees expect anytime, anywhere access to their content to get their work done, their CIOs are now expected to support BYOD within their corporate environment.
Bring Your Own Device - DesktopDirect by Array NetworksIntellicomp GmbH
Array DesktopDirect ist ein Remote-Desktop-Zugriffsmodul für Unternehmen, das eigenständig oder in Verbindung mit anderen Zugangslösungen auf allen Plattformen der SPX- und AG Serie verfügbar ist.
Weitere Informationen unter:
http://www.intellicomp.de/array-desktopdirect.html
IBM Announce Intent to Acquire Fiberlink Analyst PresentationRon Favali
Earlier today IBM announced the intention to acquire Fiberlink, a leader in mobile management and security. Here's the presentation used to brief the worldwide IT analyst community.
Read Navigating the Flood of BYOD to find out what challenges to secure your network architecture. When Total Application and Network Visibility is implemented, BYOD helps employees to stay in touch with their personal lives while keeping their business lives separate, preserving the confidentiality and integrity of each—all on the same device. This adds up to productivity, security and morale.
Bring Your Own Device is a disruptive phenomenon that is a significant IT trendMartin Perry
BYOD is the concept that employees (or students) will bring and use their own mobile devices (such as laptops, tablets, and smart phones) to their workplace (or college). These devices are used to access privileged company information and applications on the company's (or academic institute's) IT infrastructure; there is a challenge to balance the demand to be connected to everything with proper accountability or oversight to protect the company's (academic institute's) IT assets.
This webinar will analyse the demand for BYOD, driven by factors such as:
• Pervasive connectivity
• Globalisation
• Workforce Age profile and expectations
• Employee work life integration
• The growth in personal devices connected to web [consumerisation of IT]
• Change in our relationships with the outside world
• Impact on the porosity of the border between private life and work.
And how the balance can be struck between this demand for BYOD, and the need to protect IT assets.
This webinar was first hosted with the Warwick Technology Professional Network of the Warwick Business School wbs.ac.uk
Part of the University of Warwick, we have an international reputation for top quality education and research in management and business.
A BYOC program enables the use of employee-owned smartphones, tablets, and laptops for business use. The growing popularity and use of personal devices, such as the iPad, is challenging IT to develop a position on their use in the workplace.
This storyboard explores:
•The objectives for a successful BYOC deployment: reducing cost and complexity of desktop management; improving agility and accessibility; and ensuring that security is not sacrificed in achieving those goals.
•Building out the four pillars of capability to prepare your environment for BYOC: infrastructure, security, operations & support, and policy development.
•Refocusing efforts in the last mile by developing a clear communications strategy to manage expectations and prepare for change.
Success in BYOC can be achieved. Rather than just saying no, focus on how to drive positive, secure change in the desktop environment.
Managing applications in the age of BYOA: Reclaiming IT’s strategic role LogMeIn
Two megatrends — the rise of cloud applications and the consumerization of IT — are conspiring to change IT as we know it. And in turn, they are calling into question the value and very relevance of the role of IT, itself. This report is the first in a series of studies designed to explore the state of IT management in today’s “BYO” workplace. Featuring input from nearly 1,400 IT professionals and business professionals, the report focuses on the rapid rise of employee introduced apps, or the bring-your-own-app (BYOA) trend, and explores how consumerized cloud apps have become both a challenge and a blind spot for many IT professionals.
Organisations maximise staff mobility, flexibility and productivity by using work-styles to define the provisioning of new technologies in a contemporary workplace
One-in-two mobile owners in the US owns a smartphone, and many more own tablets. As most of these same consumers adapt their personal lifestyle to be “mobile first,” they expect their employers to be there to meet them. With the growing number of personal mobile devices in the hands of users, as well as increasingly remote organizations , there’s a great opportunity for organizations to increase productivity of their employees by allowing the use of these personal devices. Taking this on seems daunting, as IT has less ability to enforce a single standard than ever before. Not taking action, however, and ignoring this trend risks exposing corporate data to public clouds with no visibility on the part of IT. Enforcing a single standard will do a lot to serve all users partially, but none particularly well. "Power to the People: Identify and Empower Your Workforce," the new report by Altimeter Group analyst Chris Silva explores how companies are deploying mobile strategies to meet the the specific needs of their employees and the organization at large.
We share our findings about legal issues regarding the Service Level Agreements (SLA) of IaaS vendors and how they affect customers. We also propose some solutions to the issues outlined in our study.
We discuss John P. Kotter's paper titled "Leading Change: Why Transformation Efforts Fail" and try to adapt his 8 steps of change to the transformation of Yahoo! by Marissa Mayer.
Affordable Stationery Printing Services in Jaipur | Navpack n PrintNavpack & Print
Looking for professional printing services in Jaipur? Navpack n Print offers high-quality and affordable stationery printing for all your business needs. Stand out with custom stationery designs and fast turnaround times. Contact us today for a quote!
Skye Residences | Extended Stay Residences Near Toronto Airportmarketingjdass
Experience unparalleled EXTENDED STAY and comfort at Skye Residences located just minutes from Toronto Airport. Discover sophisticated accommodations tailored for discerning travelers.
Website Link :
https://skyeresidences.com/
https://skyeresidences.com/about-us/
https://skyeresidences.com/gallery/
https://skyeresidences.com/rooms/
https://skyeresidences.com/near-by-attractions/
https://skyeresidences.com/commute/
https://skyeresidences.com/contact/
https://skyeresidences.com/queen-suite-with-sofa-bed/
https://skyeresidences.com/queen-suite-with-sofa-bed-and-balcony/
https://skyeresidences.com/queen-suite-with-sofa-bed-accessible/
https://skyeresidences.com/2-bedroom-deluxe-queen-suite-with-sofa-bed/
https://skyeresidences.com/2-bedroom-deluxe-king-queen-suite-with-sofa-bed/
https://skyeresidences.com/2-bedroom-deluxe-queen-suite-with-sofa-bed-accessible/
#Skye Residences Etobicoke, #Skye Residences Near Toronto Airport, #Skye Residences Toronto, #Skye Hotel Toronto, #Skye Hotel Near Toronto Airport, #Hotel Near Toronto Airport, #Near Toronto Airport Accommodation, #Suites Near Toronto Airport, #Etobicoke Suites Near Airport, #Hotel Near Toronto Pearson International Airport, #Toronto Airport Suite Rentals, #Pearson Airport Hotel Suites
Putting the SPARK into Virtual Training.pptxCynthia Clay
This 60-minute webinar, sponsored by Adobe, was delivered for the Training Mag Network. It explored the five elements of SPARK: Storytelling, Purpose, Action, Relationships, and Kudos. Knowing how to tell a well-structured story is key to building long-term memory. Stating a clear purpose that doesn't take away from the discovery learning process is critical. Ensuring that people move from theory to practical application is imperative. Creating strong social learning is the key to commitment and engagement. Validating and affirming participants' comments is the way to create a positive learning environment.
Cracking the Workplace Discipline Code Main.pptxWorkforce Group
Cultivating and maintaining discipline within teams is a critical differentiator for successful organisations.
Forward-thinking leaders and business managers understand the impact that discipline has on organisational success. A disciplined workforce operates with clarity, focus, and a shared understanding of expectations, ultimately driving better results, optimising productivity, and facilitating seamless collaboration.
Although discipline is not a one-size-fits-all approach, it can help create a work environment that encourages personal growth and accountability rather than solely relying on punitive measures.
In this deck, you will learn the significance of workplace discipline for organisational success. You’ll also learn
• Four (4) workplace discipline methods you should consider
• The best and most practical approach to implementing workplace discipline.
• Three (3) key tips to maintain a disciplined workplace.
Personal Brand Statement:
As an Army veteran dedicated to lifelong learning, I bring a disciplined, strategic mindset to my pursuits. I am constantly expanding my knowledge to innovate and lead effectively. My journey is driven by a commitment to excellence, and to make a meaningful impact in the world.
[Note: This is a partial preview. To download this presentation, visit:
https://www.oeconsulting.com.sg/training-presentations]
Sustainability has become an increasingly critical topic as the world recognizes the need to protect our planet and its resources for future generations. Sustainability means meeting our current needs without compromising the ability of future generations to meet theirs. It involves long-term planning and consideration of the consequences of our actions. The goal is to create strategies that ensure the long-term viability of People, Planet, and Profit.
Leading companies such as Nike, Toyota, and Siemens are prioritizing sustainable innovation in their business models, setting an example for others to follow. In this Sustainability training presentation, you will learn key concepts, principles, and practices of sustainability applicable across industries. This training aims to create awareness and educate employees, senior executives, consultants, and other key stakeholders, including investors, policymakers, and supply chain partners, on the importance and implementation of sustainability.
LEARNING OBJECTIVES
1. Develop a comprehensive understanding of the fundamental principles and concepts that form the foundation of sustainability within corporate environments.
2. Explore the sustainability implementation model, focusing on effective measures and reporting strategies to track and communicate sustainability efforts.
3. Identify and define best practices and critical success factors essential for achieving sustainability goals within organizations.
CONTENTS
1. Introduction and Key Concepts of Sustainability
2. Principles and Practices of Sustainability
3. Measures and Reporting in Sustainability
4. Sustainability Implementation & Best Practices
To download the complete presentation, visit: https://www.oeconsulting.com.sg/training-presentations
3.0 Project 2_ Developing My Brand Identity Kit.pptxtanyjahb
A personal brand exploration presentation summarizes an individual's unique qualities and goals, covering strengths, values, passions, and target audience. It helps individuals understand what makes them stand out, their desired image, and how they aim to achieve it.
The world of search engine optimization (SEO) is buzzing with discussions after Google confirmed that around 2,500 leaked internal documents related to its Search feature are indeed authentic. The revelation has sparked significant concerns within the SEO community. The leaked documents were initially reported by SEO experts Rand Fishkin and Mike King, igniting widespread analysis and discourse. For More Info:- https://news.arihantwebtech.com/search-disrupted-googles-leaked-documents-rock-the-seo-world/
Explore our most comprehensive guide on lookback analysis at SafePaaS, covering access governance and how it can transform modern ERP audits. Browse now!
Premium MEAN Stack Development Solutions for Modern BusinessesSynapseIndia
Stay ahead of the curve with our premium MEAN Stack Development Solutions. Our expert developers utilize MongoDB, Express.js, AngularJS, and Node.js to create modern and responsive web applications. Trust us for cutting-edge solutions that drive your business growth and success.
Know more: https://www.synapseindia.com/technology/mean-stack-development-company.html
RMD24 | Debunking the non-endemic revenue myth Marvin Vacquier Droop | First ...BBPMedia1
Marvin neemt je in deze presentatie mee in de voordelen van non-endemic advertising op retail media netwerken. Hij brengt ook de uitdagingen in beeld die de markt op dit moment heeft op het gebied van retail media voor niet-leveranciers.
Retail media wordt gezien als het nieuwe advertising-medium en ook mediabureaus richten massaal retail media-afdelingen op. Merken die niet in de betreffende winkel liggen staan ook nog niet in de rij om op de retail media netwerken te adverteren. Marvin belicht de uitdagingen die er zijn om echt aansluiting te vinden op die markt van non-endemic advertising.
Buy Verified PayPal Account | Buy Google 5 Star Reviewsusawebmarket
Buy Verified PayPal Account
Looking to buy verified PayPal accounts? Discover 7 expert tips for safely purchasing a verified PayPal account in 2024. Ensure security and reliability for your transactions.
PayPal Services Features-
🟢 Email Access
🟢 Bank Added
🟢 Card Verified
🟢 Full SSN Provided
🟢 Phone Number Access
🟢 Driving License Copy
🟢 Fasted Delivery
Client Satisfaction is Our First priority. Our services is very appropriate to buy. We assume that the first-rate way to purchase our offerings is to order on the website. If you have any worry in our cooperation usually You can order us on Skype or Telegram.
24/7 Hours Reply/Please Contact
usawebmarketEmail: support@usawebmarket.com
Skype: usawebmarket
Telegram: @usawebmarket
WhatsApp: +1(218) 203-5951
USA WEB MARKET is the Best Verified PayPal, Payoneer, Cash App, Skrill, Neteller, Stripe Account and SEO, SMM Service provider.100%Satisfection granted.100% replacement Granted.
4. The Mobile Consumerization Trend
In a technological context…
“Consumerization is the growing tendency for new
information technology to emerge first in the consumer
market and then spread into business and government
organizations.” – Wikipedia
5. The Mobile Consumerization Trend
Mobile Consumerization
1. Lifestyle devices like smartphones and netbooks and tablets
are adopted by consumers and become increasingly popular.
2. Increased usage of these devices will gradually become
apparent in businesses and organisations, there will be a
demand from employees to be able to use their own devices in
the workplace.
3. Businesses and organisations will move to adapt to and
embrace the pervasiveness of consumer-introduced devices
within them.
6. Organisational Benefits
Bring your own devices
1. The company can reduce the total cost of ownership of
assets
2. Greater productivity through in-house applications and
mobility
3. Increased employee satisfaction that encourages innovation
and creativity
Office
$
Home
$
7. Organisational Benefits
Leverage on existing assets
4. Better collaboration with business partners with by exposing
parts of internal system through existing measures
5. Take advantage of new technologies that are bundled with the
mobile device to create innovations
Internal External
Employees
Server
Partners
Database
8. Possible Challenges
Work Life Balance Issues
Platform Uniformity
Compliance
Security
Accessibility
Consistency of Device Ownership
9. Possible Challenges
Security
Information Security Physical Security
SOURCES:Voice of IT Survey on Mobile Security (Spiceworks, Feburary 2013)|Four Times More BYOD than Corporate Liable
Smartphones = a Security Challenge and a Device Management Opportunity (ABIresearch, 2011)|The Latest Infographics: Mobile
Business Statistics for 2012, by Mark Fidelman (Forbes, 2012)|Bring Your Own Device:New Opportunities,New Challenges, by David A.
Willis(Gartner Research, 2012) Research by Varonis Systems.www.varonis.com
10. Example: Successful Adoption of BYOD
“It was the best money we've ever
spent on in our business.”
“BYOD is the only way we can
keep up with mobility."
"I thought it would be easy, but when I sat down and
thought about this, it was much harder,”
“There are financial benefits because we don’t have
to buy computing devices for staff, but our risk will go
up, our support complexities will go up, and so on.”
CIO Ian Jansen
11. Example: Successful Adoption of BYOD
Background
• South African company specializing in information
technology service
• Over 14,000 employees around the world
• Dimension Data Australia: over 600 workers at its office in
Sydney, with 100 additional workers coming in every year.
• Office is at full capacity
• Average number of devices per person is around 2.9
BYOD journey started two-and-a-half
years ago
12. Example: Successful Adoption of BYOD
Obtained feedback from the staff about BYOD, staff were
passionate in providing their suggestions.
• Facilitate delivery of applications onto personal
devices
• Users needed to register their devices through
their mobile device management platform
• IT support can start as soon as they are logged
into Citrix
• Cisco collaboration tools for sharing files
between work desktops and mobile devices.
• No restriction on which devices are allowed!
13. Example: Successful Adoption of BYOD
Present and Future
BYOD makes the full office working space sustainable.
-Hot-Desking
-Ability for people to go in and out of the office very quickly
Mobility first perspective when acquiring new business applications
Next phase involves connecting all devices with the data at the
back-end of the business
"We're going to be able to do things we
couldn't do before, some of the value that I’m
going to drive in that space is going to be
absolutely outstanding!"
14. Future Potential
Future Trend
Mobile devices flood consumer market
1. Human resources
• Employee expectations changing
2. Mobile devices and its data as physical and info resources
• Critical, expensive to substitute, limited control
Company (re)actions:
• Incorporate – Purchase mobile devices for employees
• Adapt – Loosen policies governing use of mobile devices
• Adapt – BYOD
16. Future Potential
Potential
1. Increased employee availability (Resource)
• Blurring of work and home (Social) =(
2. Increased productivity (?) and innovation
• Higher return/turnover on assets
• Work from home =(
• Improved morale
• Less application training required
3. Mobile arm of information security
• Hardened systems
• Improved company infrastructure
• Improved policies and awareness
Now, we are going to introduce a company that has successfully adopted BYOD into their workplace. Dimension Data Australia.These are some of the quotes from the CIO of Dimension Data’s Australian Branch, Mr Ian Jansen, on the adoption of BYOD:“It was the best money we’ve ever spent on in our business.” “BYOD is the only way we can keep up with mobility”But of course, with the implementation, there were also concerns, to quote Mr Jenson: "I thought it would be easy, but when I sat down and thought about this, it was much harder”, and there are financial benefits because we don’t have to buy computing devices for staff, but our risk will go up, our support complexities will go up, and so on.”
Dimension data is a IT Service company which started in South Africa but now has 14000 employees in every continent. But for this case, we will only be focusing on their Australian branch, which now has over 600 workers at its office in Sydney, this number growing at a pace of 100 workers a year. Their office is now at full capacity, but moving to a new location would be prohibitive due to the cost and disruption of moving the staff over. Also to note, in the company, the average number of devices per person is currently around 2.9. This trend is set to continue, as the frequency of people moving between devices is increasing, as such, so will the number of devices they are carrying. Due to the lack of space, and the increasing trend of consumerization among their workers, the company implemented their BYOD strategy.
To repeat MrJanson’s quote, implementing BYOD is not easy, so he posted the policy on the company’s intranet for the staff to provide their suggestions, and the staff were passionate about this, the ability to use their own devices in the workplace touched them. Thus, with the policy in place, Dimension data rolled out a Citrix infrastructure inside the business to facilitate the delivery of virtual applications onto personal mobile devices. Users also needed to register their personal devices through Dimension Data's mobile device management platform, and support from Dimension Data's internal IT team can start as soon as they logged into Citrix.The company also used Cisco collaboration tools for sharing files between work desktops and mobile devices. This BYOD policy allowed for the ability to not have a restriction on which device workers can bring into the company, and there is only a minimum requirement that devices have to meet.
Mobility has become crucial in making their limited office working space sustainable. With BYOD, the trend of Hot-Desking has become popular among their staff, Hot desking is an office organization system which involves multiple workers using a single physical work station or surface during different time periods.The ability to quickly move in and out of the office has become increasingly important for their business, such that they have a number of internal IT projects running in order to make use of the space they haveBYOD has also changed the way Jansen acquires applications into the Dimension Data business. They now look for applications from a mobility first perspective, from someone using a device in the field, rather than someone sitting in an office chair. The next phase of Dimension Data's BYOD journey involves connecting all the mobile devices with the data at the back-end of the business. I’ll end off with a quote from MrJanson,"We're going to be able to do things we couldn't do before, some of the value I'm going to drive in that space is going to be absolutely outstanding."