Premium Essay

Byod (Bring Your Own Device): Hot or Not?

In:

Submitted By Andie67
Words 1194
Pages 5
BYOD (Bring Your Own Device):
Hot or Not?
Andrea Ferguson CGS1016-39433

BYOD is the hottest acronym in IT since ITIL. Professionals want to know what’s going on with BYOD, regardless of whether they’re on a team supporting such a program, considering adding such a program, already a part of a BYOD program or simply just interested out of personal curiosity. This paper will explore a few of the pros and cons of a BYOD program.
Cisco sponsored a survey of 600 IT and business leaders. The results of this survey showed that 95% of their businesses permit corporate network access by employee-owned devices. Out of the 600 surveyed, 48% support a select list of devices, while 36% allow all devices. Additionally, 11% of those businesses allow employee-owned devices access to enterprise networks but do not offer any type of IT support.
It’s clear that businesses have a drive to implement BYOD programs. It’s also clear that these programs are highly popular with both company and employee. Mobile devices, powerful yet inexpensive and easy-to-use tools, help employees to be productive regardless of their location. Collaborative efforts and information exchange can increase, allowing a business to step up their reaction to market changes and/or customer needs. Another plus is that virtually every employee owns some sort of personal mobile device. While mobile technologies use does have the potential to transform business, it can also disrupt IT. Today’s employee expects complete freedom to use mobile devices, whether company- owned or employee-owned. Defining and implementing a BYOD strategy is a major struggle for most IT departments. Windows based command-and –control models are still largely used to try to dictate which devices can be used and how. That model simply doesn’t work anymore. New devices notwithstanding, there is a variety of new operating

Similar Documents

Premium Essay

Mobile Security Threats

...Venda 2014 ABSTRACT We live in a digital era where communication, information sharing and even business transactions is exchanged on mobile devices such as laptop computers, palmtops, tablet computers, smartphones and cell phones. The new age group of young people have never known a life without a mobile device with internet capabilities. Mobile Devices are an integral part of personal and social lives it is only logical that users should have awareness of security during the use of mobile devices. Individuals and organisations have both been beneficiaries on the rapid expansion of information and communication technologies (ICTs). Inevitably however, these offerings by mobile devices also bring about security vulnerabilities which users in Thohoyandou are not aware of. According to Lookout principal security analyst Marc Rogers, 2013, following simple precautions like sticking to the Google Play Store can ensure the security of a mobile device. This is rather not always the case as hackers and crackers make use of trustful applications to distribute malware. This study intends to outline security vulnerabilities and deliver clear recommendations on essential security technologies and practices to help mobile device users in Thohoyandou. Correct misconceptions or myths in order to bring about changes in attitudes and usage behaviour. INTRODUCTION The internet has transformed South Africa in just a drastic time, almost anything we see...

Words: 2908 - Pages: 12

Premium Essay

21st Learning

...and Learning: The Freedom in Teaching by: Hayati bt Zakaria @ Ariffin After I met with some English teachers when attending the new literature syllabus, I feel I was left far behind. These passionate and ablaze teachers regardless many years of teaching, still jovial and show enthusiasm teaching and adapting the new set of classroom teaching skills using some sort of standards drawn for their beloved students for them to actively engaging in any classroom activities. I was listening and admiring the personalities of each speakers as they were presenting the slides and never fail to inspire and motivate me with the latest approach on how to win students’ ‘faith’ in literature. It was astounding. After the Higher Order Thinking Skills (HOTS or KBAT) implemented in mostly questions in SPM, I am positively sure the 21st Century Teaching and Learning is capturing my attention as it is never in my train of thoughts (). I get hooked on to it and it overwhelms me to acknowledge further what have brought Kementerian Pendidikan Malaysia to implement this educational transformation via Pembangunan Pendidikan Malaysia (PPPM) 2013 - 2025. I could not get the idea at first, the definition, characteristics, classroom adjustments, teachers’ skills, 3 R’s and 4 C’s? teacher-centered vs students-centered education? Using technology? projector, computer? Using smartphone in classrooms? Wow! There are many websites suggesting and listing how the 21st Century Teaching and Learning should be...

Words: 834 - Pages: 4

Premium Essay

Information Systems

...Wireless technologies Remote innovations wireless correspondence advancements are the best responsibilities to mankind. Remote correspondence incorporates the transmission of information over a division without help of wires, connections. The transmitted detachment can be wherever between two or three meters and a colossal number. A rate of the contraptions used for remote correspondence are cordless telephones, GPS units, mobiles, GPS units, remote PC parts, and satellite TV. Mobile technologies Portable innovation is absolutely what name illustrates – advancement that is advantageous; it implies any device which you can pass on with you to perform a wide variety of "assignments". It is development that allows those errands to be performed by method for vehicles, PDA, compact PCs, et cetera. A standard phone has gone from being near a fundamental two-way pager to being a PDA, a GPS course system, a web project, and minute errand individual structure, a video gaming system, and significantly more. It consolidates the use of a variety of transmission media, for instance, radio wave, microwave, infra-red, GPS and Bluetooth to consider the trading of data by method for voice, content, video, 2-dimensional institutionalized labels and that is just the tip of the iceberg. Progresses in the remote development are offering opportunities to associations to ponder how they offer to their customers by opening up their business channels. Ways in which wireless technologies improve the organization’s...

Words: 1490 - Pages: 6

Free Essay

Enterprise Cloud Computing

...Enterprise Cloud Computing: The future of enterprise networking Justin Winter American Military University The term “cloud computing” is one of many new buzzwords in the technology world. Unfortunately as buzzwords go they tend to become obsequious and as a result of this obsequiousness, the term “cloud computing” is so broad that it can encompass anything from online storage products like Dropbox to entire online enterprise solutions provided by Amazon Web Services. While the term cloud computing may be obsequious, there is a reason IBM recently invested $3 billion to further research and development to benefit cloud computing and big data. ("IT Digest") Enterprise cloud networking is a relatively new technology, yet it is already available in multiple favors. For instance Amazon Web Services offers complete cloud solutions for anything from personal website and database solutions to full corporate solutions that range from simple storage solutions to user defined security groups. On the other hand, components provided by Cisco's Meraki division, offer complete network management as an easily accessible web based tool. The National Institute of Standards and Technology (NIST), which is a part of the U.S. Department of Commerce defines Cloud Computing as “a model for enabling ubiquitous, convenient, on-demand network access to a shared pool of configurable computing resources (e.g., networks, servers, storage, applications, and services) that can be rapidly provisioned...

Words: 2967 - Pages: 12

Premium Essay

What Business and Social Problems Does Data Center Power Consumption Cause?

.... What business and social problems does data center power consumption cause? Data center power consumption economically affects businesses and environmentally affects society. Operating costs for data centers is very expensive. In the article, "Ubiquitous Green Computing Techniques for High Demand Applications in Smart Environments," the total operating costs, concerning electricity, of all data centers within the U.S. alone exceeded 7 billion dollars in 2010 (Ayala, J., Moya, J., Risco-Martín, J., Sanchez, C., Zapater, M. 2012). The article then explains that data centers consumed 61 billion kilowatt-hours in 2006;the Environmental Protection Agency provided this statistic to the US Congress in a report from 2007 (Ayala, J., Moya, J., Risco-Martín, J., Sanchez, C., Zapater, M. 2012). With this amount of energy being consumed by data centers, it is a cause for concern; consequently, data centers have an impact on the cost of business and negatively impact the environment via carbon footprint. As the carbon footprint grows, there is a need to realign the way businesses looks at managing their data centers. Several companies including Cisco, Dell, Google, HP, IBM, and Intel have announced efforts to reduce the environmental footprint of their product offerings (Chang et al., 2012). Large technology companies are starting to understand that being environmentally friendly is good for the wallet and good public relations. Understanding how to manage and build better data centers...

Words: 4296 - Pages: 18

Premium Essay

Visual Data Security

...Visual Data Security White Paper Brian Honan, BH Consulting July 2012 1 Introduction Welcome to Secure’s White Paper on Visual Data Security. As data gets ever more versatile and mobile, we want to make sure that individuals, businesses, organisations and governments across Europe are aware of the threats posed by visual data security breaches. Simply put, visual data security is ensuring that information cannot be seen by unauthorised individuals. This is particularly important when dealing with private or sensitive information, and the threat of a breach has risen enormously with the shift in working practices towards increased mobility, flexibility and shared resources. This White Paper has been commissioned to give some background to visual data security and provide simple, easy to follow advice on how to prevent a breach and protect individuals’ personal data and organisations’ commercially sensitive information. It’s not about constraining people’s working habits or holding back the tide, but about embracing new trends and empowering employers and employees to take small steps to work in a safe and secure manner. By promoting a greater understanding of these risks and the behavioural and practical procedures that can be adopted to reduce them, we hope to enhance data security across the continent. We hope you find the Paper of interest. For any further information please don’t hesitate to contact us on info@visualdatasecurity.eu. Happy reading and stay secure...

Words: 4506 - Pages: 19

Premium Essay

Test

...ENTERPRISE SETTING 2 A1 - Abstract Since 1999 wireless devices have become a necessity in enterprises. While increasing convenience, connectivity, and productivity, they also pose an unprecedented threat to network security guarding, which has literally taken to the airwaves. This paper will deal with vulnerabilities and risks regarding access points (APs) in a wireless network (WLAN) connecting to a wired local area network (LAN) in enterprises. Data for this paper will come from published academic papers, industry publications including white papers and surveys, and industry specialists. It will also include definitions of terms, policy and procedures that affect access points, and current practices regarding rogue APs. A case study will be presented for a fictional enterprise with multiple locations that has standard procedures, policies, and protocols in place, but recent events have questioned their ability to control access points with the discovery of rogue devices hidden in several office locations. Industry warnings about access points span the past thirteen years, and still new articles appear saying similar warnings, with only the solutions evolving with the technology. Suggested solutions will include security literacy regarding APs and their devices and their compliance; security audits to re-evaluate configurations of current hardware and software, inventory of current APs, wireless devices, ports, stations and their...

Words: 18577 - Pages: 75

Premium Essay

Windows 10 Introduction

...Introducing Windows 10 for IT Professionals Technical Overview ED BOTT PUBLISHED BY Microsoft Press A Division of Microsoft Corporation One Microsoft Way Redmond, Washington 98052-6399 Copyright 2016 © Microsoft Corporation All rights reserved. No part of the contents of this book may be reproduced or transmitted in any form or by any means without the written permission of the publisher. ISBN: 978-0-7356-9697-6 Printed and bound in the United States of America. First Printing Microsoft Press books are available through booksellers and distributors worldwide. If you need support related to this book, email Microsoft Press Support at mspinput@microsoft.com. Please tell us what you think of this book at http://aka.ms/tellpress. This book is provided “as-is” and expresses the author’s views and opinions. The views, opinions and information expressed in this book, including URL and other Internet website references, may change without notice. Some examples depicted herein are provided for illustration only and are fictitious. No real association or connection is intended or should be inferred. Microsoft and the trademarks listed at http://www.microsoft.com/about/legal/en/us/IntellectualProperty/ Trademarks/EN-US.aspx are trademarks of the Microsoft group of companies. All other marks are property of their respective owners. Acquisitions Editor: Rosemary Caperton Project Editor: Christian Holdener; S4Carlisle Publishing Services Editorial Production:...

Words: 48336 - Pages: 194

Premium Essay

Test Paper

...CompTIA Security+: Get Certified Get Ahead SY0-401 Study Guide Darril Gibson Dedication To my wife, who even after 22 years of marriage continues to remind me how wonderful life can be if you’re in a loving relationship. Thanks for sharing your life with me. Acknowledgments Books of this size and depth can’t be done by a single person, and I’m grateful for the many people who helped me put this book together. First, thanks to my wife. She has provided me immeasurable support throughout this project. The technical editor, Steve Johnson, provided some good feedback throughout the project. If you have the paperback copy of the book in your hand, you’re enjoying some excellent composite editing work done by Susan Veach. I’m extremely grateful for all the effort Karen Annett put into this project. She’s an awesome copy editor and proofer and the book is tremendously better due to all the work she’s put into it. While I certainly appreciate all the feedback everyone gave me, I want to stress that any technical errors that may have snuck into this book are entirely my fault and no reflection on anyone who helped. I always strive to identify and remove every error, but they still seem to sneak in. About the Author Darril Gibson is the CEO of YCDA, LLC (short for You Can Do Anything). He has contributed to more than 35 books as the sole author, a coauthor, or a technical editor. Darril regularly writes, consults, and teaches on a wide variety of technical...

Words: 125224 - Pages: 501

Premium Essay

Key It Management Issues

...Journal of Information Technology (2012) 27, 198–212 & 2012 JIT Palgrave Macmillan All rights reserved 0268-3962/12 palgrave-journals.com/jit/ Research Article Key information technology and management issues 2011–2012: an international study Jerry Luftman1, Hossein S Zadeh2, Barry Derksen3, Martin Santana4, Eduardo Henrique Rigoni5, Zhengwei (David) Huang6 1 2 Global Institute for IT Management, Fort Lee, NJ, USA; DIBA Group Pty Ltd, Melbourne, Australia; 3 Business & IT Trends Institute, University of Amsterdam (VU), Amsterdam, The Netherlands; 4 Graduate School of Business, ESAN University, Lima, Peru; 5 ˜ Universidade do Vale do Rio dos Sinos, Sao Leopoldo, Brazil; 6 College of Economics and Management, Three Gorges University, China Three Gorges University, Yichang City, Hubei, China Correspondence: J Luftman, Global Institute for IT Management, Suite 15L, Fort Lee, NJ 07024, USA. Tel: þ 612 6128 7323 Abstract The importance of the impact of IT for organizations around the world, especially in light of a very slow recovery from the global financial crisis, has amplified the need to provide a better understanding of the specific geographic similarities and differences of IT managerial and technical trends. Going beyond identifying these influential factors is also the need to understand the considerations for addressing them in light of recognizing the respective local characteristics, especially when operating in a globally linked environment, although somehow...

Words: 13836 - Pages: 56

Premium Essay

Minr

...worldwide. Addresses, phone numbers, and fax numbers are listed on the Cisco website at www.cisco.com/go/offices. Text Part Number: THE SPECIFICATIONS AND INFORMATION REGARDING THE PRODUCTS IN THIS MANUAL ARE SUBJECT TO CHANGE WITHOUT NOTICE. ALL STATEMENTS, INFORMATION, AND RECOMMENDATIONS IN THIS MANUAL ARE BELIEVED TO BE ACCURATE BUT ARE PRESENTED WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED. USERS MUST TAKE FULL RESPONSIBILITY FOR THEIR APPLICATION OF ANY PRODUCTS. THE SOFTWARE LICENSE AND LIMITED WARRANTY FOR THE ACCOMPANYING PRODUCT ARE SET FORTH IN THE INFORMATION PACKET THAT SHIPPED WITH THE PRODUCT AND ARE INCORPORATED HEREIN BY THIS REFERENCE. IF YOU ARE UNABLE TO LOCATE THE SOFTWARE LICENSE OR LIMITED WARRANTY, CONTACT YOUR CISCO REPRESENTATIVE FOR A COPY. The Cisco implementation of TCP header compression is an adaptation of a program developed by the University of California, Berkeley (UCB) as part of UCB’s public domain version of the UNIX operating system. All rights reserved. Copyright © 1981, Regents of the University of California. NOTWITHSTANDING ANY OTHER WARRANTY HEREIN, ALL DOCUMENT FILES AND SOFTWARE OF THESE SUPPLIERS ARE PROVIDED “AS IS” WITH ALL FAULTS. CISCO AND THE ABOVE-NAMED SUPPLIERS DISCLAIM ALL WARRANTIES, EXPRESSED OR IMPLIED, INCLUDING, WITHOUT LIMITATION, THOSE OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT OR ARISING FROM A COURSE OF DEALING, USAGE, OR TRADE PRACTICE. IN NO EVENT SHALL CISCO OR ITS SUPPLIERS...

Words: 126829 - Pages: 508

Premium Essay

Information and Communication Technologies in Tourism 2014

...Rodolfo Baggio Marianna Sigala Alessandro Inversini Juho Pesonen Editors Information and Communication Technologies in Tourism 2014 eProceedings of the ENTER 2014 PhD Workshop in Dublin, Ireland. January 21, 2014 Preface The advent of Information and communication technology (ICT) has had a paramount impact on tourism. The effects of this revolution continue to change the nature of contemporary tourism on a day-to-day base. The globalization of information, open innovation, better access, collaboration in a generation of information and technological convergence, have all contributed to the design of a new scientific paradigm. Thanks to our passion for research and to the continuous advancements in the technological ecosystem as well as the possibility of better understanding human activity and behavior we are on the threshold of a new era of the social science of tourism. This new social and technological paradigm affects tourism and human mobility in a way that gives the research process unheard-of possibilities. The current level of technological development allows for the construction of objects that are smaller, more intelligent and embedded in the environment and even wearable. These objects, which record and learn our habits are connected to the Internet and they have computing capabilities. They can also be interconnected and generate large quantities of information to benefit the environment in which they are located as well as the travellers that possess...

Words: 49996 - Pages: 200

Premium Essay

Damsel

...2014-2015 Undergraduate Academic Calendar and Course Catalogue Published June 2014 The information contained within this document was accurate at the time of publication indicated above and is subject to change. Please consult your faculty or the Registrar’s office if you require clarification regarding the contents of this document. Note: Program map information located in the faculty sections of this document are relevant to students beginning their studies in 2014-2015, students commencing their UOIT studies during a different academic year should consult their faculty to ensure they are following the correct program map. i Message from President Tim McTiernan I am delighted to welcome you to the University of Ontario Institute of Technology (UOIT), one of Canada’s most modern and dynamic university communities. We are a university that lives by three words: challenge, innovate and connect. You have chosen a university known for how it helps students meet the challenges of the future. We have created a leading-edge, technology-enriched learning environment. We have invested in state-of-the-art research and teaching facilities. We have developed industry-ready programs that align with the university’s visionary research portfolio. UOIT is known for its innovative approaches to learning. In many cases, our undergraduate and graduate students are working alongside their professors on research projects and gaining valuable hands-on learning, which we believe is integral...

Words: 195394 - Pages: 782

Premium Essay

Wipro Analysis

...INSIDE Wipro in Brief Customer Focus Financial Highlights Chairman's Letter to the Stakeholders CEO's Letter to the Stakeholders CFO's Letter to the Stakeholders Board of Directors Sustainability Highlights 2012-13 Management Discussion & Analysis Directors Report Corporate Governance Report Business Responsibility Report Standalone Financial Statements Consolidated Financial Statements Consolidated Financial Statements under IFRS Glossary 2 4 8 10 12 14 16 22 24 41 55 85 106 147 183 231 This Annual Report is printed on 100% recycled paper as certified by the UK-based National Association of Paper Merchants (NAPM) and France - based Association des Producteurs et des Utilisateurs des papiers et cartons Recycles (APUR). Certain statements in this annual report concerning our future growth prospects are forward-looking statements, which involve a number of risks, and uncertainties that could cause actual results to differ materially from those in such forward-looking statements. The risks and uncertainties relating to these statements include, but are not limited to, risks and uncertainties regarding fluctuations in our earnings, revenue and profits, our ability to generate and manage growth, intense competition in IT services, our ability to maintain our cost advantage, wage increases in India, our ability to attract and retain highly skilled professionals, time and cost overruns on fixed-price, fixed-time frame contracts, client concentration, restrictions on immigration...

Words: 122508 - Pages: 491

Premium Essay

Infosys Ar

...Annual Report 2014-15 Infosys Annual Report 2014-15 Narayana Murthy A tribute to our founders Nandan M. Nilekani S. Gopalakrishnan K. Dinesh The year 2014 was a milestone in our Company's history, when we bid farewell to three of our founders who held executive positions in the Company during the year – Narayana Murthy, S. Gopalakrishnan and S. D. Shibulal. Narayana Murthy stepped down as the Chairman of the Board on October 10, 2014. His vision, leadership and guidance have been an inspiration to Infosys, the Indian IT industry and an entire generation of technology entrepreneurs. He propelled the Company into accomplishing many firsts and in setting industry benchmarks on several fronts. He espoused the highest level of corporate governance standards that have defined Infosys over the years and made us a globally respected corporation. Between June 2013 and October 2014, he guided the Company through a period of stabilization and leadership transition. S. Gopalakrishnan stepped down as Vice Chairman of the Board on October 10, 2014. Kris, as he is popularly known, served the Company in several capacities over the last 33 years. As the Chief Executive Officer between 2007 and 2011, he steered the Company at a time when the world was faced with economic crises. Ranked as a global thought leader, Kris has led the technological evolution of the Company. S. D. Shibulal stepped down as the Company's Chief Executive Officer on July...

Words: 136409 - Pages: 546