...3/10/13 2013 Predictions: BYOD; death of the desk phone; over-the-top services; and moreMobile Technology | Wireless Broadband | Wireless Carriers | RCR… Trends » Careers Webinars Reports RCR TV Global Spectrum Map Home U.S. Americas Carriers Devices Enterprise Policy Analyst Angle Opinion Backhaul LTE Subscribe Categories: Wireless 2013 Predictions: BYOD; death of the desk phone; over-the-top services; and more Posted on 09 January 2013 by by Andy Ory, CEO, Acme Packet. Tags: BYOD, Enterprise Mobile and Wireless, LTE, small cells, Wi-Fi Share 13 0 Tw eet 43 Like 4 Send Editor’s Note: With 2013 now upon us, RCR Wireless News has gathered predictions from leading industry analysts and executives on what they expect to see in the new year. It’s always fun this time of year for our team at Acme Packet to gaze into the crystal ball and come up with our best bets for what we think will happen in 2013 (and beyond). It’s no surprise that the telecom industry has undergone a dramatic transformation over the last few years, and we don’t see this slowing down in 2013. The two biggest things that have happened in our lives, from any type of communications perspective, are the Internet and the mobile phone, and these two items are now converging – the way we communicate is being revolutionized by advanced devices, activation of LTE wireless services and the expansion of Wi-Fi access areas. As such, telecom providers must evolve business models and...
Words: 2367 - Pages: 10
...pela autorização por qualquer organização de direitos de reprodução. Para fazer pedido de cópias ou solicitar permissão para reproduzir materiais, entre em contato com a Ivey Publishing, Richard Ivey School of Business Foundation, The University of Western Ontario, Londres, Ontario, Canadá, N6A 3K7; tel (519) 661-3208; fax (519) 661-3882; e-mail cases@ivey.uwo.ca. Copyright © 2013, Richard Ivey School of Business Foundation Versão: 15/02/2013 Em janeiro de 2010, Malcolm Harkins, diretor executivo de segurança da informação, Intel Corp., estava enfrentando dilemas em levar para frente a iniciativa Bring Your Own Device (BYOD) (Traga Seu Próprio 1 Dispositivo) A divisão de tecnologia da informação (TI) da empresa estava dirigindo esta iniciativa por quase um ano. Agora que a alta gestão tomou a decisão estratégica em favor da implementação do BYOD, Harkins precisava tomar a liderança na abertura da iniciativa amplamente pela empresa. Mais de 10.000 dos quase 80.000 funcionários da Intel ao redor do mundo já estavam trazendo seus próprios dispositivos para o trabalho. Harkins previu que o número de dispositivos móveis de funcionários no trabalho na Intel triplicaria em um ano e que, em 2014, cerca de 70 por cento dos funcionários...
Words: 7807 - Pages: 32
...The following paragraph describes the feasbility of BYOD, specifically on technical, economic, and behavioural feasbility. Technical feasbility determines the ability of a company in developing and/or acquiring the system. In this case, BYOD is easy to be developed and/or acquired. The pharmaceutical company could set a policy to forcefully requires all the employees to bring their own devices. However, issues on the compatibility of these devices and softwares with the exiting information system (IS) infrastructure should be closely monitor. Secondly, the economic feasibility determines whether the positive economic benefits from proposed system, are worth the financial risk. Although implementing BYOD reduces company's operating costs, this includes hardware costs, support costs, telecom costs, and so on. But there are certain implied financial risk in BYOD, for example, as companies are required to protect both the company's and client's confidentiality of proprietary information, companies might need to develop new systems to monitor the use of employee's device (Jeff, Medcalf, Buckalew & Faria 2013). This is because these devices are used by employees for both personal and business purposes. Ultimately, the new monitoring systems will increase the operating costs. Besides than that, there are also costs on ensuring the devices and softwares are compatible with existing information systen (IS) infrastructure (Jeff, Medcalf, Buckalew & Faria 2013). However, according...
Words: 483 - Pages: 2
...encuesta Cisco IBSG Horizons BYOD: una perspectiva global Cómo aprovechar la innovación liderada por los empleados Joseph Bradley Jeff Loucks James Macaulay Richard Medcalf Lauren Buckalew Resumen ejecutivo Para determinar si BYOD es simplemente un fenómeno de los Estados Unidos (o de las empresas de los Estados Unidos), el Grupo de soluciones empresariales para Internet (IBSG, Internet Business Solutions Group) de Cisco® expandió su estudio original sobre “BYOD y virtualización” para incluir a las personas que toman decisiones de TI en empresas de 1000 o más empleados y en empresas medianas (entre 500 y 999 empleados) en ocho países en tres regiones. Nuestros resultados demuestran que el crecimiento de BYOD no se limita a los Estados Unidos ni a las grandes empresas. BYOD tiene una impronta regional: los países asiáticos y latinoamericanos observan y estimulan ampliamente BYOD, mientras que Europa es más cauta y restrictiva. Hallazgos y conclusiones globales clave • BYOD es un fenómeno global: existen sólidas evidencias de empleados en todas partes del mundo que usan sus propios dispositivos para trabajar; el 89% de los departamentos de TI permiten el uso de BYOD de una u otra forma • Los principales beneficios de BYOD para las empresas son una mayor productividad, satisfacción de los empleados y menores costos; el 69% de los líderes de TI son “positivos” acerca de BYOD • Los empleados desean tener acceso a BYOD para poder elegir dispositivos y aplicaciones...
Words: 9083 - Pages: 37
...utilize, bring you own device (BYOD),bring your own tablet (BYOT), Bring Your Own Phone (BYOP) and Bring Your Own PC (BYOPC) All of these have evolved to empower workforces through the so-called 'computerization of IT. As these services are growing fast, these can be serious risks to company’s data. Richard Absalom, an analyst at Ovum, believes that BYOD will happen whether a company plans for it or not. He says: "Trying to stand in the path of computerized mobility is likely to be a damaging and futile exercise." The best thing that a company or enterprise can do, is to be aware of the benefits and understand the risks. Despite the serious risks involved, there are serious benefits and advantages businesses can benefit from them, it can potentially increasing employee satisfaction, employees can work more flexible, cost savings, it reduces hardware spend, software licensing, device maintenance and productivity gains, employees are happier when they use their own personal device. As I have mentioned, there are risks involved when employees uses their own contrivance in the work force. The questions arise who owns the device? Who manages the device? Who secures the device? Accountability is not something that goes away for a user just because they personally own the device. After all, the data carried on it is company owned. Properly implementing a BYOD program, can reduce cost and increasing productivity and revenue. As BYOD goes to main stream in IT world...
Words: 305 - Pages: 2
...In this case study we explored a business strategy referred to as BYOD or Bring Your Own Device. This networking model allows a company’s employees to use personal devices of their choice when accessing and interpreting company data. This approach has mutual benefits with both the organization as well as the employee. These personal devices give the users increased mobility when accessing platforms within the organization from multiple locations. This proves useful when considering that some work can be taken home or to other places to be completed. In addition to Mobility, this method allows employees to use the programs they are most familiar with to complete tasks. This helps increase speed and accuracy of the employee’s efforts, thus increasing the company’s efficiency and productivity. One intangible benefit, in implementing the bringyourowndevice style, is that you have a much higher satisfaction rate with the employees, which helps boost morale. Another benefit is that the company incurs lower overhead costs associated with IT expenses such as hardware procurement and the maintenance associated with the hardware. The Bring Your Own Device to work model has many benefits, but it also has serious risks associated with those benefits. By using this model the organization is left vulnerable to outside influences. From my research on this topic I found that the organization is put at risk on several levels. When one considers how intricate and massive some networks are...
Words: 831 - Pages: 4
...Mobile Devices in the Workplace Strayer University CIS333 Professor Roden January 22, 2015 Mobile Devices in the Workplace Introduction Mobile devices in the workplace can offer many advantages; however, there are a few major concerns when allowing mobile devices in the workplace. Security being the largest concern, followed by physical concerns and the cost of Information Technology (IT) professionals. Security Security is one of the most important aspects to many businesses. Allowing employees to have mobile devices in work areas may compromise the security of networks. If an employee was to plug their phone into a compute to charge and the phone had a virus on it that virus could be inherited by the work station. Take Bradly Manning for instance, he was privileged to access classified information not to insert a CD-R and steal classified documents. If a user means harm, allowing mobile devices in the workplace only acts as an aide to them. Had Manning not been permitted mobile media in a classified area it would have been significantly more difficult to steal the documents. Physical Concerns The physical concerns with allowing mobile devices in the workplace include distractions from work and possible health hazards. A distracted worker is not only less productive but also careless. Imagine a fork lift driver trying to read a text message and driving through a warehouse where there are other workers; the driver would obviously not be devoted to safety. It...
Words: 894 - Pages: 4
...Case : Intel BYOD Assignment Questions 1. Does BYOD increase productivity in workplaces? 2. Should it be encouraged or discouraged? 3. How might other firms benefit from Intel’s approach to security (as shown in case Exhibit 2)? 4. How can Intel turn BYOD into a new source of competitive advantage? 5. What decisions can Intel make to ensure security of the corporate data on an employee-owned device that is used in the workplace? 6. How should Intel manage BYOD in the face of its e-Discovery obligations? Pasted from Role: Malcom Harkins, chief information security officer was facing dilemnas in taking forward the Bring your own device initiative. - By 2014 at least 70% of employees would be using their own device for at least part of their job. Issue - The difference between personal data and corporate data… was no longer limited to office hours, just as peronal data was no longer off-0 limits during office hours - Employees would be distracted by applications embedded into their devices, which could potentially lead to a negatice impact on productivity - Greater risk in data security - Intel neded control over to access and control company info.. But doing so on employee devices would violate privacy Benefits - Reduced intel's hardware cost because employees bought their own hardware but increased cost in supporting , configuring those devices - Lower cost in data because telecom charged 33% less for personal vs corp data.. Approaches - Do nithng.. And hope that bringing in own...
Words: 527 - Pages: 3
...BYOD (Bring Your Own Device) is attractive for two main reasons. It increases employees’ satisfaction, by allowing them to purchase (and use) whichever device they prefer, and it reduces company’s expenditure on purchasing equipment, and on carrier costs. However, BYOD may incur further costs on the company and leave it exposed to security threats . On the costs front, employees bear the costs of the devices without benefiting from their company’s buyer power (to secure discounts, for example). Furthermore, in BYOD, companies usually pay for data packages for devices that are completely owned by the employees, and since devices are used for personal use, unexpected payments might occur. Thus those data packages may not always completely cover business usage. On the administration side, BYOD may require MDM (Mobile Device Management) services, which are usually provided by a third party, to ensure compliance with organization policy, handle mobile security, and separate between ‘business’ and ‘personal’ usage of the device. MDM services are also required in COPE. Furthermore, IT helpdesk may be inefficient under BYOD policy ; with a wide range of devices used and no standard device policy, help desks may either be less productive due to inability to support devices, or take longer time to complete services due to inexperience with particular apps and/or devices. BYOD approach bears significant security concerns. The primary risk is that personal devices might infect the company...
Words: 699 - Pages: 3
...CASE STUDY IV-8 Mary Morrison’s Ethical Issue (Revised) Mary Morrison, a second-semester sophomore business major at Big State University, was unpacking the new PC that her family had given her for Christmas when she discovered that, except for the Windows operating system, no software was included with the machine. Although the new PC was an adequate computer, it was an inexpensive machine, and one way that the store kept the price low was to not include software. Mary was concerned because she knew that she would need a good word processor, a spreadsheet program, and some presentation software, and she thought that this software would be included with the computer. According to her friends, Microsoft Office Professional was the recommended suite of software for business students. Mary quickly checked around the university and found that she could buy Microsoft Office Professional at the special price of $199. However, a friend, Frank Taylor, offered to let her copy his Microsoft Office Professional onto the new machine. Mary was uneasy about accepting Frank’s offer because she had learned in her computer literacy class that copying copyrighted software was illegal and was tantamount to stealing it. She told Frank that she needed to think about it. Frank could not understand her hesitation. “Everybody does it,” he explained. Mary’s Background Mary’s family was reasonably well-to-do. Her mother and father had met at Big State University and had gotten married when they both...
Words: 775 - Pages: 4
...CASE STUDY IV-8 Mary Morrison’s Ethical Issue (Revised) Mary Morrison, a second-semester sophomore business major at Big State University, was unpacking the new PC that her family had given her for Christmas when she discovered that, except for the Windows operating system, no software was included with the machine. Although the new PC was an adequate computer, it was an inexpensive machine, and one way that the store kept the price low was to not include software. Mary was concerned because she knew that she would need a good word processor, a spreadsheet program, and some presentation software, and she thought that this software would be included with the computer. According to her friends, Microsoft Office Professional was the recommended suite of software for business students. Mary quickly checked around the university and found that she could buy Microsoft Office Professional at the special price of $199. However, a friend, Frank Taylor, offered to let her copy his Microsoft Office Professional onto the new machine. Mary was uneasy about accepting Frank’s offer because she had learned in her computer literacy class that copying copyrighted software was illegal and was tantamount to stealing it. She told Frank that she needed to think about it. Frank could not understand her hesitation. “Everybody does it,” he explained. Mary’s Background Mary’s family was reasonably well-to-do. Her mother and father had met at Big State University and had gotten married when they both...
Words: 775 - Pages: 4
...Kasia, thanks for sharing this is very interesting policy of BYOD/BYOT. This policy is a notable response to improve the gap between technology and school access within the public schools. However, it was very disappointing to learn of the policymakers did not solicit input from teachers, a major policy actor (Fowler, 2013). Ironically, BYOD has been around for a while (in the workplace) as more organizations opted to have employees use same mobile device for personal and office use, and work from anywhere. With regards to the workplace, it was clearly viewed as a cost savings measure for most organizations. Conversely, BYOD became a security nightmare for the technology and human resources departments of these same organizations. Ultimately,...
Words: 284 - Pages: 2
...Bring Your Own Device (BYOD) Bring Your Own Device (BYOD) There are pros and cons to a BYOD policy. Each company must carefully weigh both sides of the situation before making a decision. As the business world moves forward, there may be more companies using BYOD. There are some benefits to a BYOD policy. Having employees use their own devices can save the company money. Instead of buying devices for everyone, they can just buy them for the ones that need them, and the ones that work on projects that need more security. BYOD could also lower maintenance and IT costs, as users would be responsible for their own devices. Since storage would be accomplished via cloud storage, there would not be much risk to the company concerning lost files or shared files. Many users would probably welcome the chance to work on their own devices instead of company devices. Users may feel more comfortable using their own device which might lead to a more productive employee. There are still many risks involved with BYOD. The biggest risk is the possibility of lost files or someone loaning their own device to someone else. It is not uncommon for someone to pass their device around to different people. Another risk is that with BYOD, the company has to support several different brands of devices and also different platforms. The company may have to structure their company to accommodate this. The company also doesn’t have control over what items the employee puts on their device...
Words: 360 - Pages: 2
...1 Deciding on BYOD strategy Determination of which approach to adopt to BYOD 1.1 Perform a high-level BYOD problem analysis to scan for showstoppers 1.2 Validate the program and define the goals Evidence and goals for supporter and stakeholders 1.3 Describe the scope and identify the supporter Commission the BYOD program, definition of goals, and identity of supporters 1.4 Identify stakeholders and solicit input List of stakeholders and the issues/concerns that impact them 2 Grouping employees and outlining support and access for each Segmentation of employees into multiple groups and a package of policies and technologies for each 2.1 Define employee groups Employee roles/needs matrix and a list of applications/services to be supported on BYOD devices 2.2...
Words: 408 - Pages: 2
...BYOD (Bring Your Own Device): Hot or Not? Andrea Ferguson CGS1016-39433 BYOD is the hottest acronym in IT since ITIL. Professionals want to know what’s going on with BYOD, regardless of whether they’re on a team supporting such a program, considering adding such a program, already a part of a BYOD program or simply just interested out of personal curiosity. This paper will explore a few of the pros and cons of a BYOD program. Cisco sponsored a survey of 600 IT and business leaders. The results of this survey showed that 95% of their businesses permit corporate network access by employee-owned devices. Out of the 600 surveyed, 48% support a select list of devices, while 36% allow all devices. Additionally, 11% of those businesses allow employee-owned devices access to enterprise networks but do not offer any type of IT support. It’s clear that businesses have a drive to implement BYOD programs. It’s also clear that these programs are highly popular with both company and employee. Mobile devices, powerful yet inexpensive and easy-to-use tools, help employees to be productive regardless of their location. Collaborative efforts and information exchange can increase, allowing a business to step up their reaction to market changes and/or customer needs. Another plus is that virtually every employee owns some sort of personal mobile device. While mobile technologies use does have the potential to transform business, it can also disrupt IT. Today’s employee expects...
Words: 1194 - Pages: 5