BYOD in pictures
News about BYOD
Interviews about BYOD
Cloud, analytics, mobile and social are the areas in which IBM is seeing growth in the IT industry.
One of the big enterprise mobility stories of late is the ruling by a California court that companies who require employees to use their personal smartphones for work must reimburse those employees "a reasonable percentage" of their monthly bills. As CITEworld's Nancy Gohring reported last week, similar legal challenges are happening in other states, including Washington, New Jersey, and Michigan.
A recent California appellate court ruling could hurt efforts to implement bring-your-own-device (BYOD) to work policies nationwide, analysts agreed Tuesday.
A recent study by Symantec has found one in five (20 per cent) mobile apps transmit passwords in plain text.
Since most tablets connect to the Internet with Wi-Fi, Adobe does consider tablets to be mobile devices.
The mobility conversation may be driving Citrix’s business in A/NZ, though Fujitsu is also interested in the trend.
A new survey of IT security professionals shows that many businesses are barely starting to exploit mobile technology, and some of them may be a mobile security nightmare waiting to happen.
At a well-known investment firm in New York City, something strange is happening: Mobile app performance issues and privacy concerns have sparked a Bring Your Own Device (BYOD) revolt, and now many employees are asking for their corporate BlackBerry back.
Features about BYOD
Michael Keithley has more than two decades of experience as a CIO. However, the IT veteran says he's seeing more change now than ever before. CIO.com's Tom Kaneshige sat down with Keithley to talk about the challenges he and his colleagues face, the need to speak the same language as the business side and the reality of what lies ahead for CIOs who refuse to change their approach.
For Dell Software CIO Carol Fawcett, "BYOD" is not about being an expert on every mobile device in the world; it's about giving workers secure access to the apps and data they need on whatever device they are using.
In New York City, venerable companies give luxurious corporate cars to power brokers dressed in Armani suits driving down Wall Street. But across the country in San Francisco, you're more likely to see blue jeans-clad execs driving shared Zipcars to their wacky digs in SoMa, or south of Market.
The Samsung Galaxy S5 is an evolutionary device; the vendor’s new flagship is better than its predecessor across the board, without quite being revolutionary. But while it houses impressive hardware, it is let down by the infamous TouchWiz, Samsung’s own interface overlay which skins Google’s Android 4.4 Kit Kat operating system with heavy-duty software (and in some cases, gimmicks).
Going into 2014, a whirlwind of security start-ups are looking to have an impact on the enterprise world. Most of these new ventures are focused on securing data in the cloud and on mobile devices. Santa Clara, California-based Illumio, for example, founded earlier this year, is only hinting about what it will be doing in cloud security. But already it's the darling of Silicon Valley investors, pulling in over $42 million from backer Andreesen Horowitz, General Catalyst, Formation 8 and others.
The mobile world changes fast. Case in point: A year ago thinking that Android devices could be on par with -- and perhaps even overtake -- Apple in the enterprise would have been considered crazy. But the today the race is neck and neck.
The enterprise has gone mobile and there's no turning back. And while the BYOD movement has received plenty of attention, IT departments are getting a handle on the security risks of personal mobile devices in the workplace. The next challenge is "bring your own application" (BYOA), because many public app stores have serious malware problems.
Vague policies, rogue apps, zombie phones can doom even the best Bring Your Own Device intentions. But the good news is it's not too late to make game-changing adjustments.
New technologies and new IT strategies are here to solve all your problems -- except the ones they create
What is a good BYOD policy? Step one is to clarify the rights of both company and employee and state upfront what's business and what's personal. But there's a lot more to it. In this interview with a technology transactions lawyer, CIO.com explores the do's and don'ts of BYOD policies.
- Scientists create one robot brain to rule them all
- Did Microsoft help seed the market for Windows Store scam apps?
- Chrome for Mac to desert early Intel Mac owners by October
- Mozilla presses forward with new revenue plan, debuts ads in Firefox preview
- Drivers want their cars to get to know them better
- Telstra strikes Cloud deal with Telkom Indonesia
- Brocade deploys router for new high-speed research network platform
- EXCLUSIVE: Tonnex International falls into liquidation after lengthy court battl...
- Samsung's 3G Gear S could pave the way for the smartphones of the future
- More News
- 08 Sep
- ITIL Foundation (incl. Exam)
- 10 Sep
- CPX 2014
- 10 Sep
- IT Leaders Lunch
- 16 Sep
- Ingram Micro SMB Favourites Roadshow
- View all events