BYOD in pictures
News about BYOD
Interviews about BYOD
Citrix is laying out a new strategy to position itself as a "software-defined workplaces" company that enables its customers to have a mobile workforce that can access everything they need to be productive from anywhere and on any device.
Shadow IT is posing a significant challenge for organisations today, according to LogMeIn.
Dell on Tuesday announced a "virtual smartphone" to help companies keep better track of security and expenses related to employee-owned smartphones and tablets.
Good Technology has launched a new tool which allows organisations to evaluate the key drivers of their mobile cost of ownership, benchmark themselves against peers and identify areas for improvement.
Cloud, analytics, mobile and social are the areas in which IBM is seeing growth in the IT industry.
One of the big enterprise mobility stories of late is the ruling by a California court that companies who require employees to use their personal smartphones for work must reimburse those employees "a reasonable percentage" of their monthly bills. As CITEworld's Nancy Gohring reported last week, similar legal challenges are happening in other states, including Washington, New Jersey, and Michigan.
A recent California appellate court ruling could hurt efforts to implement bring-your-own-device (BYOD) to work policies nationwide, analysts agreed Tuesday.
A recent study by Symantec has found one in five (20 per cent) mobile apps transmit passwords in plain text.
Features about BYOD
Michael Keithley has more than two decades of experience as a CIO. However, the IT veteran says he's seeing more change now than ever before. CIO.com's Tom Kaneshige sat down with Keithley to talk about the challenges he and his colleagues face, the need to speak the same language as the business side and the reality of what lies ahead for CIOs who refuse to change their approach.
For Dell Software CIO Carol Fawcett, "BYOD" is not about being an expert on every mobile device in the world; it's about giving workers secure access to the apps and data they need on whatever device they are using.
In New York City, venerable companies give luxurious corporate cars to power brokers dressed in Armani suits driving down Wall Street. But across the country in San Francisco, you're more likely to see blue jeans-clad execs driving shared Zipcars to their wacky digs in SoMa, or south of Market.
The Samsung Galaxy S5 is an evolutionary device; the vendor’s new flagship is better than its predecessor across the board, without quite being revolutionary. But while it houses impressive hardware, it is let down by the infamous TouchWiz, Samsung’s own interface overlay which skins Google’s Android 4.4 Kit Kat operating system with heavy-duty software (and in some cases, gimmicks).
Going into 2014, a whirlwind of security start-ups are looking to have an impact on the enterprise world. Most of these new ventures are focused on securing data in the cloud and on mobile devices. Santa Clara, California-based Illumio, for example, founded earlier this year, is only hinting about what it will be doing in cloud security. But already it's the darling of Silicon Valley investors, pulling in over $42 million from backer Andreesen Horowitz, General Catalyst, Formation 8 and others.
The mobile world changes fast. Case in point: A year ago thinking that Android devices could be on par with -- and perhaps even overtake -- Apple in the enterprise would have been considered crazy. But the today the race is neck and neck.
The enterprise has gone mobile and there's no turning back. And while the BYOD movement has received plenty of attention, IT departments are getting a handle on the security risks of personal mobile devices in the workplace. The next challenge is "bring your own application" (BYOA), because many public app stores have serious malware problems.
Vague policies, rogue apps, zombie phones can doom even the best Bring Your Own Device intentions. But the good news is it's not too late to make game-changing adjustments.
New technologies and new IT strategies are here to solve all your problems -- except the ones they create
What is a good BYOD policy? Step one is to clarify the rights of both company and employee and state upfront what's business and what's personal. But there's a lot more to it. In this interview with a technology transactions lawyer, CIO.com explores the do's and don'ts of BYOD policies.
- Google Play apps with millions of installs share stock Android browser flaw
- Microsoft takes the ‘ass’ out of Glasshole with a people-blocker
- Mastercard trials voice and face recognition mobile payment technology
- New organization sets out to make secure communication tools more user-friendly
- Ping Identity picks up $35 million more in venture funding
- Apple iPhone 6 Plus: Does the world need an Apple phablet?
- Xero appoints senior staff to tap Australian accountants' input
- New .sydney domain fuels online real estate boom
- NICTA appoints former La Trobe professor as new director
- More News
- 29 Sep
- Vendor and Supplier Management Workshop
- 30 Oct
- Ovum 2020 Telecoms Summit
- 05 Nov
- vForum 2014
- 25 Nov
- GovInnovate Summit
- View all events