BYOD in pictures
News about BYOD
Interviews about BYOD
Since most tablets connect to the Internet with Wi-Fi, Adobe does consider tablets to be mobile devices.
The mobility conversation may be driving Citrix’s business in A/NZ, though Fujitsu is also interested in the trend.
A new survey of IT security professionals shows that many businesses are barely starting to exploit mobile technology, and some of them may be a mobile security nightmare waiting to happen.
At a well-known investment firm in New York City, something strange is happening: Mobile app performance issues and privacy concerns have sparked a Bring Your Own Device (BYOD) revolt, and now many employees are asking for their corporate BlackBerry back.
BYOD is now more than just BYOD, according to Webroot, according to worldwide consumer and SMB sales VP, David Bennett, who said the mobile environment has evolved to being about Bring-Your-Own-Other-Device (BYOOD).
Fronde expects the rise of “Internet of Things” to cause further BYOD headaches though the ramp up of corporate data traffic.
The sleuths over at The Verge reported last week that Microsoft is looking for beta testers for the pre-release versions of Office for Android. Despite a slow holiday week, the news traveled pretty fast. If you have an Android tablet, you can sign up at the SharePoint website for recruiting testers.
The biggest challenge with BYOD will be the diversity of devices that may connect to them, according to BAE Systems Applied Intelligence.
Features about BYOD
Michael Keithley has more than two decades of experience as a CIO. However, the IT veteran says he's seeing more change now than ever before. CIO.com's Tom Kaneshige sat down with Keithley to talk about the challenges he and his colleagues face, the need to speak the same language as the business side and the reality of what lies ahead for CIOs who refuse to change their approach.
For Dell Software CIO Carol Fawcett, "BYOD" is not about being an expert on every mobile device in the world; it's about giving workers secure access to the apps and data they need on whatever device they are using.
The Samsung Galaxy S5 is an evolutionary device; the vendor’s new flagship is better than its predecessor across the board, without quite being revolutionary. But while it houses impressive hardware, it is let down by the infamous TouchWiz, Samsung’s own interface overlay which skins Google’s Android 4.4 Kit Kat operating system with heavy-duty software (and in some cases, gimmicks).
Going into 2014, a whirlwind of security start-ups are looking to have an impact on the enterprise world. Most of these new ventures are focused on securing data in the cloud and on mobile devices. Santa Clara, California-based Illumio, for example, founded earlier this year, is only hinting about what it will be doing in cloud security. But already it's the darling of Silicon Valley investors, pulling in over $42 million from backer Andreesen Horowitz, General Catalyst, Formation 8 and others.
The mobile world changes fast. Case in point: A year ago thinking that Android devices could be on par with -- and perhaps even overtake -- Apple in the enterprise would have been considered crazy. But the today the race is neck and neck.
The enterprise has gone mobile and there's no turning back. And while the BYOD movement has received plenty of attention, IT departments are getting a handle on the security risks of personal mobile devices in the workplace. The next challenge is "bring your own application" (BYOA), because many public app stores have serious malware problems.
Vague policies, rogue apps, zombie phones can doom even the best Bring Your Own Device intentions. But the good news is it's not too late to make game-changing adjustments.
New technologies and new IT strategies are here to solve all your problems -- except the ones they create
What is a good BYOD policy? Step one is to clarify the rights of both company and employee and state upfront what's business and what's personal. But there's a lot more to it. In this interview with a technology transactions lawyer, CIO.com explores the do's and don'ts of BYOD policies.
It's a good bet you don't know how much your company is spending on all those bring-your-own-device smartphones and tablets. Even worse, it's probably too much, says a mobility management expert.
- Mobile-loving Aussies open targets for Koler malware: Kaspersky
- Despite shocks, organisations still not making security a continuous process: Bussiere
- Analysis skills lacking as security data piles up, consultant warns
- Virtual servers still face real security threats
- Is Bring Your Own Identity a security risk or advantage?
- 'Feeling good is the killer app,' says Jawbone
- Scott Brinker: Technology is now as much a part of marketing as creative
- Rip Curl rides wearable wave with smartwatch for surfers
- Defending Facebook, OkCupid says it also runs user-behavior tests
- JC Penney: Finding the right customer engagement strategy
- Newcastle Council deploys TechnologyOne enterprise solution
- Vodafone re-allocates 850MHz 4G spectrum a week after Telstra and Optus 700MHz l...
- Sitecore tackles Western Australia with Velrada partnership
- Email to make way for automation: KPMG
- More News
- 29 Jul
- SplunkLive!; Canberra
- 05 Aug
- Systems Technology Day - Build Your Own Private Cloud
- 06 Aug
- Oracle Employee Experience Journey Mapping Workshops
- 20 Aug
- Westcon Group Imagine 2014 - Melbourne
- View all events