Posts tagged ‘Enterprise Architecture’

April 9, 2013

An Overview of Mobility and BYOD Technology

This is the fifteenth post in my series on BYOD. I have mostly avoided talking about technology, as in many ways that is the least important, and the most straightforward aspect of dealing with BYOD. Most people automatically think of Mobile Device Management (MDM) when they think of mobile or BYOD technology, but that is far from the only viable solution. Here I’ll outline the key technology solutions that are available to help you deliver usable and effective BYOD to your organisation.

read more »

Advertisements
April 4, 2013

Privacy Matters for BYOD

This is my fourteenth post in my series on BYOD. This recent article on Infoworld about how the US Department of Veterans’ Affairs has put its BYOD plans on hold illustrates the point that you need to consider and cover off employee privacy when implementing BYOD.

read more »

April 2, 2013

Your Options Analysis Does Not Impress Me

This is another post based on a conversation – this time about options analyses. My colleagues were suggesting that it was OK to present options, highlight the pros and cons, and leave the business to make their own decision. Now, I’ve written a few in my time, and my opinion is clear: if, as an architect, you just present an options analysis to your business that spells out options without making a recommendation, then I think you aren’t earning your salary.

read more »

March 28, 2013

Some Thoughts on Outsourcing

I was discussing outsourcing with a friend the other day. I work in government IT, and outsourcing is used widely in government. He was discussing the tricky nature of being brought in as an independent vendor to the outsourcing vendor. What this brought up was something that is often overlooked in outsourcing deals, especially major ones. That is: any organisation that outsources a function (such as its IT) usually does so in the hope of saving money by shedding large amounts of staff. But, they usually don’t factor in that they will need additional staff with different skills to manage that outsourcer.

read more »

December 11, 2012

Poor Information Security Can Lead to Tragedy

What do Kate Middleton and, Apple and the Ministry of Social Development have in common? Poor information security leading to tragedies. They also show that information security has as much to do with culture as it does with technology.

read more »

December 4, 2012

More BYOD Myths

This is the thirteenth posting in my series on Bring Your Own Device (BYOD). In a recent post I looked at 5 myths about BYOD that I had come across a lot. Kenneth quite rightly pointed out that I had looked at only technology related myths, and challenged me to look at more business related ones, as he believed that they were just as important. He is quite right, though because of my day job I wasn’t running into as many of that kind of myth. He helpfully got me started with some suggestions in a comment on my BYOD myths post.

read more »

October 24, 2012

A Presentation for a Workshop on BYOD Policy

I recently ran a workshop on developing BYOD policies to a group of education sector ICT professionals. It was a great chance to socialise my ideas, thinking and recommendations and get some feedback from people who were actively working on and engaged with this subject. As part of the workshop I decided to organise my thoughts as a presentation, and decided to use Prezi as the way to present my thoughts to the group.

read more »

October 10, 2012

5 BYOD Myths

This is the 12th post in my series on Bring Your Own Device (BYOD) solutions (who knew it could stretch this far!). Here I want to briefly examine some of the myths about BYOD that are current in organisations and in the mobility marketplace.

read more »

October 9, 2012

BYOD Is Not About Devices

This is my 11th post on Bring Your Own Device (BYOD) solutions. A discussion the other day with Microsoft’s Beat Schwegler (Head of Platform Strategy Group) brought out something that was behind much of my thinking, but I haven’t made explicit: my approach – and my recommended approach – is that BYOD is not actually about devices at all.

read more »

October 5, 2012

NZ Government Issues End User Computing Reference Architecture

Last week (28 September 2012) New Zealand’s Department of Internal Affairs issued its end user computing reference architecture: The GEA-NZ Viewpoint: COE Reference Architecture.

read more »