This blog post is sponsored by T-Systems and the Zero Distance community.
This is the sixteenth post in my series on BYOD. In my last post on the subject I discussed a range of technologies that can be used to solve issues raised by BYOD. Here I’d like to give my broad recommendations around which of those technologies are most likely to solve the kinds of problems that are typically found in organisations that are looking to embrace BYOD.
In case you haven’t heard Microsoft is ending support for Windows XP and Office 2003 in April of 2014. What this means is that Microsoft will no longer patch security vulnerabilities discovered in XP or Office 2003, and therefore there will be security holes discovered that can be exploited by hackers which will never be fixed. My personal opinion is that in practical terms within a few months users of XP will be wide open to exploits by hackers. Potentially, they will be able to steal your data or take control of your PC and there will be nothing you will be able to do about it! For most organisations this represents an unacceptable level of risk. If you haven’t already started your move off Windows XP, you should – immediately!
This is the fifteenth post in my series on BYOD. I have mostly avoided talking about technology, as in many ways that is the least important, and the most straightforward aspect of dealing with BYOD. Most people automatically think of Mobile Device Management (MDM) when they think of mobile or BYOD technology, but that is far from the only viable solution. Here I’ll outline the key technology solutions that are available to help you deliver usable and effective BYOD to your organisation.
This is the thirteenth posting in my series on Bring Your Own Device (BYOD). In a recent post I looked at 5 myths about BYOD that I had come across a lot. Kenneth quite rightly pointed out that I had looked at only technology related myths, and challenged me to look at more business related ones, as he believed that they were just as important. He is quite right, though because of my day job I wasn’t running into as many of that kind of myth. He helpfully got me started with some suggestions in a comment on my BYOD myths post.
This is the 12th post in my series on Bring Your Own Device (BYOD) solutions (who knew it could stretch this far!). Here I want to briefly examine some of the myths about BYOD that are current in organisations and in the mobility marketplace.
This is my 11th post on Bring Your Own Device (BYOD) solutions. A discussion the other day with Microsoft’s Beat Schwegler (Head of Platform Strategy Group) brought out something that was behind much of my thinking, but I haven’t made explicit: my approach – and my recommended approach – is that BYOD is not actually about devices at all.
This is my tenth post on Bring Your Own Device (BYOD). I hear lots of bemoaning of BYOD – the old joke about “bring your own disaster” – and how it is just being done to support executive toys. My view: so what?! Implementing BYOD is the right thing to do for most organisations. If you can ride the wave of executive demand and deliver something that improves the security and usability of IT in your organisation…what are you waiting for?! Go do it!