BYOD Chaos
I just read an article published by CNBC online about the chaos caused by BYOD in the workplace, and completely agree.
I just read an article published by CNBC online about the chaos caused by BYOD in the workplace, and completely agree.
The IT life was simpler when employees each had one desktop computer and one landline phone. Technology did not move. It was stationary. Nowadays we have laptops, smart phones, and tablets that are both mobile and connected. And they have no wires. You are told that applications are mission critical, expected to be accessible by people at a speed that optimizes productivity, and available to people inside and outside the organization. And who else wants access all the time? Hackers and other online criminals. As if you had enough to worry about.
If you're over budget this year, your BYOD policy may be to blame.
My – how research has changed in the 20 years I have been working in IT and high-tech! Normally, you would have to scour reams and reams of articles in trade rags delivered via snail mail to find information relevant to your work. Now we have the ability to set alerts, custom feeds and create targeted searches to find many more ‘diamonds in the rough’ than was even possible 10 years ago.
Imagine if your WhatsUp Gold expert simply stopped showing up for work. What’s your Plan B? What is your backup plan for their sudden or even planned absence?
Did you know that this year the number of Wi-Fi connected devices will exceed the world’s population? With the growing number of Wi-Fi connected devices, there have been more and more public Wi-Fi networks created. Nowadays, whether you are in a coffee shop or train station, there is probably a public Wi-Fi in your general area.
I'm sure many of you opened your browser to Google this morning to see the capitol of Kansas replace the search giant's name.
Here is a useful list of tips that network administrators can leverage in their everyday travails.
There has been a lot of buzz around WAN optimization over the past few months, with numerous mentions of what WAN optimization is and what it brings to the table. On the surface, it is certainly a cool technology, but it is a technology that requires some additional thought before implementing. It is certainly another great tool in the network managers arsenal.
Interesting thing virtualization, everyone is talking about it and lots of IT professionals are investigating it and quite a few are implementing it.
Breach, which is set for release in a few weeks, focuses on the true story of an FBI upstart who must investigate his boss who is suspected to be selling secrets to the Soviet Union. For those of you who read the story in paperback or in weekly new journals, a strong lesson materializes in a story early on that is applicable to the numerous breaches we have heard about at TJX and other retail and insurer organizations. Regardless of how strong and robust your physical and digital security plan is, the success or failure of the plan more likely will lie with the human capital charged with installing, managing and watching the systems.
Get our latest blog posts delivered in a monthly email.