5 years, 2 months ago

Cloud and Consumerisation Have Changed the Desktop Forever

This blog post is sponsored by T-Systems and the Zero Distance community. Cloud and the consumerisation of IT have changed the face of end user computing, and the desktop in particular irrevocably. When I look at the shape of end user computing, how much it has changed over the last couple of years, and what the future […]

5 years, 6 months ago

Some BYOD Technology Recommendations

This is the sixteenth post in my series on BYOD. In my last post on the subject I discussed a range of technologies that can be used to solve issues raised by BYOD. Here I’d like to give my broad recommendations around which of those technologies are most likely to solve the kinds of problems […]

5 years, 8 months ago

An Overview of Mobility and BYOD Technology

This is the fifteenth post in my series on BYOD. I have mostly avoided talking about technology, as in many ways that is the least important, and the most straightforward aspect of dealing with BYOD. Most people automatically think of Mobile Device Management (MDM) when they think of mobile or BYOD technology, but that is far from […]

5 years, 8 months ago

Privacy Matters for BYOD

This is my fourteenth post in my series on BYOD. This recent article on Infoworld about how the US Department of Veterans’ Affairs has put its BYOD plans on hold illustrates the point that you need to consider and cover off employee privacy when implementing BYOD. As I understand the article, they are putting their […]

6 years, 1 day ago

#ogChat Summary – 2013 Security Priorities

Totaling 446 tweets, yesterday’s 2013 Security Priorities Tweet Jam (#ogChat) saw a lively discussion on the future of security in 2013 and became our most successful tweet jam to date. In case you missed the conversation, here’s a recap of yesterday’s #ogChat! Continue reading

6 years, 12 days ago

Questions for the Upcoming 2013 Security Priorities Tweet Jam – Dec. 11

Last week, we announced our upcoming tweet jam on Tuesday, December 11 at 9:00 a.m. PT/12:00 p.m. ET/5:00 p.m. BST, which will examine the topic of IT security and what is in store for 2013. The discussion will be moderated by Elinor Mills, former CNET security reporter, and our panel of experts will include… Continue reading

6 years, 19 days ago

2013 Security Priorities – Tweet Jam

2012 was a big year for security. Congress debated cybersecurity legislation ; social networking site LinkedIn was faulted for one of the largest security breaches in history; and global cyber espionage was a trending topic. On Tuesday, December 11, The Open Group will host a tweet jam examining the topic of IT security and what is in store for 2013. Continue reading

6 years, 2 months ago

Viewpoint: Technology Supply Chain Security – Becoming a Trust-Worthy Provider

Increasingly, the critical systems of the planet — telecommunications, banking, energy and others — depend on and benefit from the intelligence and interconnectedness enabled by existing and emerging technologies. Whether these systems are trusted by the societies they serve depends in part on whether the technologies incorporated into them are fit for the purpose they are intended to serve. Continue reading

6 years, 2 months ago

#ogChat Summary – The Future of BYOD

With over 400 tweets flying back and forth, last week’s BYOD Tweet Jam (#ogChat) saw a fast-paced, lively discussion on the future of the BYOD trend and its implications in the enterprise. In case you missed the conversation, here’s a recap of last w…

6 years, 7 months ago

BYOD and Your CEO

What’s small, shiny and keeps CIOs up at night? The CEO’s personal devices. CEOs are like every other employee. They love tablets, smart phones and apps. The glaring difference is that the CEO’s personal devices put the company at much greater risk than the gadgets of virtually all other employees combined. CIOs must  include chief executives in conversations as they grapple with putting BYOD security policies and procedures in place. Many CEOs criss-cross the globe […]

If you liked this, you might also like:

  1. How the CIO Can Establish a BYOD Usage Policy
  2. Building a BYOD Ready Infrastructure
  3. What’s the CIOs Role in Compliance?