Consumer technology is taking over – are you ready?
Ask five people to define “consumerisation of IT”, and you’re likely to get 10 different answers. It’s a broad concept, but is essentially all about the pressure being put on business to create a...
View ArticleSecuring BYOD data
For most companies implementing a bring-your-own-device programme isn’t so much a case of if, but when. And for many of those companies the main thing standing between now and then is security. The...
View ArticleProtect the network for secure BYOD
My recent posts about bring-your-own-device security covered protecting devices and data. There’s a third step you need to consider: protecting the network. The ideas come from the recent Gartner 2012...
View ArticleEverything? There’s an app for that…
Talking to fellow Gen-i blogger, strategy manager Neil Osmond (who really is a clever bugger) recently, he brought up an interesting point about an offshoot of the Bring Your Own Device trend – Bring...
View Article
More Pages to Explore .....