BYOD

Dell Drills Dongle-Sized Hole in BYOD Assumptions

Posted In DataCenter
Adding virtualization, security, management, custom apps, and legacy support to Android on a flash drive changes the options regarding secure remote-access decisions. continue…

Steam Gamer Boxes Pit Linux Against Windows

Posted In DataCenter
A custom game-oriented UI on top of Debian could make Linux commonly available as a home, graphics and BYOD alternative for the first time. continue…

IT Responds to BYOD With ‘Fear and Loathing’

Posted In DataCenter
Few tools are available to secure data and devices; many companies avoid security policies that would affect employee-owned devices. continue…

This is Your Digital Life

Posted In DataCenter
By 2015, any company wanting to capture the attention of its customers or employees will have to compete with digital media flowing every waking second. continue…

Erased, Discarded Mobile Phones Still Pose Security Risk

Posted In DataCenter
The uncertainty of securely erasing flash drives, and sloppy security by end users, make even unused phones a threat. continue…

Smart Devices Reveal Lots of Detail About Obvious Truths

Posted In DataCenter
New analytics platforms allow robots to diagnose stiff ankles, as well as how students are using devices to goof off in class. Welcome to the wonderful world of Big Data. continue…

Time Analysis Leaves BYOD Justifications Fuzzy

Posted In DataCenter
Online leisure time steals lots of minutes per day from other activities, but it’s not clear what effect that has on worker productivity. continue…

Enterprise App Store is Latest Effort to Control Mobile Users

Posted In DataCenter
Many in IT like enterprise app stores as a way to control mobile apps, not make them more effective. continue…

Worst Idea a Whole Industry Ever Had: WiFi in The Car

Posted In DataCenter
ITBusSavvy
As if texting wasn’t distracting enough, what drivers truly need is full broadband access to the Internet. BYO_EMTs. continue…

The Key to BYOD: Secure Apps

With 80 percent of BYOD initiatives categorized as poorly managed, there are some big steps needed for a secure environment. continue…