BYOD

X BYOD

I am always intrigued with solutions that will save enterprises money, and also satisfy end-users. Many organizations have migrated to BYOD, but this can be problematic for enterprises with a limited technology budget or staff. Imagine a hand full of people trying to support every hardware type and configuration. Then ask yourself what's installed on these systems that have the potential to affect your corporate infrastructure.

I am often asked about which gadget to buy, as if I am an expert on every electronic device on the market. Just recently, I was asked about what cell phone to buy. As most people know, I am a huge fan of Blackberry. I realize that not everyone shares my passion for the crack-berry. The question I will often ask the most is what is your intended purpose. Will your phone be used primarily for business or personal use? For the most part, all smartphones are capable of doing the same things. What makes one device more suited to some purposes than others typically comes down to the user interface and the ergonomics.

Way to often, I hear complaints from people stating that they need a new computer. The reason is usually that their system has become so slow that it is unusable, and in some cases it crashes. These same people will spend hundreds of dollars on technical support and antivirus software, and their system continues to perform poorly. In many of the cases that I have seen, the reason for the poor performance is due to operator error.

Hackers have found a way to steal fingerprints??

Many of you own phones that utilize a fingerprint sensor for authentication (ie. Samsung and Apple). For the longest time, fingerprint sensors were viewed as an adequate means of authentication, but there appears to be a method now to steal your fingerprints using a photo. The following link provides more information on how this is done.

http://money.cnn.com/2014/12/30/technology/security/fingerprint-hack/

If you haven’t heard by now, millions of Gmail usernames and passwords were leaked. I would highly recommend that GMail users change their password and consider using their 2-factor authentication.

http://lifehacker.com/5-million-gmail-passwords-leaked-check-yours-now-1632983265

Whether you are dealing with GMail or any other email provider or service, if there is the option for 2-factor authentication I would recommend you utilize it.

SharePoint has been vital for collaboration, project management, and document control for many businesses. Since SharePoint Online was released, it is only right that it become the latest thing on businesses minds. SharePoint Online has come up several times with some of my clients while discussing infrastructure and cloud solutions. Cost seems to be the driving factor for most business to move to the cloud, so it is natural for things to move to SharePoint Online.

It's interesting that for years these types of debates continue. These types of debates are very similar to the Chevy versus Ford arguments. While I may not be a Ford fan, I do think the Linux versus Microsoft debate is driven by so may factors. In an age where technological advancements are increasingly starting from people's living-rooms, cost tends to be a huge factor. For an individual to setup a development environment in their home can become expensive. For a business that cares more about up-time and support, cost is just a part of doing business.




 

Follow Us

Copyright © 2007 - 2019. All Praise Media LLP. All Rights Reserved.