I learned a lot of things at Mobile World Congress this year from the various vendors and exhibits. The quality of the information I gathered was top notch, but the most interesting discussions came outside the venue. Whether we were on a break or out to dinner, we were discussing the future of mobile.
Posts Tagged ‘Security’
Tags: android, BYOD, BYOS, Device, HTML5, Mobile, Mobile Applications, Mobile Apps, Mobile Phones, Mobility, Security, smart devices, SmartPhone, Standards, Tablets, technology
Tags: android, BYOD, CIO, Consumerization of IT, Device, Enterprise, Mobile, Mobile Applications, Mobile Apps, Mobile Phones, Mobility, Privacy, Security, smart devices, SmartPhone, Standards, Tablet, Tablets, technology
If you are a parent today, you live your life in fear. Everything needs to be sanitized with 99.7 percent anti-bacterial soap to protect your kids from the germs that surround us. The corporate world isn’t much different in their thinking when it comes to Bring-Your-Own-Device (BYOD) policies. We have security and IT executives who are scared to death that viruses from the outside are going to walk in on their employee’s smartphones and attack their networks.
I recently wrote a post on informationweek.com that talks about what precautions you need to go to in protecting your networks from BYOD. I encourage you to read it here.
Tags: android, Application Development, BYOD, CIO, Consumerization, Consumerization of IT, Device, Enterprise, HTML5, Internet, Mobile, Mobile Applications, Mobile Apps, Mobile Phones, Mobility, Open Source, Policy, Privacy, Security, SmartPhone, Tablets, technology
It seems like just yesterday I was on a plane back from Las Vegas after our last HP Discover, and I can’t believe Barcelona is now just around the corner! What I think is even more exciting is that in just that short time I’ve seen the mobile landscape change again. With the launch of the HP Chromebook, the Nexus5, the iPhone 5 (s and c). Too many new changes to count, oh and don’t get me started on the new companies, the mergers, the latest technologies, and it’s only been 5 months.
All this is just making the idea of heading out to Barcelona and meeting customers and industry peers to talk about what HP is doing in the mobile space that much more exciting. For the uninitiated, HP Discover is our big event we hold twice a year to showcase what we, and our partners, are doing. Attendees get to experience the latest hardware, software and services in a fantastic venue on the Mediterranean. ( I have to admit, I’m going to be doing my best to sneak out and hit the beach. But, I think I’m going to be pretty booked up.)
Currently I have four different sessions/panels that I’m going to be a part of. I would love you to come join me at one or all of them as we discuss everything there is to discuss about mobility in the enterprise. Discussions will range from our own journey in HP IT to the entire enterprise mobility landscape. There’s a little something for everyone.
If you’re attending, please be sure to sign up for one of my sessions. I’m always happy to meet with people that are working in the mobile space and answer questions, but also learn what you are up to. If you haven’t signed up for Discover,I encourage you to register here. I promise it’s an awesome conference that you won’t want to miss.
The following is a list of the sessions I’ll be a part of:
|BB1682||Mobilizing HP: how to embrace BYOD|
|BB1683||Mobilizing your enterprise: an expert panel|
|BB2085||Lessons from HP IT and HP experts. Empowering your mobile workforce – BYOD and productivity|
|TB1895||Mobilizing the HP enterprise – The IT Journey|
Hope to see you all in Barcelona!
Tags: android, Application Development, BYOD, BYOD Policy, Consumerization of IT, Device, Enterprise, HTML5, John Stewart, Michael Moss, Mike Jennett, Mobile, Mobile Applications, Mobile Apps, Mobile Phones, Mobility, NY Times, Security, Standards, Tablet, Tablets, technology
I was just listening to John Stewart interview NY Times writer Michael Moss about his new book Salt Sugar fat and he said something that struck a chord with me. He was talking about the science of creating food and something called the “Bliss factor.” That perfect balance that will ensure that the products are a smash hit with consumers. That’s where I want to go with BYOD policy, I’ve been searching for that perfect mix of hardware, software and education that will protect my IP yet give my consumers that rush they get when eating a Twinkie. OK, I know it’s a bit of flight-o-fancy to think that a BYOD policy can compare to a Twinkie (they are coming back!), but why not, why not venture out on that quest, at least for a little bit.
Tags: Application Development, BYOD, Consumerization, Consumerization of IT, Device, Enterprise, HTML5, Internet, MDM, Mobile, Mobile Applications, Mobile Apps, Mobile Phones, Mobility, Open Source, Security, Standards, Tablet, Tablets, technology
My panel discussion from HP Discover is now available on-demand from the HP Discover 2012 website. It was a great discussion led by Neil Miles, HP’s Mobility Solution Manager, with Kitty Chow from HP’s Technical Services Marketing, Lars Koelendorf HP’s PSS Life Cycle Marketing Manager, Ajay Gupta the Director of Notebook Product Management and myself. We talked about everything from how to mobilize the enterprise to HP’s latest offerings in the mobile space.
If you attended the show, simply log in, otherwise a quick registration is required to view the content.
Tags: BYOD, Consumerization of IT, Device, Enterprise, Mobile, Mobile Applications, Mobile Phones, Mobility, Security, smart devices, SmartPhone, Society, Standards, technology
In a time not long ago it was common to see a business person with two phones sitting on the table when they went to lunch. One phone was their personal and one phone was their business (usually a blackberry). But this recently began to change as more and more people began moving to their own smartphones, and with that change came a call from the masses to allow for BYOD (Bring Your Own Device). Obviously, this has been causing a great deal of turmoil for IT organizations as they try to balance between allowing for BYOD and enforcing their stringent data privacy and access policies.
Tags: Application Development, BYOD, Consumerization, Consumerization of IT, Mobile, Mobile Applications, Mobile Apps, Mobility, Security, smart devices, Standards, Tablet, Tablets
I saw a great quote this morning that got me thinking. It’s a famous one by Albert Einstein and it goes like this; “We can’t solve problems by using the same kind of thinking we used when we created them.” With each passing day the enterprise becomes more mobile and we are seeing a quantum shift in the way people communicate, interact and focus their productivity. But are we trying to solve the problems that come with mobility with the same thinking that brought about mobility?
Tags: BYOD, Consumerization of IT, Enterprise, Internet, Mobile Applications, Mobile Apps, Mobile Phones, Mobility, Privacy, Security, SmartPhone, Standards
We talk so much lately about the consumerization of IT and the BYOD trend which is blurring the lines between company and personal use of devices but are employees ready to take that to the next level by bringing their own computers to work? Over the years, I’ve known a number of developers who work with Mac based systems that would fight tooth and nail to get them allowed into our PC based world, but have always known that the majority of people I worked with had their company computer and then their personal computer and never the twain shall meet. It’s not that these people had nefarious data on their personal computers, it just that they were “personal.”
There are many who are looking to change this trend, with Microsoft leading the way. In his recent blog post, Managing “BYO” PCs in the enterprise (including WOA), Steven Sinofsky, President of the Windows and Windows Live division, said: “Our focus has been on how we can continue to deliver PCs and software that users need, like applications and data-access on any device, with enough IT control to assert that the device is trustworthy, while avoiding any compromise of the user’s privacy on their personal device.” The key here is that Microsoft is trying to offer the best of both worlds where employees can have their own personal computers, but connect them up to the networks in a fashion that is acceptable by IT organizations. However, even though this technology will be available, and it may even placate the IT side of things, the question remains as to whether or not this is something that employees will embrace.
Tags: Application Development, Boss, BYOD, Device, Mobile, Mobility, Policy, Security, smart devices, Standards, technology
In a recent post on Inc., Geoffrey James detailed the 8 Core Beliefs of Extraordinary Bosses. In truth, most of the information imparted seems fairly straight forward, an extraordinary boss sees “business is an ecosystem, not a battlefield,” and extraordinary boss believes their employees to be peers, not their children and so on. While these do hold true in the standard business sense, I couldn’t help but think how they pertain to the new medium of mobile devices and their prevalence in the workforce. This led me to the question: Do extraordinary bosses believe in mobility?
As I examined each of the 8 core beliefs I began to see a pattern emerge. The extraordinary boss believes in empowering those around them with the tools to do their jobs. This is a key facet of the march towards a mobile based workforce and a key to allowing BYOD to become the norm of any successful organization. What is necessary, however, is for there to be an “extraordinary boss” that gets the ball rolling.
Tags: Application Development, BYOD, CIO, Mobile, Mobility, Security
Mobility is going to play a huge roll with CIOs in the coming years as they grapple with issues around security, BYOD strategies and app deployments. Check out this inforgraphic from Wikibon for some great insight into what’s happening and what’s to come.