Top 5 Posts of 2013

Over the course of 2013, I wrote a number of posts about CIOs, Cloud Computing, Big Data, Data Centers and IT in general. Here are the top-5 most popular posts in 2013:

5. Time to get on the Colocation Train Before it is Too Late

In the number 5 spot is a post addressing the forthcoming challenges to the data center colocation market and how the ripple effect hits IT.

4. A Workload is Not a Workload, is Not a Workload

Number 4 is a post written in 2012 about the discrepancy between cloud computing case studies. Not all workloads are the same and many of the examples used do not represent the masses.

3. The IT Role in Value Creation is Not a Technology

The number 3 spot goes to a post that addresses the direction of IT organizations within the business and how it is evolving. It is this very evolution that is both very difficult and very exciting at the same time.

2. Motivation And Work Ethics: Passion Fuels the Engine

Another post from 2012 goes to the number 2 spot, which shows that some subjects (like: the importance of passion) have staying power. This post addresses important characteristics for a leader to consider. It addresses the intersection of passion, work ethic and motivation.

1. What is Your Cloud Exit Strategy?

Probably one of the most controversial titles goes to the number 1 spot. This post addresses the challenges faced with cloud when one doesn’t think about their end-state and evolution.

Honorable Mention: So Which Is It? Airplane Mode or Turn Devices Completely Off?

Back in Apr 2012, I was traveling and noticed that many didn’t turn off their devices even though they were instructed to…which prompted the post. Even though the FAA changed their rules in US, this post still gets quite a bit of attention.

Apple Acquisition of AuthenTec Provides Significant Opportunity

Apple’s acquisition of AuthenTec for $8 per share or about $356 million brings a value purchase of fingerprint and security technology. On the surface, the acquisition provides Apple with biometric fingerprint technology to imbed in their mobile devices. While that is significant news, there is more, much more to the story…read on…

First off, $356 million is a bargain for the potential the acquisition could bring. Between the core biometric fingerprint technology and cache of intellectual property (IP), the potential is significant enough. However, there is significantly more potential here.

Value of Mobile Biometric Scanners

Integrated fingerprint scanners in mobile devices are not new. HP was the first to introduce biometric security to a PDA in 2002 with their iPAQ 5450. IBM introduced an integrated fingerprint scanner to a laptop in 2004 with their ThinkPad T42 model. Adding biometric security addresses some of the concerns that come with management of corporate data and near field communications (NFC) for payment processing.

Impact of RIM Blackberry

There most definitely is a relationship between the current state of RIM (makers of Blackberry) and Apple. I wrote a post ‘Learning From The Blackberry Monkey Wrench’ outlining some of my thoughts. There are three core components to the Blackberry service: 1) The hardware devices, 2) The software running on the devices and servers and 3) the RIM operations that manage all Blackberry traffic. This third one is most often missed and one of significant concern. If RIM collapses and the three components go to different companies, what happens to the data center operations that secure and manage the Blackberry system? I’m certain it will create pause for many corporate entities that currently rely on Blackberry solutions.

Apple has the software and hardware solution. However, they do not rise to the level of security Blackberry affords. The acquisition of AuthenTec technology could provide just the boost they need.

Creation of Security Ecosystem

It is unclear as to the entire portfolio of IP AuthenTec brings. One thing is for certain, the potential for upstream and downstream security integration is strong. And with that integration, Apple has the potential to bring a solution to market similar to Blackberry that addresses the data security concerns coming from BYOD and CoIT.

Bottom Line: Considering the acquisition potential beyond the obvious, $356m seems like a steal. Of course, Apple still needs to execute to prove the true value.

Further Reading:

Posted in Uncategorized Tagged ,

Learning From The BlackBerry Monkey Wrench

Bring Your Own Device (BYOD) and Consumerization of IT (CoIT) have brought pause and complications to the traditional IT support model. Some have argued that BYOD is more expensive and not a good option for corporations. I disagree under the premise that the arguments are based on strictly the IT perspective and traditional support methodologies. There is obviously much more to it…but this post isn’t about arguing the BYOD perspective.

While organizations wrestle with what to do, the industry stalwart has tripped, stumbled and appears to be falling quickly.

RIM Falls From Grace

RIM, the makers of the industry-standard BlackBerry, has seen their stock price lose almost 90% of its value in less than 18 months. That is in addition to leadership changes, delay of their next major operating system and significant job cuts. To put that in perspective, the Dow Jones and Nasdaq markets have made minor gains during the same period.


Impact for Enterprise IT

IT organizations and the companies they serve have standardized on the BlackBerry platform for years. Even today, many corporate enterprises still leverage the BlackBerry platform. The downturn for RIM creates a significant challenge for IT organizations and managed service providers (MSP); regardless if they have adopted a mobile strategy or not. Even if the organization has a mobile strategy in place, replacing mobile devices is not a trivial task. Just ask anyone who has needed to coordinate, rollout and support a successful mobile device upgrade. Upgrading to new devices within the same product family (ie: BlackBerry to BlackBerry) presents enough of a challenge. The complications grow exponentially when moving to a new platform (ie: BlackBerry to iOS or Android).

Mobile Strategy Changes

There are solutions to the problem and they require quick action. Some are short-term fixes while others are long-term solutions. First and foremost, if a mobile strategy does not exist…create one! It needs to include the BYOD policy. Ensure that it not only includes consideration for the devices, but more importantly the data and applications. Past methodologies focused on securing devices as the means to securing corporate data. With the move into BYOD and CoIT, securing devices is a futile effort in the long term. Mobile Device Management (MDM) solutions exist to manage the variety of devices a corporate IT organization may encounter. In the long term, relying solely on MDM solutions needs to evolve to managing the applications and underlying data.

Take Action Now

It should go without saying, but corporate entities should not be taking a wait-and-see approach with supporting BlackBerry devices. It takes too long to move to a new platform and this approach could leave users in limbo. Unlike other devices/ solutions, the RIM/ BlackBerry solution relies on RIM’s data centers and servers in operation for the system to work. Unfortunately, the likely outcome for RIM is to sell off the intellectual property assets to a third party. This could mean that the three core components (Software, Devices and Operations) could end up with three different companies…and it is unknown what their motives will be.

Bottom Line: Develop a mobile device strategy immediately and engage backup planning. Don’t wait to see what happens with RIM/ BlackBerry first.

Further Reading:

Gaining Entry to the Enterprise via the Consumer Trojan Horse

The Difference Between CoIT and BYOD: And the Impact for IT

What the CIO Needs to Know About BYOD

BYOD and CoIT Enable Apple in the Corporate Enterprise

I just penned a guest post for Parallel’s Enterprise blog. It talks to the impact BYOD and CoIT has enabled Apple in the enterprise market. You can view the post here:

Sneak Peek of the Under The Radar Conference

The Under The Radar (UTR) Conference ( is tomorrow, April 26, 2012. UTR is the intersection of hot up-and-coming startups, investors and judging. If the reception tonight was any indication, the conference and presentations should be very interesting. Here’s a sneak peak of my take of the hot areas and companies to watch:

Application Development Solutions

A few companies are presenting their solutions in the mobile and security space. In the era of cloud computing, these are two hot buttons that enterprises and service providers alike need to be keenly aware of. The move of the information worker from a stationary device to a mobile device is in process. CoIT and BYOD are both serious factors to the movement. Likewise, using traditional security paradigms in the new model run into serious complications. Tools are needed to help organizations make this move while managing and securing environments.

Companies: BitzerMobile, Cabana, Duo Security, Fabric Engine, Framehawk, StackMob

Platforms and Infrastructure

Building applications on top of infrastructure is nothing new. In the cloud era, the architecture…and options open up quite a bit. The cloud market is starting to mature and value is moving from core infrastructure to platforms and on to applications. Leveraging hosted platforms does require a different paradigm to succeed. In addition, when considering apps at scale, automation and orchestration become even more important. This is a very broad area with quite a bit of specialization. Moving forward, integration in the space will be the key to success…along with some consolidation.

Companies: Appfog, AppHarbor, CloudBees, CloudScaling, Drawn to Scale, ionGrid,, MemSQL, MongoLab, Nodejitsu, NuoDB, Piston Cloud, Puppet Labs, Sauce Labs, ScaleArc, Zadara Storage

Monitoring and Analytics

One of the most interesting areas is how data is used and analyzed. And then taking action based on the information gleaned from the data. Players in this space range from aggregating data to understanding and analyzing it. Value increases as the data is moved into analytics and ultimately business actions taken based on the intelligence. While there is quite a bit of specialization in this area at different levels (application monitoring/ performance management to analytics and intelligence), added value will come when these can be tied together to drive business decisions.

Companies:, Cloudability, Cloudyn, Datadog, DataSift, Infochimps, Metamarkets, Nodeable, Sumo Logic, Tracelytics

Interesting Areas to Watch

In today’s marketplace, there are the future-state solutions and concepts. And then there are the real-world solutions that solve today’s problems. Both states need to be understood and the ball needs to be moved forward…and fast! The increased amplitude of mobile devices along with cloud computing bring applications at scale into the forefront. Orchestration and automation becoming hallmarks to success to up-level the conversation and value IT brings to organizations. Ultimately, the play will be with data and analytics. But today, there are more fundamental issues on the table.

Of course, that’s just a cursory review of the upcoming presentations from the UTR conference. Look for more details in the UTR Twitter stream (#UTRconf) and posts after the conference.

Gaining Entry to the Enterprise via the Consumer Trojan Horse

Ok, so you’re selling technology products, solutions or services. You’re looking for the largest buyers and typically look to the enterprise market. You develop the strategy and start going to work. You setup a sales team, check. You setup a channel and partner program, check. Then you start leveraging the relationships, check. But how do you cover the consumer angle? Huh? Yes. Using consumers as a sort of ‘Trojan Horse’ into the enterprise space.

In just the past few years, we’ve seen an uptick in the impact of Consumerization of IT (CoIT) in the enterprise space. The movement shifts the power pendulum away from IT and toward users. BYOD is also making an impact on the movement too. For more info on BYOD vs. CoIT:

In the case of Apple, they’ve attempted entry into the enterprise market a few times. Each time, they’ve been unsuccessful in creating a beachhead and establishing momentum. In the past two years, their attempt to enter the enterprise has largely succeeded. According to Apple’s latest quarterly earnings call, “94% of the Fortune 500 and 75% of the global 500 are testing or deploying iPads”. Others are also in the testing phase (see link below). And that doesn’t take into account the number of devices already in play via the consumer angle. So, is Apple changing their strategy to enter the enterprise environment? Regardless of the specific answer, they are progressing. The move gives Apple an interesting beachhead into the enterprise space…whether they intended to or not.

Interestingly, if consumers are used to using a given technology, they’re more supportive of using it in their professional life too. And that is a good thing for IT organizations from an adoption standpoint. The question is how providers can help enable this process. Apple is a good use-case of a different approach.

The point is: If you’re a provider looking to make a beachhead, there are options to sell into enterprises beyond the traditional approaches. Consumers is one way…but doesn’t fit every company’s solution. If your solution does fit, it might be an interesting model to consider. And this doesn’t cover the other targets open to most providers. But more on that later…

Additional Links:

CIO Magazine – Is Apple changing Its Enterprise Tune?

So Which Is It? Airplane Mode or Turn Devices Completely Off?

I’ve written about the Consumerization of IT (CoIT) in past missives. It seems that today, everyone flying on an airplane has some form of technology gadget. And the range varies from a cell phone to an iPod, to a tablet to a laptop.

Anyone who has been on an airplane in the past couple of decades has heard the warning to turn off their devices during takeoff and landing. “The main cabin door is closing, please turn off any device with an on-off switch. Airplane Mode is not acceptable.” Really? I mean, I understand ‘why’ they are saying to fully turn off and not just to airplane mode. But what happens at altitude? People just turn their devices back on…cellular radios and all! The bottom line is that while folks generally knew how to operate technology, the nuances still escape them.

In fact, on a recent flight from LAX to DFW, I flew on a United CRJ-700. The flight attendant comes on with the normal warning as the door closes. Everyone turns off their devices like they’re told and we’re off! 18,000 feet later, the double-chime alerts the cabin it is ok to turn on “approved” devices. But that’s where things go awry.

On this particular flight I was walking back from the restroom at the back of the plane. Which, I might say, was roomier than most narrow-body jets. But enough about the size of the bathroom. As I walked down the aisle back toward my seat, I always take note of the number and type of devices that people use. On this flight, there were an ample number of iPads in use. Nothing new there. What was a surprise was seeing “No Service” displayed in the upper left hand corner of the screen. And not just on one iPad. But I casually counted at least six of them in this state…and that was just the folks in aisle seats.

I would have expected to see the all to familiar airplane icon that notes the device is in “airplane mode”. Airplane mode, for those not familiar, is where the device turns off the transmitting radios (cellular, Wi-Fi, Bluetooth). Isn’t that what the announcements are intended to address?

This all got me thinking that the announcements really are not doing what they intended. Supposedly (and that’s a big supposedly), electronic devices can interfere with the navigation of an aircraft. Ok. So, which is worse? Finding out that a device onboard interferes with navigational equipment while you’re on the ground? Or finding out when you’re at altitude? Personally, I’d prefer the former.

Just last month, the NY Times learned that the FAA is going to take a “fresh look” at electronic devices on flights.

I’m not going to hold my breath. It will probably take quite a long time before we see a list of approved devices …let alone a broader context of what is approved. What makes this all bizarre is that the FAA has already approved the use of iPads in the cockpit to replace the bulky flight manuals.

If we assume that folks other than the ones I observed are equally confused by the difference between airplane mode and turning off the device, then what are we really fighting against? Bureaucracy? I would bet good money that more devices are turned on and transmitting at altitude. As for when the FAA might lift the ban on using devices on landing and takeoff? My bet is that it’s right behind lifting the ban on liquids in carry on luggage. Again, I’m not holding my breath.

Regardless of the FAA regulations, my recommendation is to enable airplane mode while in-flight. Why? It saves on the battery life of the device. Plus, it just won’t connect to a cell tower.

The average cell tower covers an area of approximately 10 square miles (or a radius of approximately five miles). Five miles translates to 26,400 feet. And most commercial aircraft fly from 30,000 to 40,000 feet. That translates back to between 5.68 and 7.58 miles…well outside of the distance needed to connect. And because cell radios in devices are smart, they vary the power needed to connect to a cell tower. In flight, this means the cell radio is using full-power to attempt the connection…therefore draining precious battery power.

So, the next time you’re in the air, save yourself some headaches…and battery power. Just switch your device to airplane mode and then turn it off for takeoff and landing. When you’re back on the ground, switch it back to regular mode.

And let’s hope that the FAA does heed the sheer magnitude of growing user base that are using these devices by changing their rules.

Posted in Uncategorized Tagged

My Top 5 Most Used Business Apps for iPad

As a frequent flyer that booked over 150,000 actual flown miles last year, I like to travel light. In that vein, I prefer to travel with only an iPad and no laptop. Sure, I do have a MacBook Air that I could bring. These days, I find that flying with the iPad solo fits the bill.

As a diehard iPad user, I’m often asked about the applications I use and why. That brings me to this list. There are many different applications that I (and others) have used and find useful. However, I find that I come back to these applications more than others. As a bonus, I’ve added a few honorable mentions to the end.

Top 5 Most Used Business Apps

1. Pages/ Keynote: Pages is Apple’s version of a word processing application. It lacks more complex features like reviewing found in Microsoft’s Word. But it is great to for taking notes and creating documents. And you’re able to export to PDF and Word formats. Keynote is Apple’s version of a presentation application. I do find creating presentations in Keynote cumbersome. So, I create the presentations in PowerPoint on my laptop then transfer them into Keynote. Using the iPad video adapter, I am able to present right off the iPad. One tip: make sure to test your presentations after conversation to Keynote. Some of the more complex features don’t translate cleanly. But with trial and error, I have found what works and doesn’t work.

2. iThoughtsHD: A stellar mindmapping tool which is a great way to collect thoughts, move them around and organize them. Using the iPad Video Adapter, your mindmap is displayed on a projector which is a great way to collaborate with others. And there are plenty of ways to export your mindmap…or just email it to folks.

3. Penultimate: The toolset would not be complete without a freehand drawing tool. It is a great tool for drawing charts and pictures of your thoughts. While you can use your finger to draw, I find a stylus more functional and precise. And again, like iThoughtsHD, you can display to an external projector using the iPad Video Adapter. In addition, you can export or email diagrams around too.

4. Box: I’ve used iDisk, DropBox, Box and iCloud. iCloud is great for sharing between Apple applications and devices. However, I found that Box provided better usability between platforms and applications. In addition, Box gives you the ability to select “favorites” of files or folders to access offline. That’s great for use on an airplane. In addition, a increasing number of apps support the WebDAV standard allowing files to be saved directly to Box. Conversely, files can be opened by specific applications instead of simply using the Box file viewer.

5. Kayak: This is a new entry to my list. I used to be a TripIt Pro user. However, I have found that Kayak now provides updates to trip (flight changes, gate changes, etc)…but without the subscription feel that TripIt Pro requires. Don’t get me wrong. TripIt Pro is a great application. The only reason I dropped them for Kayak was the fee. And I was already using Kayak for other purposes too.

Honorable Mentions:

1. Twitter: Call me a purist, but I fancy the classic application. There are others that work well too.

2. Skype: Calls from overseas can be pricey. So, I tend to rely more on Skype. I also use Skype if I’m in a location with spotty cell coverage…but good Wi-Fi. Convention centers and hotels come to mind.

3. United Airlines: The new(er) United app is really an app for iPhone. Aside from the graphics, it works well on the iPad for looking up details about your trip and alternative flights.

4. WordPress: It’s a decent way to make posts to your blog, change pages and check stats.

5. LinkedIn: Similar to the United app, this one is designed for the iPhone too. But I still find it more useful than pulling up a browser to search, make connections and send notes.

Necessary Hardware:

1. Apple VGA Adapter: This is one of the most used cables in the bag. It connects between the iPad’s 30-pin connector and a VGA port. Sure, there is an HDMI version. But I have yet to find a place that has a projector or display with HDMI over VGA.

2. Apple Wireless Keyboard: Over time, I’ve become very proficient with the iPad’s on-screen keyboard. But there are times when the external Bluetooth keyboard is called for. And it’s a very light addition to the bag.

3. Incase Origami Workstation: This is a great case for the Apple Bluetooth keyboard. Before getting it, I kept having trouble with the keyboard constantly turning on when I threw it in my bag. Then it would drain the batteries in the keyboard and the iPad. The Origami case provides enough protection for the power button on the side. In addition, it serves as a great stand for your iPad making it into a pseudo laptop.

4. iPad 10w Power Adapter: The power adapter that comes with the iPad is great. But you never know when you will need a bit more extension to the cable. Or run into a plug that won’t fit the iPad’s power brick. That’s where this cable comes in handy. And it works for your iPhone too.


I hope you find this list useful. Enjoy!

Posted in Uncategorized Tagged ,

The Difference Between CoIT and BYOD: And the Impact for IT

There is quite a bit of confusion between CoIT (Consumerization of IT) and BYOD (Bring Your Own Device). While these two subjects are related, they are not the same. To make things more confusing, the two terms are often interchanged. Yet, they have very different contexts and definitions. And the impact for IT organizations is significant. Read on…

Consumerization of IT (CoIT)

The consumerization of IT refers to a fundamental change in ‘how’ people use technology. It does not specifically refer to the devices they use, but rather how they work.

As people become more familiar with technology, they tend to use it in everyday life. The reciprocal is true too. Two common examples CoIT are Mobile and Social. In the mobile space, just about everyone has a mobile device. It could be a cell phone, tablet or laptop. Over the past 10 years alone, the number of mobile devices has increased astronomically. Today, there are over 5 billion mobile phones in the world and more than 80% of the world’s population has a mobile phone. Two factors contribute to this change: 1) The cost of the device has reached a point where many more people can afford to own them. 2) Devices are much easier to use. In the past, an IT person would need to configure the device and perform training for the user. No longer is that the case. Even a 4-year-old can operate a device today. In the social space, everyone is using Twitter, Facebook and LinkedIn. Users do not need an instruction manual to reach the site or operate the service. In fact, Facebook has over 800 million users today. It would take a large army of IT professionals to train 800 million users using the traditional model.

Bring Your Own Device (BYOD)

On the other hand, BYOD is all about the device. Everyday users are more likely to use these devices (smartphone, tablet, laptop) today. The combination of price drops and ease of use contribute to the change. Due to the familiarity with these devices, users prefer to use them in their everyday work environment. The trend to use personal devices in a corporate environment started several years ago with the mobile phone. People preferred to use their own mobile phone rather than carry one for personal and one for work. With the advent of smartphones that evolved to checking email, surfing the web and the plethora of other applications available today. Tablets and laptops followed in the wake of smartphones.

Today, some corporate entities have fully embraced the concept by providing employees a stipend for their device(s) rather than issue a company-owned device. In other cases, companies pay the bill for the smartphone voice and data plans. The expectation is that the user is checking the device more frequently than they would a company issued device.

From the CIO perspective, I wrote about BYOD in: What the CIO Needs to Know About BYOD

Changes in How We Work

There is another factor that directly affects this evolutionary change. The organizations and people that belong to them are changing. There are two fundamental drivers: 1) The new workforce and 2) Changes in the technology solutions. By new workforce, I mean the employees that are entering the workplace today. Employees entering the workplace in the past couple of years are the first ones that grew up with a computer from birth to adult. Prior generations picked up computing somewhere along their upbringing or career. That single change provides a workforce that is far more comfortable with computers and electronic devices. They are much more adept at technology change and evolutionary shifts than prior generations too. This milestone is not one to underestimate.

Changes to the IT Paradigm

The general user base is not the only group that is changing. With the changes to CoIT and BYOD, the IT Paradigm needs a significant overhaul. The days of ‘command and control’ are over. The technology paradigm has reached a point where it can no longer be ‘controlled’. But it can be managed! That is where the paradigm changes. Today’s technology world is about setting boundaries, guidelines and frameworks. It is less important to create walls and fortresses. This applies to both the culture we set within the organization and the technology solutions we put in place. One example might be how to protect data rather than the device itself. If you can’t control the device, what are you going to do? You can’t just throw your hands up and give up. There are solutions.

Interestingly, this fundamental change to the way IT operates has significant ramifications beyond just CoIT and BYOD. Yes, making the shift is hard. We have spent 30 years building the methodologies and paradigms we work within today. Change is hard and takes time. But the opportunities for those that make the change are significant.

Bottom Line: CoIT and BYOD are different, but related. Both require changes to the fundamental operations of the IT organization. Those changes, while challenging, can provide significant value moving forward.

What the CIO Needs to Know About BYOD

BYOD is a relatively new acronym. No, it does not mean Bring Your Own Drink. It stands for Bring Your Own Device. By device, it means smartphone, tablet or laptop. Conceptually, it means that the user is using their own personal device rather than one issued by the company they work for.


Historically, computing resources were expensive and not widely used by consumers outside of the companies they worked for. Over the past decade, the cost for these devices has dropped. In addition, the devices have become more functional. As such, employees are upgrading from traditional cell phones to smartphones. They are also starting to use tablet devices and laptops more than desktop systems. And workers entering the workforce today started life in the computing age. Therefore, gaining a greater comfort with computing devices in everyday life compared with those of us…ah-hem…that are older.


As “smart” devices becoming more prevalent, their use for everyday things from communication with friends to buying a latte increases accordingly. Users get accustomed to using certain devices. Those devices also gained the ability to interface with corporate environments. While a company could still issue a smartphone to an employee, it would duplicate the capabilities of their existing device. And the employee is more likely to have their personal smartphone with them wherever they go than a company-issued smartphone. Similarly, the cost of tablets and laptop computers is decreasing to a point where many consumers prefer the flexibility it provides rather than a bulky desktop computer. It is another device with duplicate capabilities of that company-issued model.

Company Issued Device vs. Stipend: Where Does Responsibility Go?

Companies are increasingly looking at novel ways to embrace this change. It does take much of the responsibility off the company and moves it to the employee. One option is to replace the company-issued device with a stipend to offset the cost to the employee. This then puts the responsibility for the device in the hands of the employee. Are employees ready for this responsibility? In many cases the answer is yes. They are already managing their personal device and ensuring that they have a computer, phone or other communication device anyway. The risk is relatively low to shift this responsibility to the employee. And the benefit to shed capital costs from the company is positive too.

Prevention, Control and Support

While this seems like a significant trend, can it be stopped or prevented? The short answer is: No. At the CES 2012 conference in Las Vegas this week, manufacturers announced several new laptops, tablets and phones. Even more phone announcements are expected at Mobile World Congress in February. And each new model of device adds to the functionality and usability. The best advice for corporations is to embrace the trend and support BYOD. That does not mean venturing into BYOD with your eyes closed. There are several decisions to make around the support and management of data related to the devices. Clear lines of responsible are needed. Organizations should expect that some level of support is still required on behalf of the company. However, it pales in comparison with complete support of company-issued devices.

Security and Data Management

There is one area that is more important than device support. It has to do with security and data management. In the case of company-issued devices, the company directly controls the data contained within the device. When the employee separates from the company, the device is returned…along with the data. In the case of BYOD, the data is stored on an employee-owned device. Companies need to take precautions to segregate corporate data from personal data. And in the case of separation, provide a means to adequately destroy corporate data located on the personal system or device. Today, there are tools that assist companies in managing these devices and the data contained within.

Policy Framework

In order to support BYOD, the company needs a clear policy around BYOD and a framework to adequately support the various platforms. Without a framework, the risks are great for the company. The framework needs to cover both device support and data management. There are responsibilities for both the company and the employee.

Cultural Shift

BYOD presents a significant cultural shift for the CIO and their organization. On one hand, it presents increased complexity to management of data. On the other hand, it improves flexibility, capital exposure and employee moral. Even with the challenges, there are tools available today to manage BYOD effectively. In addition, organizational culture changes are needed to understand and engage a BYOD model within the company. BYOD is just one of many significant shifts in the IT world today…with many more to come.

Bottom Line: Support BYOD, but create a framework to protect corporate data and provide adequate support for employees.