HOME  |  NEWS  |  BLOGS  |  MESSAGES  |  FEATURES  |  VIDEOS  |  WEBINARS  |  INDUSTRIES  |  FOCUS ON FUNDAMENTALS
  |  REGISTER  |  LOGIN  |  HELP
Blogs
Blog

Is Your Personal Device Personal?

View Comments: Oldest First|Newest First|Threaded View
<<  <  Page 2/2
Mydesign
User Rank
Platinum
Company device for personal usage
Mydesign   11/15/2012 3:53:32 AM
NO RATINGS
1 saves
Richard, but it seems that most of the peoples have a tendency to use official mobile for personal use because the expenses incurred will be borne by company. More over most of the peoples won't like to carry two devices at a time, due to inconvenience.

Mydesign
User Rank
Platinum
Re: Personal devices are familiar
Mydesign   11/15/2012 3:58:14 AM
NO RATINGS
1 saves
Charles, another reason is everybody may not be willing to share their personal contact info with unknown or strange peoples. So they will give only company official contact details. Even I do share my personal contact details only with family and close related peoples, all others with company contact details (mobile number).

William K.
User Rank
Platinum
My personal device
William K.   11/15/2012 10:03:05 PM
NO RATINGS
I worked for a company that demanded that I have a cell phone. They also were willing to pay for the phone and the minutes. In three years of working there I had about ten minutes of personal calls and all of the rest was Methode's company communications.

The email was a different story. They were very slow to get me an email account, so for the first few months I had to use my personal account. What was funny, I thought, was that when I needed to have customers email me photos, they usually had to come to my NetZero account because the mailbox for my company account was to small for more than about three photos. The customers always got a laugh out of that revalation. I don't know if the company has changed that since I left.

At another employer it was impossible to erase an email from your mailbox, which eventually caused problems. My workaround was to access that directory outside of the email program and open the file with my text editor. While the file could not be deleted, the contents could be erased and then the empty file saved. That reduced the size of the files enough to solve the memory problems. But it did take time. And I never used that email connection for anything except company business. One's email at that place was not private at all. It was written into the contract.

bobjengr
User Rank
Platinum
PERSONAL MOBILE DEVICE(S)
bobjengr   12/26/2012 2:10:38 PM
NO RATINGS
Great point TJ.  I do contract engineering work and one client requires certain employees to have "smart phones".    There are multiple buildings within the manufacturing complex and most of the "engineering and quality control types" cycle on a daily basis from building to building.  Management likes to know where we are.  It's basically our only communication system unless we are in the main building.  No intercom at all.   They do not provide "company" phones for individuals other than the three owners.  The expense is our own "nickel".  The very fact these mobile devices could be involved in the "act of discovery" never crossed my mind.  Great point and one that I will definitely have to consider going forward. 

<<  <  Page 2/2
Partner Zone
More Blogs
It won't be too much longer and hardware design, as we used to know it, will be remembered alongside the slide rule and the Karnaugh map. You will need to move beyond those familiar bits and bytes into the new world of software centric design.
People who want to take advantage of solar energy in their homes no longer need to install a bolt-on solar-panel system atop their houses -- they can integrate solar-energy-harvesting shingles directing into an existing or new roof instead.
Kaspersky Labs indicated at its February meeting that cyber attacks are far more sophisticated than previous thought. It turns out even air-gapping (disconnecting computers from the Internet to protect against cyber intrusion) isn’t a foolproof way to avoid getting hacked. And Kaspersky implied the NSA is the smartest attacker.
Counterfeit parts are an increasing problem. Eaton has launched a program to educate buyers in identifying counterfeit electronic components.
It's the Batsuit Gotham needs. An industrial design student's Batsuit can protect would-be vigilantes from fists, blunt objects, and knives.
Design News Webinar Series
2/25/2015 11:00 a.m. California / 2:00 p.m. New York
12/11/2014 8:00 a.m. California / 11:00 a.m. New York
12/10/2014 8:00 a.m. California / 11:00 a.m. New York
11/19/2014 11:00 a.m. California / 2:00 p.m. New York
Quick Poll
The Continuing Education Center offers engineers an entirely new way to get the education they need to formulate next-generation solutions.
Mar 9 - 13, Implementing Motor Control Designs with MCUs and FPGAs: An Introduction and Update
SEMESTERS: 1  |  2  |  3  |  4  |  5  |  67


Focus on Fundamentals consists of 45-minute on-line classes that cover a host of technologies. You learn without leaving the comfort of your desk. All classes are taught by subject-matter experts and all are archived. So if you can't attend live, attend at your convenience.
Learn More   |   Login   |   Archived Classes
Twitter Feed
Design News Twitter Feed
Like Us on Facebook

Sponsored Content

Technology Marketplace

Copyright © 2015 UBM Canon, A UBM company, All rights reserved. Privacy Policy | Terms of Service