Thanks, Beth, for the additional details on this trend. It sounds like the issue continues to be a major problem, but at least it's getting addressed. A few years ago the solution companies were pursuing sounded more like "just don't bring any of your mobiles to work and don't take any of ours home with you." Right--good luck with that. Obviously, that approach didn't work.
@jmiller: Actually CIOs are consumed by figuring out this trend as we speak. Try googleing the "consumerization of IT" or "BYOD policies." This is a pivotal issue for IT going foward and it many ways it redefines their role making it less about operations and more about becoming a service provider. Most companies are instituting policies that get into the details of stipends (what's covered), support (many companies are now letting users deal with their own support issues with the device providers), and security policies. Some are limiting what users can put on the devices from a personal standpoint, but most aren't. There are also new technologies coming out that enable IT shops to comparmentalize the devices, in a sense separating the personal stuff from the work stuff. And a lot of what they are doing depends on what industry they are in. Some, like financial and health care, are heavily regulated so they can't go as far.
Perhaps there's a future article in that. What's avaiable for what price. I know it's not as glamorous as CAD and all the cool little toys that go along with it. However, I will say it's probably more important and likely just as applicable to CAD stuff.
It looks like the security problems have been "solved" by companies accepting the (apparent) inevitability of people not only hooking up mobile devices to work systems but also wanting to make their own decisions and choices about what those devices are. Remote wiping is probably a lot cheaper than the alternative of potential security risks of stolen data and back doors into corporate nets.
With cloud storage so readily available, there's really no excuse not to have some sort of backup plan for your devices and laptops. Wait, is that me saying that?? Even with owning a slew of Apple technology and iCould at the ready, I am not practicing what I just preached. The truth is, it's my own fault if something happens and the same goes for employees who don't follow suit.
And a little advice to those out there that think it's the employers responsibility to back stuff out. Even though the company chooses not to back something up, you can choose to go above and beyond paying for a back up drive for some files. It might not be what you have to do, however, let's face it, we'll be the ones that have to redo the work so spending a few bucks on a back up drive might save a lot of grief.
@Ann: Harsh, but necessary. I guess it's the price you pay for getting the company to bankroll your device of choice. It's likely a wake-up call for users/employees to be sure they sync their devices to their systems to ensure they have the appropriate back-up in case of such a disaster. My guess is the broader public is like me and they haven't yet embraced that best practice!
Beth, thanks for the update on how companies are dealing with what were a few years ago one of the primary security holes for corporations, mobile devices and specifically, mobile worker-owned devices. Sounds like the fixes, like remote wiping, can be pretty harsh.
@Chuck: You are right that one of the macro trends driving this is the fact that people work more during off hours (commuting on the train, at home at night, in the field at a customer site) and they want the flexibility of having their core tools with them to get the job done.
@jmiller: Savvy IT leaders know this train has left the station and there's no stopping it. Therefore, they are putting mobile management platforms and policies in place to enable what's called "bring your own devices" (BYOD) to work as opposed to stopping it in its tracks. Many companies give employees a monthly stipend to cover these expenses and make them sign policies whereby they are allowed to download personal stuff like pictures and music to the devices, but it they lose it or it is stolen, they are required to let IT departments "remote wipe" the device to make sure any corporate IP is deleted, thus protected. Interesting times.
Truchard will be presented the award at the 2014 Golden Mousetrap Awards ceremony during the co-located events Pacific Design & Manufacturing, MD&M West, WestPack, PLASTEC West, Electronics West, ATX West, and AeroCon.
In a bid to boost the viability of lithium-based electric car batteries, a team at Lawrence Berkeley National Laboratory has developed a chemistry that could possibly double an EV’s driving range while cutting its battery cost in half.
For industrial control applications, or even a simple assembly line, that machine can go almost 24/7 without a break. But what happens when the task is a little more complex? That’s where the “smart” machine would come in. The smart machine is one that has some simple (or complex in some cases) processing capability to be able to adapt to changing conditions. Such machines are suited for a host of applications, including automotive, aerospace, defense, medical, computers and electronics, telecommunications, consumer goods, and so on. This discussion will examine what’s possible with smart machines, and what tradeoffs need to be made to implement such a solution.