Thanks, Beth, for the additional details on this trend. It sounds like the issue continues to be a major problem, but at least it's getting addressed. A few years ago the solution companies were pursuing sounded more like "just don't bring any of your mobiles to work and don't take any of ours home with you." Right--good luck with that. Obviously, that approach didn't work.
@jmiller: Actually CIOs are consumed by figuring out this trend as we speak. Try googleing the "consumerization of IT" or "BYOD policies." This is a pivotal issue for IT going foward and it many ways it redefines their role making it less about operations and more about becoming a service provider. Most companies are instituting policies that get into the details of stipends (what's covered), support (many companies are now letting users deal with their own support issues with the device providers), and security policies. Some are limiting what users can put on the devices from a personal standpoint, but most aren't. There are also new technologies coming out that enable IT shops to comparmentalize the devices, in a sense separating the personal stuff from the work stuff. And a lot of what they are doing depends on what industry they are in. Some, like financial and health care, are heavily regulated so they can't go as far.
Perhaps there's a future article in that. What's avaiable for what price. I know it's not as glamorous as CAD and all the cool little toys that go along with it. However, I will say it's probably more important and likely just as applicable to CAD stuff.
It looks like the security problems have been "solved" by companies accepting the (apparent) inevitability of people not only hooking up mobile devices to work systems but also wanting to make their own decisions and choices about what those devices are. Remote wiping is probably a lot cheaper than the alternative of potential security risks of stolen data and back doors into corporate nets.
With cloud storage so readily available, there's really no excuse not to have some sort of backup plan for your devices and laptops. Wait, is that me saying that?? Even with owning a slew of Apple technology and iCould at the ready, I am not practicing what I just preached. The truth is, it's my own fault if something happens and the same goes for employees who don't follow suit.
And a little advice to those out there that think it's the employers responsibility to back stuff out. Even though the company chooses not to back something up, you can choose to go above and beyond paying for a back up drive for some files. It might not be what you have to do, however, let's face it, we'll be the ones that have to redo the work so spending a few bucks on a back up drive might save a lot of grief.
@Ann: Harsh, but necessary. I guess it's the price you pay for getting the company to bankroll your device of choice. It's likely a wake-up call for users/employees to be sure they sync their devices to their systems to ensure they have the appropriate back-up in case of such a disaster. My guess is the broader public is like me and they haven't yet embraced that best practice!
Beth, thanks for the update on how companies are dealing with what were a few years ago one of the primary security holes for corporations, mobile devices and specifically, mobile worker-owned devices. Sounds like the fixes, like remote wiping, can be pretty harsh.
@Chuck: You are right that one of the macro trends driving this is the fact that people work more during off hours (commuting on the train, at home at night, in the field at a customer site) and they want the flexibility of having their core tools with them to get the job done.
@jmiller: Savvy IT leaders know this train has left the station and there's no stopping it. Therefore, they are putting mobile management platforms and policies in place to enable what's called "bring your own devices" (BYOD) to work as opposed to stopping it in its tracks. Many companies give employees a monthly stipend to cover these expenses and make them sign policies whereby they are allowed to download personal stuff like pictures and music to the devices, but it they lose it or it is stolen, they are required to let IT departments "remote wipe" the device to make sure any corporate IP is deleted, thus protected. Interesting times.
With erupting concern over police brutality, law enforcement agencies are turning to body-worn cameras to collect evidence and protect police and suspects. But how do they work? And are they even really effective?
A half century ago, cars were still built by people, not robots. Even on some of the country’s longest assembly lines, human workers installed windows, doors, hoods, engines, windshields, and batteries, with no robotic aid.
DuPont's Hytrel elastomer long used in automotive applications has been used to improve the way marine mooring lines are connected to things like fish farms, oil & gas installations, buoys, and wave energy devices. The new bellow design of the Dynamic Tethers wave protection system acts like a shock absorber, reducing peak loads as much as 70%.
Focus on Fundamentals consists of 45-minute on-line classes that cover a host of technologies. You learn without leaving the comfort of your desk. All classes are taught by subject-matter experts and all are archived. So if you can't attend live, attend at your convenience.