{"id":4676,"date":"2016-05-10T09:27:41","date_gmt":"2016-05-10T14:27:41","guid":{"rendered":"https:\/\/www.poweradmin.com\/blog\/?p=4676"},"modified":"2016-05-04T14:45:43","modified_gmt":"2016-05-04T19:45:43","slug":"bring-your-own-everything-revisited","status":"publish","type":"post","link":"https:\/\/www.poweradmin.com\/blog\/bring-your-own-everything-revisited\/","title":{"rendered":"Bring Your Own Everything Revisited"},"content":{"rendered":"<p><span style=\"font-family: verdana, geneva, sans-serif;\"><a href=\"https:\/\/www.poweradmin.com\/blog\/wp-content\/uploads\/2016\/05\/bring-your-own-x.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"size-medium wp-image-4680 alignright\" src=\"https:\/\/www.poweradmin.com\/blog\/wp-content\/uploads\/2016\/05\/bring-your-own-x-300x200.jpg\" alt=\"BYOx\" width=\"300\" height=\"200\" srcset=\"https:\/\/www.poweradmin.com\/blog\/wp-content\/uploads\/2016\/05\/bring-your-own-x-300x200.jpg 300w, https:\/\/www.poweradmin.com\/blog\/wp-content\/uploads\/2016\/05\/bring-your-own-x.jpg 400w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\"><\/a>As advances in technology bring about a convergence of portable hardware, virtualized resources, and remotely hosted tools and platforms, there\u2019s been a corresponding increase in the use of personal devices and related matters in the workplace and in public institutions. This trend has implications for the management, deployment, and security of IT resources \u2013 some of which we\u2019ll consider now.<\/span><\/p>\n<h2><span style=\"font-family: verdana, geneva, sans-serif;\"><b>A Whole Lot of Acronyms<\/b><\/span><\/h2>\n<p><span style=\"font-family: verdana, geneva, sans-serif;\">The move toward personalisation and customisation in the corporate world is classified under the blanket term Bring Your Own Everything \u2013 which for some reason has the acronym BYOx. Within its remit, there are several movements, as follows:<\/span><\/p>\n<p>\u00a0<\/p>\n<p><span style=\"font-family: verdana, geneva, sans-serif;\">\u00b7 <b>BYOD or Bring Your Own Device: <\/b>The use of personal smartphones, tablets, and other mobile equipment, for business purposes.<\/span><\/p>\n<p>\u00a0<\/p>\n<p><span style=\"font-family: verdana, geneva, sans-serif;\">\u00b7 <b>BYOA or Bring Your Own Apps: <\/b>Using personal software for office work.<\/span><\/p>\n<p>\u00a0<\/p>\n<p><span style=\"font-family: verdana, geneva, sans-serif;\">\u00b7 <b>BYOE or Bring Your Own Encryption: <\/b>Using personal tools for data encryption, rather than those provided by your employer.<\/span><\/p>\n<p>\u00a0<\/p>\n<p><span style=\"font-family: verdana, geneva, sans-serif;\">\u00b7 <b>BYOI or Bring Your Own Identity: <\/b>Which everyone does, by virtue of being there, but here extends to personal login profiles and accounts.<\/span><\/p>\n<p>\u00a0<\/p>\n<p><span style=\"font-family: verdana, geneva, sans-serif;\">\u00b7 <b>BYOI or Bring Your Own Infrastructure: <\/b>Augmenting existing IT resources with tools and computational power often sourced from the Cloud.<\/span><\/p>\n<p>\u00a0<\/p>\n<p><span style=\"font-family: verdana, geneva, sans-serif;\">\u00b7 <b>BYOT or Bring Your Own Technology: <\/b>Which could include devices, software and infrastructure.<\/span><\/p>\n<p>\u00a0<\/p>\n<p><span style=\"font-family: verdana, geneva, sans-serif;\">\u00b7 <b>BYON or Bring Your Own Network: <\/b>If corporate intranets and \/ or social networks aren\u2019t enough.<\/span><\/p>\n<p>\u00a0<\/p>\n<p><span style=\"font-family: verdana, geneva, sans-serif;\">\u00b7 <b>BYOW or Bring Your Own Wearables: <\/b>Net-connected monitors and smart tools for performance enhancement.<\/span><\/p>\n<p>\u00a0<\/p>\n<h2><span style=\"font-family: verdana, geneva, sans-serif;\"><b>Benefits in the Workplace<\/b><\/span><\/h2>\n<p><span style=\"font-family: verdana, geneva, sans-serif;\">For employers, allowing workers to use their own devices and technology can (if it\u2019s managed correctly) ease the burden of IT provision, and reduce the cost of providing hardware and software. Workers can be more productive and efficient, with increased access to necessary tools and data.<\/span><\/p>\n<p>\u00a0<\/p>\n<p><span style=\"font-family: verdana, geneva, sans-serif;\">There are risks, of course \u2013 and operational difficulties. Some of these may be addressed officially, with the drawing up and implementing of comprehensive policies, such as those commonly used for BYOD. Among the issues which need to be addressed are:<\/span><\/p>\n<p>\u00a0<\/p>\n<p><span style=\"font-family: verdana, geneva, sans-serif;\">\u00b7 Measures to increase security and guard against data losses<\/span><\/p>\n<p><span style=\"font-family: verdana, geneva, sans-serif;\">\u00b7 Separating employees\u2019 personal information from business data<\/span><\/p>\n<p><span style=\"font-family: verdana, geneva, sans-serif;\">\u00b7 Ensuring support for the full range of personal devices and technologies<\/span><\/p>\n<p><span style=\"font-family: verdana, geneva, sans-serif;\">\u00b7 Managing the <a href=\"https:\/\/www.poweradmin.com\/products\/server-monitoring\/?ref=blog\">corporate network resources<\/a> necessary for running these devices<\/span><\/p>\n<p><span style=\"font-family: verdana, geneva, sans-serif;\">\u00b7 Maintaining compliance with industry standards and regulations<\/span><\/p>\n<h2><span style=\"font-family: verdana, geneva, sans-serif;\"><b>Impacts on IT<\/b><\/span><\/h2>\n<p><span style=\"font-family: verdana, geneva, sans-serif;\">Inevitably, the BYOx movement has had an effect on the way IT is managed \u2013 and not always a good one.<\/span><\/p>\n<p>\u00a0<\/p>\n<p><span style=\"font-family: verdana, geneva, sans-serif;\">A recent survey by SolarWinds questioned 298 public and private sector IT managers, directors, and practitioners across the USA and Canada, to assess the impact which BYOx, cloud, and mobile technologies were having on their operations. Over 90% of those surveyed agreed that their roles have been affected in the past 3 to 5 years by the increasing complexity of IT infrastructures. Small-scale enterprises were most affected by the rise of mobile technologies, while medium-sized businesses were greatly affected by BYOx.<\/span><\/p>\n<p>\u00a0<\/p>\n<p><span style=\"font-family: verdana, geneva, sans-serif;\">Over 50% of those who responded expressed a desire for more training and access to pools of knowledge, to better assist them in adjusting to changes in their own role, and how that change fits into the overall business profile of the organisations employing them.<\/span><\/p>\n<h2><span style=\"font-family: verdana, geneva, sans-serif;\"><b>Infrastructure in Transportation<\/b><\/span><\/h2>\n<p><span style=\"font-family: verdana, geneva, sans-serif;\">Innovation has been one response to the challenge posed by the BYOx phenomenon \u2013 notably in the transport sector.<\/span><\/p>\n<p>\u00a0<\/p>\n<p><span style=\"font-family: verdana, geneva, sans-serif;\">Masabi, a developer of mobile applications for ticketing and commerce, set up a 2012 pilot scheme in the company\u2019s native UK, which was later exported for transport companies in the United States. The scheme makes mobile apps available to commuters as a complementary booking and ticket issuing platform, augmenting the official system. Users of Android, iOS and Blackberry can buy tickets and monthly passes direct from their mobile devices, using a barcode or visual display on the device screen to validate tickets at turnstiles and points of entry.<\/span><\/p>\n<p>\u00a0<\/p>\n<p><span style=\"font-family: verdana, geneva, sans-serif;\">A case of Bring Your Own Infrastructure, given a practical and cost-effective application. Commuters get the convenience of a streamlined ticketing process, while the transport authorities enjoy a smoother flow of passengers.<\/span><\/p>\n<h2><span style=\"font-family: verdana, geneva, sans-serif;\"><b><a href=\"https:\/\/www.poweradmin.com\/blog\/wp-content\/uploads\/2016\/05\/bring-your-own-cloud.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"alignleft size-medium wp-image-4682\" src=\"https:\/\/www.poweradmin.com\/blog\/wp-content\/uploads\/2016\/05\/bring-your-own-cloud-300x200.jpg\" alt=\"bring-your-own-cloud\" width=\"300\" height=\"200\" srcset=\"https:\/\/www.poweradmin.com\/blog\/wp-content\/uploads\/2016\/05\/bring-your-own-cloud-300x200.jpg 300w, https:\/\/www.poweradmin.com\/blog\/wp-content\/uploads\/2016\/05\/bring-your-own-cloud.jpg 400w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\"><\/a>Now it\u2019s Bring Your Own Cloud<\/b><\/span><\/h2>\n<p><span style=\"font-family: verdana, geneva, sans-serif;\">Also known as BYOC \u2013 or \u201cmanaged Shadow IT\u201d.<\/span><\/p>\n<p><span style=\"font-family: verdana, geneva, sans-serif;\">The perceived sluggishness (by workers on the office floor) and lack of versatility of in-house IT provision often leads to employees devising clever ways to work around the official system, in order to gain access to the kind of software and resources they feel they actually need, or prefer working with. This \u201cShadow IT\u201d culture has been the bane of organisations world-wide, for some time now.<\/span><\/p>\n<p>\u00a0<\/p>\n<p><span style=\"font-family: verdana, geneva, sans-serif;\">With <a href=\"http:\/\/www.informationweek.com\/cloud\/infrastructure-as-a-service\/will-byod-become-bring-your-own-cloud\/d\/d-id\/1141602\" target=\"_blank\" rel=\"nofollow\">Bring Your Own Cloud<img class=\"extlink-icon\" src=\"https:\/\/www.poweradmin.com\/blog\/wp-content\/plugins\/external-links-nofollow-open-in-new-tab-favicon\/images\/extlink.png\"><\/a>, individual staff, teams, work-groups or entire departments may use third-party or public cloud services to boost their IT profile. Unregulated, this kind of activity can expose valued intellectual property and sensitive business data over the public Internet, and pose a serious financial and security risk to the enterprise.<\/span><\/p>\n<p>\u00a0<\/p>\n<p><span style=\"font-family: verdana, geneva, sans-serif;\">Organisations can minimise this risk by investing in a hybrid or fully private cloud solution (with resources perhaps allocated to specific divisions that most require them), which would bring this activity within the corporate umbrella, and allow better monitoring and management of security and resource provision in-house.<\/span><\/p>\n<p>\u00a0<\/p>\n<p><span style=\"font-family: verdana, geneva, sans-serif;\">Indeed, this kind of approach is what\u2019s needed to ensure secure and efficient operations throughout the enterprise, as the BYOx movement continues to grow.<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>As advances in technology bring about a convergence of portable hardware, virtualized resources, and remotely hosted tools and platforms, there\u2019s been a corresponding increase in the use of personal devices and related matters in the workplace and in public institutions. This trend has implications for the management, deployment, and security of IT resources \u2013 some [&hellip;]<\/p>\n","protected":false},"author":10,"featured_media":4680,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[4],"tags":[],"class_list":["post-4676","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-general-it"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/www.poweradmin.com\/blog\/wp-json\/wp\/v2\/posts\/4676","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.poweradmin.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.poweradmin.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.poweradmin.com\/blog\/wp-json\/wp\/v2\/users\/10"}],"replies":[{"embeddable":true,"href":"https:\/\/www.poweradmin.com\/blog\/wp-json\/wp\/v2\/comments?post=4676"}],"version-history":[{"count":5,"href":"https:\/\/www.poweradmin.com\/blog\/wp-json\/wp\/v2\/posts\/4676\/revisions"}],"predecessor-version":[{"id":4692,"href":"https:\/\/www.poweradmin.com\/blog\/wp-json\/wp\/v2\/posts\/4676\/revisions\/4692"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.poweradmin.com\/blog\/wp-json\/wp\/v2\/media\/4680"}],"wp:attachment":[{"href":"https:\/\/www.poweradmin.com\/blog\/wp-json\/wp\/v2\/media?parent=4676"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.poweradmin.com\/blog\/wp-json\/wp\/v2\/categories?post=4676"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.poweradmin.com\/blog\/wp-json\/wp\/v2\/tags?post=4676"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}