When Work And Personal Life Overlap: A Primer To The “Bring Your Own Device” Era

When Work And Personal Life Overlap: A Primer To The “Bring Your Own Device” Era

The “Bring Your Own Device” Era

In the modern business world, carrying more than one device is most often a factor of available applications, device capabilities, or personal preferences rather than a solid-walled barrier between work and play life. A “bring your own device” (BYOD) landscape exists because, over the last decade, the line has increasingly blurred between “business” and “personal” technology usage. BYOD may be defined as a business policy allowing employees to bring personally owned mobile devices to their places of work and use these devices to access privileged company resources such as e-mail, file servers and databases, as well as their own personal applications and data. Understandably, a BYOD world creates some challenges for business owners. Without formal acts of rebellion or revolt, the professional masses have forever reformed the landscape of corporate IT by simply using the available technology that makes sense to them—by bringing their own personal devices into the professional setting.

This phenomenon is often referred to as IT “Prosumerization” — a cute term that cleverly blends “professional” and “consumer” into a tight, one-word package that is largely responsible for the graying of traditional IT managers’ roles across the globe. Organizations are confronted by increasing numbers of individuals carrying their own smartphones in addition to company devices. Managers find employees wishing (or demanding) that they be relieved of the burden of carrying two devices by combining the roles of both into one and sharing the cost.

It isn’t hard to envision the economic benefit to both parties if the costs of hardware and service are shared, but it’s rarely that simple. The costs of supporting a user carrying a smartphone are increasing as costs for the latest hardware and services alike are on the rise.  Many organizations are reevaluating which segments of their workforce have a founded business case for carrying a fully subsidized device and whether or not to offer a BYOD alternative.

Any device used in the normal course of business connects to business networks and can access or create sensitive company data becomes a potential liability. The business is then faced with the conundrum of how to manage, protect and patrol those devices. Just as important as the proliferation of Prosumer devices is the rapid adoption of remote storage solutions over device-based, local data storage. The days of the local hard drives are numbered as more consumers require “anywhere, anytime” access to content.

A common question is what role cloud storage plays in the future of technology. It would be easier to explain how the two are not related, since cloud services and emerging technologies are evolving in the same techno-system, each influencing the over other. In our present phase of technolution, the concepts behind Prosumer devices and the cloud as a content/data silo fit well hand-in-hand.

When you throw consumer devices and the cloud in the business data blender, the result is a completely new set of game rules where the historical gatekeepers of the data mines need to be revisited, revised, adapted, and, perhaps, thrown away for a new set of rules, procedures and mechanisms. It’s remarkable to be a part of a world where devices and applications are no longer the key bottlenecks to when, where, and how data is created and consumed.

The reality is most companies won’t be able to standardize a single mobile device platform. While workers are accustomed to using their own personal devices, and switching back and forth from a company-provided device to their own, this process can become very time-consuming and counter-productive.  Beyond the actual device, there are the issues of deciding which features should be supported on what devices and how. BYOD users must be able to add applications to their devices to conform to company protocols and standards.  With so many disparate devices, if some applications are not available on certain platforms or operating systems, then it falls on the user to discover the issue, research the solution, and report the problem.

In the foreseeable future, it is quite possible that mission and business critical functionality will remain within the strictly protected confines that are currently in place to ensure that sensitive data is propagated only through properly sanctioned, monitored and controlled channels. BYOD users may just have to accept this and realize the benefit and the productivity of fully sanctioned accessibility to certain features may be sacrificed by their choice to use their own devices. With the growth of businesses using cloud storage technologies, though, expect the BYOD world to be ever-evolving.

By Brad Robertson

Brad is the CEO of CX, which provides cloud storage solutions to businesses and individuals. Robertson is a seasoned technical executive and entrepreneur who has been involved in Internet start-ups for two decades and now oversees the creative and technical teams at CX. CX for Business provides collaborative online storage features for small-to-medium businesses. 

About CloudTweaks

Established in 2009, CloudTweaks is recognized as one of the leading authorities in connected technology information and services.

We embrace and instill thought leadership insights, relevant and timely news related stories, unbiased benchmark reporting as well as offer green/cleantech learning and consultive services around the world.

Our vision is to create awareness and to help find innovative ways to connect our planet in a positive eco-friendly manner.

In the meantime, you may connect with CloudTweaks by following and sharing our resources.

View All Articles

Sorry, comments are closed for this post.

Comic
InformationWeek Reveals Top 125 Vendors Taking the Technology Industry by Storm

InformationWeek Reveals Top 125 Vendors Taking the Technology Industry by Storm

InformationWeek Reveals Top 125 Vendors Five-part series details companies to watch across five essential technology sectors SAN FRANCISCO, Sept. 27, 2016 /PRNewswire/ — InformationWeek released its list of “125 Vendors to Watch” in 2017. Selected by InformationWeek’s expert editorial team, the companies listed fall into one of five key themes: infrastructure, security, cloud, data management and…

Part 1 – Connected Vehicles: Paving The Way For IoT On Wheels

Part 1 – Connected Vehicles: Paving The Way For IoT On Wheels

Connected Vehicles From cars to combines, the IoT market potential of connected vehicles is so expansive that it will even eclipse that of the mobile phone. Connected personal vehicles will be the final link in a fully connected IoT ecosystem. This is an incredibly important moment to capitalize on given how much time people spend…

Embedded Sensors and the Wearable Personal Cloud

Embedded Sensors and the Wearable Personal Cloud

The Wearable Personal Cloud Wearable tech is one avenue of technology that’s encouraging cloud connections and getting us all onto interconnected networks, and with the continued miniaturization and advancement of computing the types of wearable tech are always expanding and providing us with new opportunities. A few years ago, smartwatches were rather clunky devices with…

SWIFT Says Bank Hacks Set To Increase

SWIFT Says Bank Hacks Set To Increase

Bank Hacks Set To Increase SWIFT, whose messaging network is used by banks to send payment instructions worth trillions of dollars each day, said three clients were hacked over the summer and cyber attacks on banks are set to increase. The theft of $81 million in February from Bangladesh’s central bank using SWIFT messages rocked…

Security: Avoiding A Hatton Garden-Style Data Center Heist

Security: Avoiding A Hatton Garden-Style Data Center Heist

Data Center Protection In April 2015, one of the world’s biggest jewelry heists occurred at the Hatton Garden Safe Deposit Company in London. Posing as workmen, the criminals entered the building through a lift shaft and cut through a 50cm-thick concrete wall with an industrial power drill. Once inside, the criminals had free and unlimited…

Do Not Rely On Passwords To Protect Your Online Information

Do Not Rely On Passwords To Protect Your Online Information

Password Challenges  Simple passwords are no longer safe to use online. John Barco, vice president of Global Product Marketing at ForgeRock, explains why it’s time the industry embraced more advanced identity-centric solutions that improve the customer experience while also providing stronger security. Since the beginning of logins, consumers have used a simple username and password to…

Are CEO’s Missing Out On Big Data’s Big Picture?

Are CEO’s Missing Out On Big Data’s Big Picture?

Big Data’s Big Picture Big data allows marketing and production strategists to see where their efforts are succeeding and where they need some work. With big data analytics, every move you make for your company can be backed by data and analytics. While every business venture involves some level of risk, with big data, that risk…

Choosing IaaS or a Cloud-Enabled Managed Hosting Provider?

Choosing IaaS or a Cloud-Enabled Managed Hosting Provider?

There is a Difference – So Stop Comparing We are all familiar with the old saying “That’s like comparing apples to oranges” and though we learned this lesson during our early years we somehow seem to discount this idiom when discussing the Cloud. Specifically, IT buyers often feel justified when comparing the cost of a…

Despite Record Breaches, Secure Third Party Access Still Not An IT Priority

Despite Record Breaches, Secure Third Party Access Still Not An IT Priority

Secure Third Party Access Still Not An IT Priority Research has revealed that third parties cause 63 percent of all data breaches. From HVAC contractors, to IT consultants, to supply chain analysts and beyond, the threats posed by third parties are real and growing. Deloitte, in its Global Survey 2016 of third party risk, reported…

What You Need To Know About Choosing A Cloud Service Provider

What You Need To Know About Choosing A Cloud Service Provider

Selecting The Right Cloud Services Provider How to find the right partner for cloud adoption on an enterprise scale The cloud is capable of delivering many benefits, enabling greater collaboration, business agility, and speed to market. Cloud adoption in the enterprise has been growing fast. Worldwide spending on public cloud services will grow at a…

7 Common Cloud Security Missteps

7 Common Cloud Security Missteps

Cloud Security Missteps Cloud computing remains shrouded in mystery for the average American. The most common sentiment is, “It’s not secure.” Few realize how many cloud applications they access every day: Facebook, Gmail, Uber, Evernote, Venmo, and the list goes on and on… People flock to cloud services for convenient solutions to everyday tasks. They…

6 Tech Predictions To Have A Major Impact In 2016

6 Tech Predictions To Have A Major Impact In 2016

6 Tech Predictions To Have A Major Impact The technology industry moves at a relentless pace, making it both exhilarating and unforgiving. For those at the forefront of innovation it is an incredibly exciting place to be, but what trends are we likely to see coming to the fore in 2016? Below are six predictions…

How Big Data Is Influencing Web Design

How Big Data Is Influencing Web Design

How Big Data Is Influencing Web Design For all you non-techies… You’re probably wondering what big data is (I know I was….a few years back) so let’s get the definitions out of the way so we’re on the same page, okay? Big data is A LOT of data – really, it is. It is a…

Four Reasons Why CIOs Must Transform IT Into ITaaS To Survive

Four Reasons Why CIOs Must Transform IT Into ITaaS To Survive

CIOs Must Transform IT The emergence of the Cloud and its three delivery models of Infrastructure as a Service (IaaS), Software as a Service (SaaS) and Platform as a Service (PaaS) has dramatically impacted and forever changed the delivery of IT services. Cloud services have pierced the veil of IT by challenging traditional method’s dominance…

The Future of M2M Technology & Opportunities

The Future of M2M Technology & Opportunities

The Future Of The Emerging M2M Here at CloudTweaks, most of our coverage is centered around the growing number of exciting and interconnected emerging markets. Wearable, IoT, M2M, Mobile and Cloud computing to name a few. Over the past couple of weeks we’ve talked about Machine to Machine (M2M) such as the differences between IoT and…

How Data Science And Machine Learning Is Enabling Cloud Threat Protection

How Data Science And Machine Learning Is Enabling Cloud Threat Protection

Data Science and Machine Learning Security breaches have been consistently rising in the past few years. Just In 2015, companies detected 38 percent more security breaches than in the previous year, according to PwC’s Global State of Information Security Survey 2016. Those breaches are a major expense — an average of $3.79 million per company,…