The Bring-Your-Own-Device (BYOD) Revolution Through The Cloud

The Bring-Your-Own-Device (BYOD) Revolution Through The Cloud

The Bring-Your-Own-Device (BYOD)

Business organizations have traditionally provided employees with all the required tools and equipment that they need to perform their jobs; this has been true for large organizations since people started, well, organizing. But for smaller organizations that do not have the money to provide their people with everything, the employees bring their own tools of the trade. This is also true for speciality trades like carving and carpentry or any crafting profession; though the shop might provide the tools, most craftsmen bring their own because they are more comfortable with them.

At present, companies provide all employees with the tools, usually computers and various office supplies, to do their work. And bringing your own devices are even considered as illegal for security reasons, especially for consumer and technology-centered industries. Employers are afraid that their data would be stolen and sold to competitors, and there really is no other way to stop this other than enforcing a “what is for the office stays in the office” policy. But with the internet, cloud computing, and the workshifting and service outsourcing or freelancing that came with it, it is now general practice for “outsourcees” or freelancers to provide their own tools of the trade. Besides, it’s not efficient for a company to send a laptop to the other side of the world for a freelancer to use and have him return it after the contract ends. BYOD in this case is essential.

But why is there a Bring-Your-Own-Device Revolution going on and you are not hearing about it? It is not a revolution per say, but a slow and steady change. The only reason that employers provide everything is because of security and secrecy and simply because just less than a decade ago, very few people own laptops or any kind of personal computers. That has changed in the last five years where we saw a great change in the consumer electronic market, everything just became cheaper and accessible to the middle class and as a result almost everyone has a cell phone or a laptop, in one form or another.

Cloud Computing’s role in this revolution is one of security. Because of services like desktop hosting which allows the entire desktop environment of your office pc to be run on any device with a large enough screen and internet connectivity, that fear of data breach has been lessened somewhat. Even if employees use their own devices for work matters, the employer is able to control which applications and what data are accessible and where, preventing it to be even saved locally, only on the cloud desktop environment. Because of this, companies are seeing the benefit of using cloud computing for security and savings. When employees bring their own devices, they can work more comfortably and the employer saves on hardware costs and maintenance while the data security issue is being handled by the cloud application. It’s a win-win situation, both employee and employer is happy. And I am talking about the normal office situation, not freelancing.

By Abdul Salam

Sorry, comments are closed for this post.

Comics
What the Dyn DDoS Attacks Taught Us About Cloud-Only EFSS

What the Dyn DDoS Attacks Taught Us About Cloud-Only EFSS

DDoS Attacks October 21st, 2016 went into the annals of Internet history for the large scale Distributed Denial of Service (DDoS) attacks that made popular Internet properties like Twitter, SoundCloud, Spotify and Box inaccessible to many users in the US. The DDoS attack happened in three waves targeting DNS service provider Dyn, resulting in a total of about…

The Rise Of BI Data And How To Use It Effectively

The Rise Of BI Data And How To Use It Effectively

The Rise of BI Data Every few years, a new concept or technological development is introduced that drastically improves the business world as a whole. In 1983, the first commercially handheld mobile phone debuted and provided workers with an unprecedented amount of availability, leading to more productivity and profits. More recently, the Cloud has taken…

Three Reasons Cloud Adoption Can Close The Federal Government’s Tech Gap

Three Reasons Cloud Adoption Can Close The Federal Government’s Tech Gap

Federal Government Cloud Adoption No one has ever accused the U.S. government of being technologically savvy. Aging software, systems and processes, internal politics, restricted budgets and a cultural resistance to change have set the federal sector years behind its private sector counterparts. Data and information security concerns have also been a major contributing factor inhibiting the…

The Cancer Moonshot: Collaboration Is Key

The Cancer Moonshot: Collaboration Is Key

Cancer Moonshot In his final State of the Union address in January 2016, President Obama announced a new American “moonshot” effort: finding a cure for cancer. The term “moonshot” comes from one of America’s greatest achievements, the moon landing. If the scientific community can achieve that kind of feat, then surely it can rally around…

Achieving Network Security In The IoT

Achieving Network Security In The IoT

Security In The IoT The network security market is experiencing a pressing and transformative change, especially around access control and orchestration. Although it has been mature for decades, the network security market had to transform rapidly with the advent of the BYOD trend and emergence of the cloud, which swept enterprises a few years ago.…

Virtual Immersion And The Extension/Expansion Of Virtual Reality

Virtual Immersion And The Extension/Expansion Of Virtual Reality

Virtual Immersion And Virtual Reality This is a term I created (Virtual Immersion). Ah…the sweet smell of Virtual Immersion Success! Virtual Immersion© (VI) an extension/expansion of Virtual Reality to include the senses beyond visual and auditory. Years ago there was a television commercial for a bathing product called Calgon. The tagline of the commercial was Calgon…

How To Humanize Your Data (And Why You Need To)

How To Humanize Your Data (And Why You Need To)

How To Humanize Your Data The modern enterprise is digital. It relies on accurate and timely data to support the information and process needs of its workforce and its customers. However, data suffers from a likability crisis. It’s as essential to us as oxygen, but because we don’t see it, we take it for granted.…

7 Common Cloud Security Missteps

7 Common Cloud Security Missteps

Cloud Security Missteps Cloud computing remains shrouded in mystery for the average American. The most common sentiment is, “It’s not secure.” Few realize how many cloud applications they access every day: Facebook, Gmail, Uber, Evernote, Venmo, and the list goes on and on… People flock to cloud services for convenient solutions to everyday tasks. They…