Want More Efficient Employees? Let Them Play With Their Own Toys

Want More Efficient Employees? Let Them Play With Their Own Toys

Want More Efficient Employees? 

Our friends at VMware have been looking at the way work gets done in the post-PC work environment. For some time we have been looking at how Cloud Computing is effecting the business world (and vice versa), Vmware’s “New Way Of Life 2013” study raises some intriguing conclusions. Tech Has Come A Long Way

When I was a kid, the big thing at school was when the cool kids would bring their electronic football games to class. These devices were so pre-GameBoy that they seem quaint now, but there was no denying the pleasure of manipulating the red lights across the display (these ancient games didn’t even have a screen!) The level of tech available today is almost blinding. What the report shows is that workers are using their personal tech for more than just passing the time. The 2012 study was conducted in the Asia Pacific region, so the results are based on answers from workers in Australia, China, Hong Kong, India, Indonesia, Japan, Malaysia, Philippines, Singapore, South Korea, Taiwan and Thailand. Approximately 2,100 workers were surveyed, and all of the participants work for organizations that employ at least 1000 people globally.

Reasons For Increased Production

Unlike the LED football games of my youth, personal tech devices appear to be increasing worker productivity. The study found that when they were allowed to use their personal devices at work, 80% of workers felt they were more efficient, even when they were working outside the office. 83% of respondents said that they bring their own devices to work, and of those, 93% say that the IT department knows about it. Company IT is the big sticking point in the deal. Security is the biggest issue, along with interfacing with the employer’s IT infrastructure. Only 50% of the participants said that they received IT support for their personal devices. When problems occurred, 63% resolved the problem by Google-ing, and 69% were able to fix it themselves. (This experience would seem to increase the user’s level of tech savvy; whether this is a good thing or not for traditional IT is not determined.)

Workers Prefer Their Own Tools

Employees cite several reasons they prefer to use their personal devices at work. 41% said that clients often contacted them using their personal phones, and 35% said their jobs were mobile in nature. Being more familiar with the software of their personal devices was sited in 28% of replies, 26% felt more engaged on their own devices, and 39% sited greater functionality of their personal devices. 23% simply felt less stressed using their own devices.

By Peter Knight

About CloudTweaks

Established in 2009, CloudTweaks is recognized as one of the leading authorities in connected technology information and services.

We embrace and instill thought leadership insights, relevant and timely news related stories, unbiased benchmark reporting as well as offer green/cleantech learning and consultive services around the world.

Our vision is to create awareness and to help find innovative ways to connect our planet in a positive eco-friendly manner.

In the meantime, you may connect with CloudTweaks by following and sharing our resources.

View All Articles

Sorry, comments are closed for this post.

How The CFAA Ruling Affects Individuals And Password-Sharing

How The CFAA Ruling Affects Individuals And Password-Sharing

Individuals and Password-Sharing With the 1980s came the explosion of computing. In 1980, the Commodore ushered in the advent of home computing. Time magazine declared 1982 was “The Year of the Computer.” By 1983, there were an estimated 10 million personal computers in the United States alone. As soon as computers became popular, the federal government…

Maintaining Network Performance And Security In Hybrid Cloud Environments

Maintaining Network Performance And Security In Hybrid Cloud Environments

Hybrid Cloud Environments After several years of steady cloud adoption in the enterprise, an interesting trend has emerged: More companies are retaining their existing, on-premise IT infrastructures while also embracing the latest cloud technologies. In fact, IDC predicts markets for such hybrid cloud environments will grow from the over $25 billion global market we saw…

The Rise Of BI Data And How To Use It Effectively

The Rise Of BI Data And How To Use It Effectively

The Rise of BI Data Every few years, a new concept or technological development is introduced that drastically improves the business world as a whole. In 1983, the first commercially handheld mobile phone debuted and provided workers with an unprecedented amount of availability, leading to more productivity and profits. More recently, the Cloud has taken…

The Security Gap: What Is Your Core Strength?

The Security Gap: What Is Your Core Strength?

The Security Gap You’re out of your mind if you think blocking access to file sharing services is filling a security gap. You’re out of your mind if you think making people jump through hoops like Citrix and VPNs to get at content is secure. You’re out of your mind if you think putting your…

The Fully Aware, Hybrid-Cloud Approach

The Fully Aware, Hybrid-Cloud Approach

Hybrid-Cloud Approach For over 20 years, organizations have been attempting to secure their networks and protect their data. However, have any of their efforts really improved security? Today we hear journalists and industry experts talk about the erosion of the perimeter. Some say it’s squishy, others say it’s spongy, and yet another claims it crunchy.…

Moving Your Email To The Cloud? Beware Of Unintentional Data Spoliation!

Moving Your Email To The Cloud? Beware Of Unintentional Data Spoliation!

Cloud Email Migration In today’s litigious society, preserving your company’s data is a must if you (and your legal team) want to avoid hefty fines for data spoliation. But what about when you move to the cloud? Of course, you’ve probably thought of this already. You’ll have a migration strategy in place and you’ll carefully…

Using Private Cloud Architecture For Multi-Tier Applications

Using Private Cloud Architecture For Multi-Tier Applications

Cloud Architecture These days, Multi-Tier Applications are the norm. From SharePoint’s front-end/back-end configuration, to LAMP-based websites using multiple servers to handle different functions, a multitude of apps require public and private-facing components to work in tandem. Placing these apps in entirely public-facing platforms and networks simplifies the process, but at the cost of security vulnerabilities. Locating everything…

How Formal Verification Can Thwart Change-Induced Network Outages and Breaches

How Formal Verification Can Thwart Change-Induced Network Outages and Breaches

How Formal Verification Can Thwart  Breaches Formal verification is not a new concept. In a nutshell, the process uses sophisticated math to prove or disprove whether a system achieves its desired functional specifications. It is employed by organizations that build products that absolutely cannot fail. One of the reasons NASA rovers are still roaming Mars…