Showing posts with label BYOD. Show all posts
Showing posts with label BYOD. Show all posts

Monday, July 20, 2015

Banning mobiles at work in the age of BYOD and Digital

Enterprise X has banned employees across all its group companies from using mobile phones in office. On July 30, it was extended to offices of all group companies, including …. The thinking behind the move, according to an employee who did not want to be identified, is that "people tend to misuse social networking sites inside office. Popular chat applications, while used for official purposes can also be used to chat with friends and family. So the management is trying to curb the unwanted use of these platforms during work hours”.

One step forward, two steps backward, or did I get it wrong, two steps forward, one step backward ! Either way it does not matter, reality for the hapless employees of Enterprise X is that one of their primary sources of collaboration and customer insights is no longer available to them. Everyone is bewildered; what was the trigger that caused it ? Did employees protest ? Did they voice their anguish to the Management ? Did the quality of work improve after the draconian law was passed ? Did output actually go up ?

On the same page of the publication was another report: “No one really doubts the importance of digital transformation to today's businesses. Our global survey found that few can deny the mounting internal and external pressure to do more than pay lip service to digital. Yet, digital adoption is not achieved without changing the behavior of the business. Management must be convinced of the business case, a thorough implementation plan must be in place, and enterprises must alter and revamp internal processes, technology, and staff to make the digital transformation”.

The founders had held on to control despite the next generation driving the business; the younger inheritors were adept at technology and current with the times however unable to challenge the occasional unilateral and irrational directions the company took. Were the business interests of Enterprise X immune to Digital disruption ? The answer is a vehement no; in fact they had led digital innovation from the front. Then something changed and they started lagging behind competition with the margin increasing with time.

Discussions on clamp down on social media and mobile enablement are in the past. Digital aspirations of enterprises changed the dialogue, while benefits from mobile computing driven by consumerization of smartphone, created new opportunities for information dissemination and customer engagement. Better telecom networks also enable geographically dispersed workers to stay logically connected thus improving collaboration and productivity. In such an environment the concentration camp mentality raises curiosity to get to root cause.

Reading the report verbatim the purported trigger was work hours being utilized for personal interest; it raises an interesting question on the dividing line between what are defined work and personal hours. For most work hours extend beyond the time spent in the place of work; laptops changed the paradigm two decades back, the smartphone redefined it a little later. Globalization of enterprises extended work hours beyond the conventional 9 X 5; whatever limited time that was remaining disappeared in the economic troughs.

Is Enterprise X giving a message that staff needs to clearly demarcate work and life hours ? Are they saying don’t indulge in any activity that can be construed as personal at workplace and similarly when they step out of the hallowed premises they shall not be expected to cast a cursory glance at the official email ? Or for that matter if the workload increases, the employees will not be expected to spend extra hours to complete tasks at hand ! An internal circular demanded people to deposit phones on the way in and take them when leaving the premises. OMG !

Everyone would nod their heads to the fact that attention span of the new generation has significantly reduced. Messages and notification craving have people checking their smartphones with increasing frequency; distractions apart, reality is that everyone is also connected to the enterprise 24 X 7 with rigor and passion unknown in the past. Weekends and vacations have laptops, tablets and smartphones as constant companions seeking wireless networks. With the work and life disconnected it’s anybody’s guess if withdrawal symptoms will emerge post working hours.

Maybe Enterprise X is path breaking with this new policy; only time will tell …

Monday, May 18, 2015

BYOD is dead, long live device independence and proliferation

The advent of smartphones started a small experiment for senior management; it has now become mainstream. Explosion of smartphones in the enterprise driven by economical choices and increasing convenience has seen Progressive IT departments adopting a controlled and open attitude towards providing access to information on the go. Solutions have evolved with app-ification of many processes and business opportunities and Cloud based offerings. BYOD is no longer a 4 letter word, it’s reality for enterprises and CIOs.

Reluctant IT organizations are being pushed and forced into acceptance to define a framework on how to weave BYOD into the company fabric. Reality of yesterday which revolved around unmanaged devices, multiple platforms and form factors, and security of corporate data appear to be excuses now. While the starting point for most enterprises has been MDM or Mobile Device Management, additional solutions are equipping enterprises to create a secure and managed ecosystem for employees and partners.

The next few years will see a shift towards BYOD for most enterprises who are deploying mobility solutions of any kind. This is largely driven by the need to push information to stakeholders though newer use cases are emerging with sales force, distribution and approvals. There is also a pull exerted by various parts of the enterprise who are beginning to realize the time value of information. The challenge is not security anymore, it is managing the upsurge in expectations driven by the fact that someone has already done it somewhere in the world.

Is there a balance between complete freedom to totally restricted world ? There is no formula by size or industry type or even geography that provides a generic universally acceptable answer. Each enterprise will have to find its own equilibrium depending on need and benefit; my belief is that information enabled employees are likely to take better decisions or create newer opportunities in comparison to staff that live with enforced restrictive policies. Wearables open up new opportunities for the savvy technophiles.

The world is getting bipolar with mobility divided into 2 camps – Android and iOS. Stealthily a third alternative is emerging which offers comfort of the known and familiar to IT folks: Windows ! IT knows how to manage this platform while others intrusively came in from the consumer employee. I believe that this trend will be the saviour for IT giving them a platform that they know how to manage. Interestingly new innovation with dual boot devices with Windows and Android are just around the corner.

Some people may ask, what about the Blackberry as a device or platform ? Should we stop thinking about it ? There still are remnants of this in some enterprises. Should they stay in focus ? Predictions have a bad way of turning around and biting you; so if they do offer something critical that others don’t (which I am not sure of unless it is specific to your business), move them off. It is easier to manage one less technology than keeping it lingering around. In the near term I don’t see any merit in continuing with them.

The future belongs to an empowered enterprise where every person has information on demand available on his/her fingertips on a device of his/her choice. Ubiquitous and seamless access activated by secure channels that are MITM (Man In The Middle) and MOTB (Man On The Browser) attack proof; apps are obviating the need to create adaptive websites and compromises in user experience. Enterprises should explore a way to use Apps to provide secure transactional capabilities to employees while running off a public or private cloud.

New devices will continue to challenge IT; drive with policy which is adaptable and allows for induction of new environments. Put them to work in a lab before they start knocking on the door asking for permission to connect. Invest in tools and technology that allow you to manage the devices by exception and policy; that is easier to execute than creating an exception every time something new turns up. You will have limited time and capacity, use it wisely. Finally take a stand if it comes to a crunch; after all when things break only your neck is on the block !

Monday, September 29, 2014

Survival of the Paranoid

She received an alert from credit card Company of a debit of $50 from the neighborhood grocery store. She panicked and then remembered that it was probably the refrigerator ordering replenishments (My refrigerator has gone shopping). She was however worried about what did it end up ordering. Having finished the orange juice from the last purchase and not wanting anymore, nor the horrible cake that came as an offer last time (She was anyway trying to lose weight). She then received the e-bill on mail and was shocked to see sausages and beef steak ! These did not exist in the master list and decided to visit the store on the way back to find out what had gone wrong.

Recently I was at a cybersecurity conference in the country which boasts of the maximum number of IT security startups and companies. They continue to redefine information and cyber security in ways that most of us would find hard to imagine. The new and old are not focusing just to make better antivirus or firewalls or mobile device management solutions; their R&D has transcended conventional boundaries. With Internet of (Every)Things and all kinds of devices communicating with again all kind of devices, the channels need to be secured.

The use cases discussed sounded straight out of science fiction or futuristic movies except that all were stark reality which we are rarely exposed to. The innocuous IP audio-conferencing phone in the meeting room as a listening device or the video conferencing equipment transmitting images or streaming live unknown to everyone. Directional antenna sniffing the airwaves and breaking wireless networks or RFID tags or readers in a manufacturing facility misbehaving and making a mess of the inventory and production plan.

At our homes the number of connected devices is increasing; for me it started with my streaming media box, then the television followed by the gaming console which was fighting with multiple tablet and laptop computers. My new car wants to send messages to the service station when it felt sick and my GPS has a mind of its own routing me through lesser known roads in a quest to get me to my destination faster and screwing up. When I have not finished my daily dose of walking my fitness ban posts on social media embarrassing me.

It is not a stretch of imagination to believe that these devices can be infected with malicious code which may change behavior or purpose. Individuals unknowingly changing their daily pattern or nudged in an alternate direction by compromised devices can impact their professional actions and outcomes. Why do you need to break into a trading system, break the trader, it’s easier ! Shutting down an electrical grid is big effort, shut down people or change them; use sensors to hack into the system. I was stunned by the possibilities.

In the future with every device connected and transmitting or receiving information, intelligence is corruptible and creates new scenarios of what can go wrong. Recent demonstrations though not malicious in intent of some highly computerized cars being hijacked predict an unstable future. The ability to patch or secure the large number of devices (estimated at 20 billion plus), company provided or individual owned BYOD enabled will be a veritable nightmare for the enterprise security managers and CIOs.

Enterprises are pushing to create new opportunities that become possible with IoT; some of these maybe seeded with hare brained ideas though I believe many will survive and become the next big thing of tomorrow. I believe that everyone needs to be cognizant of the fact that IoT is here to stay; how we leverage it within our ecosystem will give a differentiated advantage that success stories are made of. Every new hyped technology falls through the trough of disillusionment before becoming mainstream. Stay invested.

She reached the store and challenged them demanding a refund and the fact that they had goofed up majorly. In return they showed her the order which did contain specific brand of sausages and steak. She called the refrigerator company who informed her that the last software upgrade had added social media features and her refrigerator had accepted a request from the specified company to receive promotions. The conversion of the promotion to order was probably a bug which they will investigate and patch the firmware.

I wonder if a virus were to infect the refrigerator, what would it do ?

Monday, September 22, 2014

Big Brother is watching you !

“We are sorry Sir, we are unable to accept your order; thank you for calling your favorite dining place”. I am sure you have also received or read some of the messages floating around on social media where the protagonist is unable to order his favorite pizza or pasta or whatever dish you may want to imagine. He is repeatedly denied his request to quench his craving with inferences about his cholesterol or past illness or health insurance coverage; you can imagine the rest as it would probably pan out for the majority of us.

The situation is not too far in the future ! In an interconnected world, combination of personal, medical, social, financial and professional data creates new possibilities of analytical correlations that can be used or misused depending on how you look at the situation. Connected netizens fill in void hours in their lives on multiple devices through the day with status updates, browsing for information or clarifications on something that they are unable to comprehend. They leave behind a trail that can be picked up.

We already see this happening with targeted advertisements across various sites depending on our browsing behavior. Would you turn off cookies or stop accessing popular search engines from your mobile ? What about all the apps on the smartphone ? Some nifty utilities that make life so much easier; finding great restaurants, booking tables, looking up flight schedule or delay. Can these apps pry at other data on your smartphones or the remnants of bread crumbs and widgets start snooping around your laptop or tablet ?

I get this weird feeling when advertisements remind me of my visits to some websites like someone has been looking over my shoulder spying on me all along in my public and private moments. So I decided to confuse the intruders by randomly checking for exotic locations which I would never visit or check out merchandise that most sane people would shudder to buy. The trail it created led the crawlies on a red herring trail. I felt elated as if I had won a major war by thwarting the evil shenanigans in their quest to hound me.

Our dependence on technology is slowly and steadily shifting our thought patterns and the way we think. Intuitively we reach out to query a term or gather additional information adding to the vast amount of data we assimilate. We also seek help for simple and complex problems or situations rarely exerting our thinking prowess. I am not sure if this is good or bad, healthy or not, this has become a way of life. The extreme dependence of the newer generation also known as Digital Natives on technology is exciting and scary.

CIOs have struggled with BYOD getting entrenched across their enterprises and made half-hearted attempts to rope in the rogues with Mobile Device Management and other tools. But that is only part of the story; our incessant need to be online across all our devices adds to the trail we leave behind. Most of the providers have become our shadow with embedded trackers hiding their intent in fine print over 30 pages of agreements which no one reads and clicks “I Agree”. And guess what ? In most cases we don’t really care.

Every day we are flooded with huge amounts of quotes, stories, posts, pictures, videos sent to us by people we know. No one knows the origin or validity of the content we receive. Are we at the cusp of incremental revolution nudged by technology that is controlled by few who are playing with our decisions ? Are our cognitive behaviors are being shaped by some manipulative story teller who is pulling at our heartstrings in ways unknown to us ? Are we really in control of our actions and destiny anymore ?

The digitization of the world is an eventuality that cannot be wished away. It is gaining momentum every day and encompassing every aspect of our lives slowly and steadily. We are given choices on how we would like to engage with technology but peer pressure breaks down resistance quickly. I wonder if I have a mind of my own as I keep going back to technology to assist me with every step I take. As a kid I read the Orwellian tale about Big Brother watching me; I think the future has arrived stealthily without telling us !

Monday, June 30, 2014

The Digirati are coming

With the advent of the Internet two decades back euphoria around internet based business models exploded upon all of us. Predictions like “if you are not on the web, you will be dead or if you don’t have an internet strategy, you don’t have a business strategy” shook up everyone and pushed them towards limits of paranoia. Untenable valuations on shaky business models led to the dot bust that wiped out millions from budgets and zillions in market capitalization. Now digital is rivaling the din of the past and it has everyone scrambling again.

Some CIOs saw it coming earlier than others; creating awareness within their enterprises, they attempted to raise the bar. Initial reactions of cynicism and indifference led many CIOs to return to their comfort zones while the world around them flirted with the digital wave. As success stories started trickling in, it gave jitters to the disbelievers and created a flurry of disconnected activity. Every CXO wanted a digital project; everyone added the word “digital” in the headline; many ignored the CIO to avoid embarrassing discussions.

SMAC came the response from consultants, vendors and the IT folks alike; to get started on your digital journey, you need the skills, talent and a link back to the physical world that IT provides. Many CIOs reveled in the limelight of having been ahead of the game while the rest joined the confused ranks adding to the chaos with technology play. As individual pieces of Social, Mobility, Analytics and Cloud made way into various initiatives, the picture started to become clear that digital is not an option anymore; it is going to be a way of life.

Board room and management discussions on digital attempted to create correlations with revenue growth, customer service, enablement of suppliers and business partners, automation for improved process efficiency. Now the connections to enterprise goals are shifting the discussion from the likes of Big Data Analytics or Mobility to creating new business models or tapping new profit pools and outpacing competition. Everyone wants to be anointed with title of the CDO to be hailed as the hero when success arrives.

Competition from new age companies in some sectors like hospitality, retail, virtual collaboration, and travel and entertainment has disrupted conventional age old business models leading to a scramble to catch up. Industrial giants slowed by corporate inertia are waking up to new threat and opportunities. Willing to use their scale, muscle power and enormous resources, they potentially have the ability to devour the small fish while they establish new business models and reinvent their business, systems and leverage the digital wave.

Silos of digital initiatives will at best test a hypothesis, for enterprise wide impact, cohesive and integrated approach with CEO alignment is essential. Reality is, IT and business strategies are no longer separate, and they have become inseparable. With everything going online and “Internet of Things” creating an avalanche of hitherto unexplored data, enterprises are pushing the boundaries of analytical possibilities. Corporate and information boundaries are disappearing demanding democratization of analytics and decision making.

The oft repeated question to CIOs raises its head again on their position in this evolutionary revolution ? IT teams need to focus on not just scale but also the new application ecosystem that requires IT teams to discard legacy and pursuit of monolithic systems and shift focus on agile built for purpose apps. This paradigm shift requires preparation for non-stop business in the interconnected world. Customers are challenging the business of incremental innovation and forcing companies to listen and co-create new products and services.

Digital is here and how ! For most CIOs BYOD/T was a beginning, BYOW (Wearable) will stretch the already delicate ecosystem. Finicky customers expecting instant gratification threaten fragile brand reputations with 140 characters and less. Consumption patterns are shifting thereby forcing CIOs to rework corporate peer relationships. I believe that CIOs can reclaim lost ground by challenging existing digital alignments and build the foundation that will help the enterprise win in raging battle for revenue, profitability and the customer.

Your enterprise digital stance may be a challenge at the moment; culturally maybe the company does not enable open ideas or visible risk; it is up to you to decide whether you want to be a bystander while the world moves ahead or you want your destiny to be linked to the new world of digital enablement ? Are you ready ?

Monday, February 17, 2014

The Corporate Social Media Network

The trigger has been the wilder than earlier predicted adoption of social media websites, applications and mobile apps by all age groups across geographies and social strata. Every new innovation, fad or me-too has caught the fancy of not just consumers, but also investors. After denial and prohibition came the acceptance within the enterprise and experiments on how to use it to the benefit of the company. Thus we see a new trend emerging that now has many players vying for attention; the corporatization of social media.

I am not referring to the numerous models that have been attempted to measure return on investment or to convert “Likes” into hard cash (fortunately not by selling personal details of customers). Many will point out a few popular success stories where a brand or product found exponential growth driven by social media campaigns; this number has not grown much in subsequent years. I am alluding to the attempt by companies to setup internal portals and sites that mimic behavior of the popular social media sites.

CXOs blessed this and agreed that while we prevent our employees from the internet on corporate devices let us give them a way to spend their energy on similar sites internally with each other. Let them channelize their time towards being more productive. CIOs with help from vendors cloned most of the functionality and put it on the intranet and waited for employees to start using it. Some did, they posted stuff here and there and then went away very quickly. How can I put up my private life on display inside the company ?

Managers attempted to create collaboration use cases; success was measured by number of people active or the number of posts. Structures around groups helped them find behavioral and psychological insights. Soon these became case studies and best practices to be touted by vendors and consultants. Within boundaries these worked adding to the momentum which forced almost every respectable CXO to leniency. All along employees continued to put on display their private lives on non-corporate social media via their BYOD smartphones.

Is corporate social media really a tool that can transform the way enterprises and employees collaborate ? Can it imitate the viral effect seen in private lives ? If we discount the generation X/Y who are just entering the workforce, are the 30 and 40 something employees going to embrace getting on internal social media to post their feelings and share brainwaves ? In a hypercompetitive and paranoid professional world, will the existence of a platform with adequate catalysts be the trigger that breaks the barriers ?

Social media fatigue is already setting in; the multitude of options from 140 characters to pin boards and friendly sites only confuses rather than compartmentalize the use. People realize the time demands in an ever connected world which expects instant responses to emails, tweets, SMS, chat messages, posts and whatever mode of socializing they engage in. Souring relationships due to or because of the face down thumb happy posture is changing the way we engage with each other. Peer pressure keeps some going, the rest follow the herd.

Coming back to corporate social media, there are opportunities if used well; any foray requires capturing the ethos of the company, department or group which will determine the character of the site and engagement. It requires a team of enthusiastic believers who infect everyone they come in contact with their exuberance and create an urge to try. The team needs no boundaries or censorship for engagement; let there be self-imposed discipline on what the group is willing to accept. Monitor you may, don’t be the police.

In a recent interview a journalist asked me the question “What is the future of corporate social media ?” I believe that there will be pockets of excellence from which people will learn only to fail until they are able to create the cultural ecosystem in which sharing can thrive without fear of retribution or rebuke. We need freedom to communicate, disagree, and be ourselves the way we are outside the workplace. Leaders and Managers have to walk this talk for it to work. Until then there will be case studies that we read and wonder why it does not work for us !

Tuesday, March 26, 2013

The mobility conundrum


Take any event, survey or discussion with a vendor, or pick any IT magazine or newsletter, all of them have something on mobility and integrally linked to that is BYOD. Mobility has prominently featured in the top priorities in every survey. It has become as discussed or more a subject as BITA (Business IT Alignment) was a decade back. There are views and opinions on everything going mobile from business process to commerce from company to consumer and everything in between.

With number of innovative as well as hair brained ideas vying for attention, there is little to choose from for a CIO. Every one of these comes with a theory and hypothesis to change the world or transform the way business is done and information consumed. These range from recognizing your customers to agile delivery of information to senior management or pushing alerts to the sales or distribution teams. The need for instant approvals to various requests is no more a proposition cutting ice.

When I met a consultant from one of the big and respected IT and Management companies, the dialogue soon veered towards what is happening in this space. Everyone is talking about mobility and related challenges of managing the device, security of information and the big issue of non-company owned devices that connect to the corporate network. He went on to postulate that the future holds a lot of pain for the CIO who has to manage the diversity with new devices mushrooming every day.

So I challenged him to illustrate what he has seen of the deployments across companies that he has surveyed or CIOs met. What kind of applications are becoming mainstream ? Beyond sales force automation, reporting and maybe order entry by field staff, are there other use cases that have gained acceptance ? He mentioned insurance agents and banking relationship managers using mobility to sell their services; but these are corporate deployed and largely laptops with limited customer information if at all.

Then, where is the need for mobility ? Are CXOs demanding information on sales or other KPIs real time or by the hour ? Are knowledge workers expecting to carry their work from the desktop/laptop to their tablet or phone ? Is the shop floor crying for a mobile device or a transactional worker like Finance or HR executive expecting work enabled on a mobile device ? What information and process needs the velocity that mobility enables ? And if none need it, then why is mobility a big deal ?

Most mobile devices, managed or unmanaged, are connected to the corporate network for email access and to some extent on collaboration (read messenger or chat). Most organizations stopped supplying phones a while back and very few have procured tablets beyond the sales or field staff. The information the phones carry is corporate email and almost all users have password protected their individual or corporate device. Loss of phone gets the finder mostly an inoperable device which could get unlocked only by luck, rarely by brute force.

Information contained on tablets could have some value to the finder if again access can be gained bypassing the security. MDM or Mobile Device Management solutions are an insurance cover over and above protection that we all enable on our personal devices. A disabled email id or active directory will anyway prevent email and other information sync immediately. Security vendors whipping up paranoia would like you to believe otherwise by painting a grimy picture of revenue and reputation loss.

I am not propagating that enterprises stop looking at mobility or mobile security; what I believe is that review each case on the business value that can be quantified. Do not base your decisions purely on the spread sheets that vendors want you to use for TCO/ROI. Stop following the mobile information security hype and deploy pragmatic solutions; you are not following your competitors to pick up their lost device, likewise your competitors are not following your people around. Take care !

Monday, April 09, 2012

The Hyperconnected Executive


We live in a world of information overload, information thrust at us across all mediums; print, hoardings, building facades, transport buses, taxis, email, SMS, chat, social media, and now multiple mobile devices that wake up and stay with us until we go back to sleep. In bed, while traveling, at work, at home, with friends, in a meeting, relaxing by the beach, even while in the washroom, we are now connected, consuming, creating and contributing information to the ever growing heap.

Information overload was a term I heard long time ago when dial-up internet connectivity was just beginning to get into our homes. Suddenly the world of information opened up; over the years the quantum of information just continued to grow exponentially while technology folks created new terms to encompass the new paradigm. KB to MB took longer than MB to GB did and GB to TB to PB happened in a jiffy. Suddenly it appeared to be more than we wanted. Nostalgically, we did enjoy occasional moments of privacy with sparse cellular coverage, unaffordable handsets and obscenely high tariffs.

So when along with a few CIOs I met a learned senior consultant talking about the disruptive nature of technology innovations, it provoked an interesting debate. He outlined his theory on hyper connected information overload that every executive faces today. He postulated a world of hyper mobility where devices connected or disconnected from people receive information on the go. People consume this information and take decisions that influence business and personal outcomes. Everyone agreed and sought to look at the future. The wise man smiled and refrained from making any predictions.

The phenomenon today is driven by multiple location-aware mobile devices all connected to an ecosystem of corporate data and applications and personal/business social media interlaced with multiple apps. Thus corporate decisions are no longer only dependent on transactional or analysed data within the enterprise. This trend is increasing exponentially with buzz around Big Data which encompasses all the data. It however does not factor in the speed at which information is disseminated to the consumer of information. Are we burning the wires, read wireless, faster than we can process it ?

I do carry 3 devices (almost) everywhere with me; my laptop, my tablet and my smartphone. Across these almost all the information I need on the go is synchronized over the air. They are interchangeable and yet serve different purposes. From one line responses on the phone to approvals, dashboards and longer responses on the tablet, the laptop is still the device for writing posts like this and doing a lot of figure work with formulas or creating presentations. I know many would jump up and say all this is doable on the tablet; I personally find it easier on the laptop.

With divergence being the new convergence, it is certain that we will continue to waddle between screens; a recent study talked about multi-taskers using two or three screens connected to the same desktop computer for enhanced productivity. Really productive ? Velocity of information will continue to increase and our day will continue to shrink. We are doing more everyday thanks to technology. Our world is more productive, our companies more profitable; as individuals we see ourselves evolving faster, achieving goals quicker than we did even a decade ago. Will we ever stop ? I don’t know.

What will be the next disruption in this space ? A connected device to keep us busy while we sleep ?

Monday, December 19, 2011

Unraveling BYOD/T

The one trend that everyone is talking about and which figures on every list (priorities, trends, technology, whatever) is Bring Your Own Device/Technology. It has had proponents and opponents from various quarters within and outside the enterprise. Opinions and views, recommendations and pitfalls, management tools and security concerns, the list is endless and continues to keep the CIO bewildered irrespective of whether s/he embraces BYOT or not.

From what I recollect, it all started with the iPhone and then extended to tablets, laptops, and what have you. Not that earlier personal devices did not connect to the corporate network; they did on the wire and then over the air, if you will remember devices with a technology called “activesync”. The early phones offered limited connectivity and as the network improved and so did the technology, browser based apps started appearing. The resident app followed soon enough.

I don’t remember all the devices that I used over the last decade and longer being provided by the company; which would imply that we did have a lenient policy even before the BYOT buzz appeared and started haunting every technology professional. The early PDA which eventually integrated the phone had limited use and was not widely prevalent due to unwieldy size and interface. Except for the early large form factor devices, it was not a statement to make.

Evolution of the device and the network created new possibilities and the scattered raindrops became a flood; apps for everything and power in the hands of the executive with no constraint on time. Business impatience became the hallmark of new technology deployment to swamp all available and unavailable time. The CIO built layers of infrastructure, applications and security to manage the demand. It did not matter who or how many used it; if it was possible, then it had to be available.

The democratization of information worried only the CIO until stories of compromise started spreading. Compromise not always by the external world, but bits of information scattered across slowly fading away with exits, ignorant employees losing devices or passing hands within the family. Enterprise liability driven by law and governance suddenly finds itself at loggerheads with BYOT.

Depending on the country of incorporation and most probably operation, the laws require stringent compliance. BYOT contravenes some with liability creation for not just the CIO but the CEO and even the global HQ. A cyber law expert thrust the fear of the law of the land to listening CIOs who cringed with every clause and interpretation of impact to the executives and the enterprise.

So what are the choices available ? Will the CEO not want the next new device on the block to be connected to the corporate infrastructure ? Does s/he not evaluate the ramifications to the enterprise ? Is ignorance a good excuse ? I believe that the CIO needs to raise the bar with heightened awareness starting with the Board and then cascading downwards. It takes only once incidence to create collective pain. CIOs can address the contingent liability with reasonable due diligence, control and documentation to dampen down the impact.

It is not going away, but what it means to you is up to you. BYOT = Bring Your Own Trouble, or BYOD = Bring Your Own Demise, or BYOD = Bring Your Own Destiny, or BYOT = Bring Your Own Tension, or BYOT = Bring Your Own Threat, or BYOD/T = ? You decide !