With a new wave of low-cost tablets hitting the shelves of retailers globally last Christmas – some starting at as little as £100 – consumers of all ages and professions rushed out to grab their very own before the "sold out" sign appeared. But as tablet prices decrease, the potential business impact of the consumerisation of IT …
Good article Kevin. There are some great papers on this at Gartner, http://gtnr.it/NmkK0D , it's happening already but many businesses are turning a blind eye to security, compliance and a plethora of other issues that require good internal communication, education and policy documentation. Too late to plug the hole in the dam, but not too late to implement technology and policy to manage the trend.
Amanda Phillips, Managing Director, Volume
BYOD presents a great opportunity for businesses, because by allowing it they're visibly demonstrating a level of trust in their employees that can elevate the workplace relationship to a whole new level, giving them the freedom to operate more effectively.
And allowing more of the real 'them' into the working environment can have a very positive effect on productivity and on morale, particularly if you are instilling a sense of work being what you do rather than where you go.
The upshot is that the employee has access to their work at all times, which can be useful for both employer and employee in terms of flexible working, and it nods to the fact that your device is an enabler rather than a product in its own right. Like electricity - what we want is light, the electricity just allows that.
BYOD gives those organisations focused on improving productivity, employee satisfaction and driving revenue, the platform to do so.
- Next Windows obsolescence panic is 450 days from … NOW!
- Got Windows 8.1 Update yet? Get ready for YET ANOTHER ONE – rumor
- Enterprise storage will die just like tape did, say chaps with graphs
- It's a done deal! Microsoft-Nokia merger to close on Friday
- Despite your fancy-schmancy security tech, passwords still weakest link in IT defences