BYOD can enhance employees' productivity and their willingness to work extra hours, yet there are BYOD pitfalls that companies need to avoid.
Wearables seem to be all the rage on tech media catwalks, but not so much with the general public. The problem: concerns about privacy. Still, offer consumers coupons or discounts, or help them with health and lifestyle maintenance, and you're half way there.
Enterprises need to begin crafting policies in order to harness the productivity benefits of wearables while ensuring that sensitive data is secure and privacy rights protected. These policies should be based on existing BYOD policies, yet take into account some of the unique attributes of wearables.
The on-again, off-again saga of smartphone kill switches in California is now officially on-again, as Governor Jerry Brown (D) Monday signed a bill mandating the anti-theft features as of July 2015.
Check out the hottest mobile IT stories for Aug. 26, including the expected increase in tablet game revenue, what Apple's entrance into mobile payments means for the market, VMware's newest venture, the bipartisan push to ban in-flight calls and what mobile commerce has done for French e-commerce sales.
Indian enterprises are increasingly embracing mobility, with close to three-quarters either planning or rolling out a mobility policy.
The Internet of Things--millions of smart devices communicating with each other seamlessly--promises to bring vastly improved efficiencies and lower costs to enterprises worldwide. But some are warning about hidden costs that come with IoT deployment.
Smart meters, which enable utilities to communicate wirelessly with home energy systems, are being criticized for invading home owners' privacy and, in some cases, starting fires.
Check out the hottest mobile IT stories for Aug. 21, including the potential spin off for PayPal, Pivotal's ascension to the cloud, a proposed Android security framework, how music streaming is boosting revenues and what milestone the worldwide radio access network is reaching.
Blocking or ignoring BYOD can cause employees to take matters into their own hands, resulting in shadow IT that can pose security risks for the enterprise.