Tag Archive for iPhone

Six Steps to Avoid BYOD Pitfalls

Six Steps to Avoid BYOD PitfallsIn a recent article on the Forbes CIO Central blog, Dan Woods interviewed Brian Madocks, CEO of PC Helps, a services firm that provides supplemental help desk services for more than 1.6 million end-users. He has been on the front lines as many of its clients have opened up BYOD.

I want an iPadIn the article, Forbes offers advice on how IT departments can respond to users who show up at work and declare: “I want an iPad.”  The author warns that ignoring the corporate use of personal devices (smartphones, iPad’s and other tablets) leave both end-users and the IT department quite unhappy.

Mr. Madocks says the biggest myth is that allowing personal devices to be used for work-related purposes reduces the support burden. At first, this seems strange. If people use devices they know well, shouldn’t they need less help? Also, if an employee is using an iPhone or iPad, won’t their support questions be handled by AppleCare, Apple’s support arm? Mr. Madocks says no. Consumerization reduces some types of support but generates others. Here’s what happens.

ConsumerizationThe number of calls about how to use the device may go down. People know how to use their phones, get on the Internet, and use Facebook. But the number of calls about how to get their corporate email, calendar, and contacts working on phones or tablets may go up. With Apple (AAPL) iPhones and iPads and the fragmented Google (GOOG) Android versions out there it’s even more complicated. The PC Helps CEO reports that users can be frustrated when they go to Apple’s Genius Bar, AppleCare, or to Google for Andriod support and find out that they won’t get any help there because the staff doesn’t know how to support your corporate environment or the applications used within it.

With a multitude of personal devices in your workforce, the support burden may increase and your help desk may not be able to keep up with the unique features and aspects of all the devices. Mr. Madocks concludes that no matter how you allow access to the corporate resources the support burden NEVER disappears.

The support experts from the PC Helps brain-trust, developed a playbook for organizations considering a Bring Your Own Device model:

Don’t just say no to “bring your own technology”: The cat is out of the bag. End users are more productive when they have a vote on the tools they use and their support. PC Helps suggests IT show some leadership and help figure out how to get BYOD (PDF) right so that the company is protected and the users are happy. Recognize that consumerization means giving up some control; learn to live with that.

Listen to the end-users: Create an internal customer advisory group to allow end-users to explain what they want and what they don’t. The article says one of the primary drivers of consumerization is the wish to have work and personal content and capabilities on a single device. Craft a draft set of policies and guidelines based on this input.

Help deskResearch and test your approach: Consider a pilot program before full rollout that includes a mix of key users. Discover the range and types of preferred devices as well as the corporate systems, networks, and applications users will need access to. The blog recommends that you incorporate your findings into the broader rollout plan.

Document and communicate a clear set of policies and guidelines for end-users: Everyone should know what the company policies are for personal devices and where to find them. Explicit review of policies and testing for understanding should be performed from time to time, or as new devices arrive and raise new issues. The policies should set forth:

  • Which devices will be supported.
  • How to request new/more devices,
  • Which apps are authorized,
  • Which apps are forbidden,
  • How to get approval for new apps,
  • What company data is allowed on personal devices,
  • How to get support for devices and applications.

The policies should also answer the following questions:

  • When a device is no longer used for work or an employee leaves, what are their responsibilities to securely deletion corporate data?
  • Where and how will devices be backed up?
  • Who is responsible for backup?
  • Are lock and password-protection required, and how is it managed?
  • Who will provide support?
  • What kind of support questions should be directed to device manufacturers?

ComplexityPlan for a more complex support burden: Allowing personal devices means a world with more devices, which in turn multiplies the knowledge needed from the help desk. There will be more questions on setup, remote access, and use of corporate applications, as well as problems unique to the different devices. There will be more complex support scenarios, such as, how to use Microsoft Office applications on non-PC devices. Be sure you have a support plan and trained people in place.

Don’t rely on device manufacturers for support of your end-users: Manufacturers can handle break/fix and warranty support on products, but they won’t know your corporate policies, processes, nor the core office applications your users work with every day. Apple iPad owners have access to AppleCare and Genius bars, but this is all geared to consumers. AppleCare won’t help with many synchronization issues related to accessing corporate email on the iPad, nor provide urgent support for deadline-related business situations.

a risk to IT’s reputationEnd-users may get the run-around, going to the manufacturer and then to their wireless service provider, to your internal help desk, and to peer support for help, wasting time and productivity on something that could be solved in a single call. Devices for corporate use should have corporate support or they will present a risk to IT’s reputation in the organization.

Prepare your help desk for the task: The help desk in a BYOD IT environment is a different type of organization, one that must be able to respond to the unexpected. Mixed device environments require specialization and expertise, as well as ongoing training and skill-building. Your existing help desk staff may need to be retrained, expanded, or supplemented.

In the end, Mr. Madocks reports that the firms PC Helps assists in consumerization don’t regret their decision. “While consumerization creates complexity for support … The company’s workforce is happier and more productive, and the reputation of IT as a supporter of the business is greatly enhanced.” The end result is generally happier users and happier IT, but there are complications.

rb-

It is my experience that most people who push consumer devices into the enterprise, don’t have a plan. They want their iPads, for valid or not so valid reasons. Some staff seemed surprised when they could not print to the enterprise printer on the enterprise network with the iPad they just brought in.

I place a great deal of the blame at the feet of Apple. I have had Apple engineers look me straight in the face and tell me that iPads are consumer devices and not designed for the enterprise and that Apple does not intend to fix it.

They do not use standard protocols and BYOD proponents don’t even know what Bonjour is, let alone the limitations of Bonjour.

http://blogs.forbes.com/ciocentral/2011/02/07/i-want-my-ipad-avoiding-it-consumerization-pitfalls/
Related articles

 

Ralph Bach has been in IT long enough to know better and has blogged from his Bach Seat about IT, careers, and anything else that catches his attention since 2005. You can follow him on LinkedInFacebook, and Twitter. Email the Bach Seat here.

Is Your iPhone Turning You Into a Wimp?

Is Your iPhone Turning You Into a Wimp?New research from Harvard implies that consumerization and BYOD can have an impact on how staff behaves. Carmen Nobel at HBS Working Knowledge wrote about research from post-doctoral research fellow Maarten Bos and Associate Professor Amy Cuddy of Harvard Business School. They claim Your iPhone is Turning You Into a Wimp.

Your iPhone Turning You Into a WimpThe research says that in an experiment, people who had been using smartphone-sized iPod Touch devices were 47% less likely than desktop users to get up to try to find out why a researcher hadn’t come back after leaving the room to fetch paperwork so that participants could be paid. And of those who did take action, the iPod Touch users took 44% longer than desktop users to get up and look for the researcher. The research suggests that your hunched posture as you use a smartphone-sized device for just a few minutes makes you less likely to engage in power-related behaviors than people who have been using desktop computers.

Back painThe researchers claim that body posture inherent in operating everyday gadgets affects not only your back but your demeanor. A new study entitled iPosture: The Size of Electronic Consumer Devices Affects Our Behavior. It turns out that working on a larger machine causes users to act more assertively than working on a small one (like an iPad).

The study proves the positive effects of adopting expansive body postures – hands on hips, feet on the desk, and the like. According to the article, deliberately positioning the body in a “power pose” for just a few minutes actually affects body chemistry. They increase testosterone levels and decrease cortisol levels. This leads to higher confidence, and more willingness to take risks. According to a 2010 report by Andy Yap, Cuddy, and Dana Carney good posture leads to a greater sense of well-being,

Contractive body posturesContractive body postures like folded arms have the opposite effect.  Contractive body postures decrease testosterone and increasing cortisol. Bos and Cuddy wondered whether there might be behavioral ramifications from using electronic devices. The author says that many of us constrict our necks and hunch our shoulders when we use our phones. And statistics show that we use our phones a lot.

Americans spend an average of 58 minutes per day on their smartphones, according to a recent report from Experian Marketing Services. Talking accounts for only 26 percent of that time. The other 73% is devoted to texting, e-mail, social networking, and web-surfing – in other words, activities spent hunched over a little screen.

assertiveness and risk-taking behavior.Bos and Cuddy hypothesized that interacting with larger devices would lead to more expansive body postures. That in turn would lead to behaviors associated with power—including assertiveness and risk-taking behavior.

To test their hypothesis, Bos and Cuddy paid 75 participants $10 each and randomly assigned them to perform a series of tasks on one of four devices, each successively larger than the next: an iPod Touch, an iPad, a MacBook Pro laptop, or an iMac desktop computer. Each participant sat alone in a room during the experiment, monitored by a research assistant.

ClockWhen the participants were done with the tasks, the researcher pointed to a clock in the room and said, “I will get some forms ready for you to sign so I can pay you and you can leave. If I am not here in five minutes, please come get me at the front desk.” Rather than returning in five minutes, though, the researcher waited a maximum of ten minutes, recording whether and/or when the participant had come out to the front desk.

The article reports that device size substantially affected whether the participant left the room after waiting the requisite five minutes. Of the participants using a desktop computer, 94 percent took the initiative to fetch the experimenter. For those using the iPod Touch, only 50 percent left the room.

And among those who did leave the room, the device size seemed to affect the amount of time they waited to do so. The bigger the device was, the shorter the wait time. On average, desktop users waited 341 seconds before fetching the experimenter, for instance, while iPod Touch users waited an average of 493 seconds.

expansive body posturesThe steady increase of waiting time is locked in step with the size of the device,” Harvard’s Bos says. “I have never before in my life seen such a beautiful effect.” The results indicate that expansive body postures lead to power-related behaviors. This happens even in cases where the posture is incidentally induced by the size of the gadget or computer. Mr. Bos concludes that a break from your  mobile phone is needed to be powerful,  “...  you need at least a few minutes of interacting with a device, or, more importantly, of being in a specific posture related to that device, before you find effects.

In the meantime, the article suggests it may be a good idea to avoid the smartphone immediately before your next big meeting. Texting up until the boss starts speaking may make you look busy, but it may make you act meek. “We won’t tell anyone not to interact with those devices just before doing something that requires any kind of assertiveness,” Bos says. “Mostly because people won’t listen: They will do it anyway...”

rb-

Professor Cuddy’s power poses theory says that certain body stances, such as standing with your legs apart and your hands on your hips, or opening up your chest area, bathe your cortex in testosterone, a hormone associated with assertiveness and the willingness to take risks. Meanwhile, they also reduce cortisol, the stress hormone. On the other hand, low power poses—crossing your arms over your chest, say, or bunching your shoulders—increase neural levels of cortisol and reduce testosterone, resulting in more stress and less confidence.

Does this have implications for BYOD? The evidence seems to indicate that staff seeking advancement will gravitate toward tablets. Offering a larger device to a normally shy worker will make them more assertive.

Look around the office do your observations match the researcher’s implications?

 

Ralph Bach has been in IT long enough to know better and has blogged from his Bach Seat about IT, careers, and anything else that catches his attention since 2005. You can follow him on LinkedIn, Facebook, and Twitter. Email the Bach Seat here.

Smartphone Screen Kill Germs

Smartphone Screen Kill GermsCell phones are filthy. I wrote about portable petri dishes back in November 2012. CNET found that 75% of Americans use their mobile phones in the bathroom to make calls, text, and play with apps. Your mobile phone carries more germs than a toilet seat. There is speculation that they have even spread Ebola. Now, thankfully, Corning has your back.

Gorilla Glass kills germs all by itselfEric Limernewest revision of Gorilla Glass is more resilient and kills pesky germs all by itself. Gorilla Glass covers 1.5 billion mobile phones worldwide, including all Apple (AAPL) iPhones.

Corning discussed its upcoming display tech at the MIT Mobile Technology Summit. The antimicrobial coating on the new glass can kill virtually all nasty microbes on the screen’s surface over a course of two hours. It’s not instantaneous, but it’s way better than having a pocket petri dish, Mr. Limer observed.

Signe Brewster at GigaOM wrote that during the presentation, Corning senior vice president Jeff Evenson reported that the company is working on glass that kills viruses and germs — even the drug-resistant variety. GigaOM says that the VP noted a study that found smartphones carry more microbes than the average public toilet. He displayed how the glass kills microbes over time with slides depicting them as bright green dots. After two hours, the antimicrobial glass had a million times fewer bacteria than standard phone glass. Corning’s Evenson said

“You’re eating your sandwich at your desk. Your smartphone rings. You answer it. You complete the call, put your smartphone down and you go back to eating your sandwich with the same hand. Which piece of glass do you want on that device?”

Gizmodo reports that Corning said the antimicrobial displays will be available sometime in the next two years.

Corning antimicrobial glass kills germs

And that’s not all, either. GigaOM’s Brewster also reports that Corning is developing a new transparency treatment that will make the next revision of Gorilla Glass tens of times more transparent than purified water. This should result in seeing your phone in broad daylight is about to get way easier.

 rb-

Until Corning releases Gorilla Glass 3, washing your hands is a good idea, and licking your iPhone screen is probably a bad idea. In order to clean your iPhone, Apple recommends:

Wash your handsTo clean iPhone, unplug all cables and turn off iPhone (press and hold the Sleep/Wake button, and then slide the onscreen slider). Use a soft, slightly damp, lint-free cloth. Avoid getting moisture in openings. Don’t use window cleaners, household cleaners, aerosol sprays, solvents, alcohol, ammonia, or abrasives to clean your iPhone. The front and back glass surfaces have an oleophobic coating. Simply wipe these surfaces with a soft, lint-free cloth to remove fingerprints. This coating’s ability to repel oil will diminish over time with normal usage, and rubbing the screen with an abrasive material will further diminish its effect and may scratch the glass.

Related articles

 

Ralph Bach has been in IT long enough to know better and has blogged from his Bach Seat about IT, careers, and anything else that catches his attention since 2005. You can follow him on LinkedInFacebook, and Twitter. Email the Bach Seat here.

Tablet Info

Outside the office, workers turn to the tablet over the PC

Outside the office, workers turn to the tablet over the PCTablet computing is not overtaking smartphones or PCs in the enterprise, but they’re definitely carving a new business niche for themselves a survey conducted by cloud content management firm Alfresco shows. According to the data cited by GigaOM, tablets have replaced the PC as the go-to workstation for working at home and on the road.

The Alfresco study found that staff is using tablets:

  • 48% of enterprise employees are using tablets after hours at home,
  • 55% of respondents use tablets at business meetings (vs. 24% using PCs),
  • 50% are turning first to slates at conferences, compared to 13% using their laptops.

Alfresco reported that employees prefer the smartphone at more informal business functions

  • 57% using them at business lunches and
  • 51% using them in coffee shops.

But the tablet is also starting to become commonplace even in those more casual settings: 34% of respondents said they would haul out their slate at a lunch meeting, while 43% would do the same in a coffee shop.

The Alfresco data indicates that the 3-screen reality is coming true. Tablets aren’t replacing either smartphones or laptops, but are instead creating a new space in-between. The vendor says it’s pretty clear that laptops are increasingly tethered to the desk or cube, while tablets are the tool of choice on the go.

RB- This has huge implications on the support side of the equations

Incorporating Tablets into Enterprise Security

Incorporating Mobile Devices into Enterprise SecurityEnterprise information security hasn’t caught up with the consumerization of IT according to Lenny Zeltser in a recent article on the Lenny Zeltser on Information Security blog. The author states that the urgency with which organizations need to account for consumerization is driven by modern mobile devices such as Apple iPhones and iPads.

Enterprises are coming to terms with the idea of employees connecting to the corporate network over a VPN. Be it from personal laptops and home workstations according to the article. However, most organizations haven’t looked at the effect that the proliferation of powerful mobile devices has on enterprise security architecture.

Mobile devices sometimes have VPN-like access to the corporate network. In most cases have access to the company’s email contents, calendar, and address book. The devices are as powerful as laptops were just a few years ago. Yet, their operating system’s security has not benefited from the test of time. Tablets and mobile devices lack most of the security controls we’d expect to find in a “legacy” workstation OS.

Mr. Zeltser argues we need to understand how to model the threat vectors related to mobile devices and how to adjust the security of the enterprise architecture accordingly. The measures will probably involve:

  • Greater segmentation of the company’s network,
  • Treating any device that users interact with, whether it’s a desktop or a mobile phone, as an untrusted node,
  • Standards and tools to lock down the configuration of mobile devices,
  • Practices and technologies for managing vulnerabilities in applications and the OS of mobile devices,
  • Incident response plans that incorporate both “legacy” IT infrastructure assets and mobile devices.

BYO tablet? Three ways business is getting it all wrong

BYO tech? Three ways business is getting it all wrongSilicon.com had an article describing Three ways businesses are getting BYOD all wrong. The author claims the days of the standard work-issued laptop are numbered as businesses let staff use their own computers and gadgets in the workplace.

However, in the rush to adopt bring-your-own tech, businesses are placing too many restrictions on how personal devices can be used at work according to Anthony Vigneron, collaboration services global manager at global law firm Clifford Chance. He estimates that about 10 percent of firms’ 7,000 staff share the same device at home and work.

Mr. Vigneron described for silicon.com three ways businesses get it wrong when it comes to letting staff use personal devices at work.

Use sandboxing

Businesses are often advised to provide personal devices with secure access to corporate systems using sandboxed virtual machines. Sand-boxed machines allow remote access to corporate info via a virtual desktop that is run from the business’ data center.

He says it is better to let users access corporate data and apps from their device’s own OS. “Trying to deliver applications within a sandbox is not what users want. That’s not consumerization, that’s just another way of providing the same apps on different hardware,” he said.

People want to use the native applications. They don’t want to have to log in through some other system.” He concludes “The business should be able to control some of the applications staff use but you don’t want all those things inside another application.

Give them a choice

Mr. Vigneron argues that the line where work life ends and private life begins is becoming increasingly blurred. So it doesn’t make sense to treat them as two separate entities. By not allowing workers to merge their work and home calendars, contacts, and emails, businesses are imposing an artificial distinction on their staff. He explains, “You do want some separation … People want the choice of being able to work with the same interface.

Costs matter

Letting staff use their personal smartphone while working may seem like a good idea. However, employees might be in for an unpleasant shock when they get their phone bill. Mr. Vigneron said “For companies to allow for consumerization, the price has to get to an equivalent of what we can get as a corporate. They’re not doing that at the moment.

Related articles

 

Ralph Bach has been in IT long enough to know better and has blogged from his Bach Seat about IT, careers, and anything else that catches his attention since 2005. You can follow him on LinkedInFacebook, and Twitter. Email the Bach Seat here.

What Happens To Old Smartphones

The Business Insider has some new stats on what happens to old smartphones when people are done with them. The article says, for the most part, they just sit around. The author cites a survey by Gazelle, a site that takes trade-ins of old smartphones, tablets, and laptops. As you can see in this chart, 51% of people put old smartphones in a drawer or closet, according to Gazelle’s research.

MarketWatch estimates that all of those old phones sitting around are worth $34 billion. (That’s all phones, not just smartphones.) Companies like Gazelle are trying to get people to sell their smartphones to Gazelle, so they can resell the phones around the world and make a nice profit.

What happens to old smartphones

rb-

I’ve cover electronics recycling a number of times on Bach Seat.

Related articles

 

Ralph Bach has been in IT long enough to know better and has blogged from his Bach Seat about IT, careers, and anything else that catches his attention since 2005. You can follow him on LinkedInFacebook, and Twitter. Email the Bach Seat here.