Page 183 -
P. 183

Chapter 4  Hardware, Software, and Mobile Systems
                182
                                            $;1& 2QNKE[          &GUETKRVKQP                 #FXCPVCIG VQ 1TICPK\CVKQP

                                            6JG[ FQPoV GZKUV     1TICPK\CVKQP NQQMU VJG QVJGT  0QPG
                                                                 YC[ YJGP GORNQ[GGU DTKPI
                                                                 OQDKNG FGXKEGU VQ YQTM

                                            9GoNN DG C EQHHGG UJQR  ;QWoNN DG CDNG VQ UKIP   2CEMGV UPKHHKPI QH GORNQ[GG
                                                                 KP VQ QWT YKTGNGUU PGVYQTM  OQDKNG FGXKEG WUG CV YQTM
                                                                 WUKPI [QWT OQDKNG FGXKEG

                                            9GoNN QHHGT NKOKVGF   1TICPK\CVKQP ETGCVGU JVVRU  'ORNQ[GGU ICKP RWDNKE CEEGUU HTQO
                                            U[UVGOU [QW ECP      CRRNKECVKQPU YKVJ UKIP KP   CP[ FGXKEG  PQV LWUV OQDKNG
                                            CEEGUU HTQO CP[ FGXKEG  CPF QHHGTU CEEGUU VQ PQPETKVKECN  FGXKEGU  YKVJQWV JCXKPI VQ
                                                                 DWUKPGUU U[UVGOU            WUG 820 CEEQWPVU
                                            ;QWoTG TGURQPUKDNG   6JTGCVGPKPI RQUVWTG VQ FKUEQWTCIG   #RRGCT VQ DG RGTOKUUKXG
                                            HQT FCOCIG           GORNQ[GG WUG QH OQDKNG FGXKEGU  YKVJQWV CEVWCNN[ DGKPI UQ
                                                                 CV YQTM

                                            9GoNN EJGEM KV QWV  TGNQCF  'ORNQ[GGU ECP WUG VJGKT OQDKNG  'ORNQ[GG DW[U VJG JCTFYCTG
                                            UQHVYCTG  VJGP OCPCIG   FGXKEGU LWUV CU KH VJG[ YGTG   RGTJCRU YKVJ CP GORNQ[GT U
                                            TGOQVGN[             EQORWVGTU RTQXKFGF D[ VJG   EQPVTKDWVKQP
                                                                 EQTRQTCVG +5 FGRCTVOGPV
                                            +H [QW EQPPGEV KV  YG  'ORNQ[GGU CTG PQV VQ WUG OQDKNG  7NVKOCVG KP EQPVTQN HQT JKIJN[
                                            QYP KV               FGXKEGU CV YQTM  +H VJG[ FQ  VJG[  UGEWTG YQTM UKVWCVKQPU
                Figure 4-24                                      NQUG VJGO  2CTV QH GORNQ[OGPV   KPVGNNKIGPEG  OKNKVCT[
                Advantages of Example BYOD                       CITGGOGPV
                Policies


                                            (MDM) software  that assist  this  process.  These  products install and update software,  back
                                            up and restore mobile devices, wipe employer software and data from devices in the event the
                                            device is lost or the employee leaves the company, report usage, and provide other mobile device
                                             management data.
                                               This policy benefits the organization, but some employees resist turning over the management
                                            of their own hardware to the organization. This resistance can be softened if the organization pays
                                            at least a portion of the hardware expense.
                                               The most controlling policy is for the organization to declare that it owns any mobile device
                                            that employees connect to its network. To be enforceable, this policy must be part of the employee’s
                                            contract. It is taken by organizations that manage very secure operations and environments. In
                                            some military/intelligence organizations, the policy is that any smart device that ever enters the
                                            workplace may never leave it. The advantages of these six policies are summarized in Figure 4-24.
                                               BYOD policies are rapidly evolving, and many organizations have not yet determined what is
                                            best for them. If your employer has a committee to develop such policies, join it if you can. Doing so
                                            will provide a great way to gain exposure to the leading technology thinkers at your organization.

                         Q4-8               2026?



                                            There’s a really old movie called You’ve Got Mail (1998) starring Tom Hanks and Meg Ryan. In it,
                                            the characters get really excited when they get “mail.” The term email was so new at the time that
                                            it hadn’t even caught on yet. You can see people in the movie reading newspapers and paper books.
                                            Oh, how times have changed.
                                               Fast-forward to today. Email now comes in seconds after it’s sent. You check your email during
                                            commercial breaks while you’re watching TV, while you’re driving in traffic, and while you’re sit-
                                            ting on the toilet. Instead of checking your email with bated breath, you’re dreading seeing more
                                            work pile up in your inbox. Or worse—bills, spam, and viruses.
   178   179   180   181   182   183   184   185   186   187   188