-
Data Protection in a BYOD World
One of the most complicated areas of data protection in IT today has to be around securing the data on endpoint devices (laptops & tablets). Frankly, most IT organizations weren’t able to do an effective job of protecting that data… Read more
-
JBuff’s BYOD Experiment (part 3 of 4) Corporate Expectations
A while back, I decided to do an experiment on BYOD — here are my results: JBuff’s BYOD experiment – part 1, Acquisition Challenges JBuff’s BYOD experiment – part 2, Getting Started with Data JBuff’s BYOD experiment – part 3,… Read more
-
JBuff’s BYOD Experiment (part 2 of 4) Getting Started
A while back, I decided to do an experiment on BYOD — here are my results: JBuff’s BYOD experiment – part 1, Acquisition Challenges JBuff’s BYOD experiment – part 2, Getting Started with Data JBuff’s BYOD experiment – part 3,… Read more
-
JBuff’s BYOD Experiment (part 1 of 4) Acquisition Challenges
One of the more intersecting discussions in data protection is BYOD. When its not a corporately owned device, and therefore the IT department has far less influence (including perhaps the inability to install agent technologies on it) — who is… Read more
-
Microsoft’s Three Screens and a Cloud
Lately, it has occurred to me that Microsoft’s banter about “Three Screens and a Cloud” gets more real every day — those screens being your smartphone, your computer and your television, as a unified and unifying experience. As a confessionary… Read more