SlideShare ist ein Scribd-Unternehmen logo
1 von 8
Downloaden Sie, um offline zu lesen
From BYOD ‘Bring Your Own Device’
to CYOD ‘Choose Your Own Device’
Almost Impossible To Ignore Mobile Devices In The
Workplace…
www.mithi.com
Overview…
- More than a decade ago,
owning a mobile phone with
advent of 2G technology
allowed us to send
multimedia messages.
- Executives had now
reached the zenith of
connectivity by accessing
corporate emails via their
Blackberry.
- Today every smart device
like Smartphones, Tablets,
Notebooks are assured of
having business
applications.
- Business Applications
includes address book,
calendar, appointment
scheduler, calculator, along
with email clients.
- An interesting aspect is
enterprise mobility is being
pushed from the consumer
to the enterprise.
www.mithi.com
The Concept of ‘Bring Your Own Device’
(BYOD)…
To BYOD or not to BYOD is not the question anymore…
• Using the personal device for office work has become regular, structured and
streamlined.
• Enterprises are beginning to realize that they cannot avoid corporate data
from getting into personal devices.
• Rather than forcing employees into stealth-mode BYOD, it is more important
to encourage it at an official level.
www.mithi.com
The Concept of ‘Choose Your Own Device’
(CYOD)…
BYOD Replaced by CYOD ‘Choose Your Own Device’…
• CYOD provide employees with the choice of choosing personal device to the
workplace from the range of IT-approved devices.
• It helps the organization to enforce at least a particular IT-approved level of
security along with the advantage of having users assume some costs of
buying the device.
• it gives the user technology familiarity, has a positive effect on employee
morale, and gives a boost in productivity.
www.mithi.com
The Advantages Of Allowing Personal Devices
Can Be…
Personal Productivity and
Accessibility:
• Employees having 24×7 access to email and other
Office business applications can help increase an
organization’s global reach. It streamlines and speeds
up business services like HR self-help or approvals.
Business Content and
Collaboration:
• Employees can drive a higher sale by using their
devices to engage prospects and customers
that enhance the level of customer
engagement.
www.mithi.com
Primary Concern of Using a hosted email &
business applications over personal devices…
Security:
• The main concern is to
safeguarding the
corporate data that is
stored on employee’s
personal devices by
enabling a basic
password or a PIN on
their devices.
Personal Use:
• Personal devices at
workplace could result in
employees wasting
precious work time to
indulge in personal
activities like chatting,
using social media or
exploring other forms of
tech entertainment.
Working with
Organization’s Technology:
• Some personal devices
may not meet the
requirements for being
fully compatible with the
organization’s policies.
www.mithi.com
Conclusion…
• Enterprises have to accept and gear up for this change.
• The IT departments need to start formalizing policies covering acceptable BYOD
usage.
• The average office workers now expect the same consumerism that they have
become accustomed to with their personal device, from their office device.
• Engaging the employee will be equally important as engaging the customer.
• Advances in holographic technology, augmented reality (Google Glass),
smartwatches, etc. will lead to the ultimate goal for an organization that allows
employee to be productive.
www.mithi.com
• http://blog.snapinspect.com/wp-content/uploads/2014/03/Cloud-Business-
Phone-Service_Standardize-Your-BYOD-Property-Management.jpg
• http://www.bandwidthblog.com/wp-content/uploads/2012/10/byod.jpg
• http://business-technology.co.uk/wp-content/uploads/2013/12/BYO.jpg
• http://michellgroup.com/wp-content/uploads/2014/10/byod_MCG.png
• http://economictimes.indiatimes.com/thumb/msid-25241623,width-
640,resizemode-4/5-ways-to-manage-employee-productivity.jpg
• http://images.atelier.net/sites/default/files/imagecache/scale_crop_587_310/artic
les/shutterstock_97988600.jpg
• http://qatestlab.com/assets/software-testing-company-12.png
• http://images.techhive.com/images/idge/imported/article/cio/2013/05/30/legal1-
100340720-orig.jpg
Image Credits…
www.mithi.com

Weitere ähnliche Inhalte

Was ist angesagt?

Microsoft Dynamics for Retail: Overview
Microsoft Dynamics for Retail: OverviewMicrosoft Dynamics for Retail: Overview
Microsoft Dynamics for Retail: Overview
StrongPoint Baltics
 
Productize it case studies
Productize it case studiesProductize it case studies
Productize it case studies
Andaleeb Wajid
 

Was ist angesagt? (20)

[WSO2Con EU 2017] Crafting an API Strategy with an API Marketplace
[WSO2Con EU 2017] Crafting an API Strategy with an API Marketplace[WSO2Con EU 2017] Crafting an API Strategy with an API Marketplace
[WSO2Con EU 2017] Crafting an API Strategy with an API Marketplace
 
#MFSummit2016 Operate: Towards a unified endpoint management strategy
#MFSummit2016 Operate: Towards a unified endpoint management strategy#MFSummit2016 Operate: Towards a unified endpoint management strategy
#MFSummit2016 Operate: Towards a unified endpoint management strategy
 
Software Architecture and Design Thinking
Software Architecture and Design ThinkingSoftware Architecture and Design Thinking
Software Architecture and Design Thinking
 
Licensing in the cloud era
Licensing in the cloud eraLicensing in the cloud era
Licensing in the cloud era
 
Beaconly - Beacon Management Software
Beaconly - Beacon Management SoftwareBeaconly - Beacon Management Software
Beaconly - Beacon Management Software
 
How can you Monetize the Internet of Things?
How can you Monetize the Internet of Things?How can you Monetize the Internet of Things?
How can you Monetize the Internet of Things?
 
Drive incremental revenue from innovative software license models
Drive incremental revenue from innovative software license modelsDrive incremental revenue from innovative software license models
Drive incremental revenue from innovative software license models
 
LeanIX Inventory: Import & Export
LeanIX Inventory: Import & ExportLeanIX Inventory: Import & Export
LeanIX Inventory: Import & Export
 
#MFSummit2016 Operate: Introduction to software collaboration and networking
#MFSummit2016 Operate: Introduction to software collaboration and networking#MFSummit2016 Operate: Introduction to software collaboration and networking
#MFSummit2016 Operate: Introduction to software collaboration and networking
 
[WSO2Con EU 2017] Opening Keynote: The WSO2 Digital Agility Impact
[WSO2Con EU 2017] Opening Keynote: The WSO2 Digital Agility Impact[WSO2Con EU 2017] Opening Keynote: The WSO2 Digital Agility Impact
[WSO2Con EU 2017] Opening Keynote: The WSO2 Digital Agility Impact
 
SERVICENOW PPT BY PAVANKUMAR
SERVICENOW PPT BY PAVANKUMARSERVICENOW PPT BY PAVANKUMAR
SERVICENOW PPT BY PAVANKUMAR
 
How to sell VMware Cloud Director
How to sell VMware Cloud DirectorHow to sell VMware Cloud Director
How to sell VMware Cloud Director
 
ISW Corporate Overview 2013
ISW Corporate Overview 2013ISW Corporate Overview 2013
ISW Corporate Overview 2013
 
[WSO2Con EU 2017] Internal Digital Transformation: Transform Your Enterprise IT
[WSO2Con EU 2017] Internal Digital Transformation: Transform Your Enterprise IT[WSO2Con EU 2017] Internal Digital Transformation: Transform Your Enterprise IT
[WSO2Con EU 2017] Internal Digital Transformation: Transform Your Enterprise IT
 
Delivering Self Service: Integrating MFT Processes into ITSM Tools
Delivering Self Service: Integrating MFT Processes into ITSM ToolsDelivering Self Service: Integrating MFT Processes into ITSM Tools
Delivering Self Service: Integrating MFT Processes into ITSM Tools
 
Webinar: Integrated B2B Ecommerce for Sage 300 ERP
Webinar: Integrated B2B Ecommerce for Sage 300 ERPWebinar: Integrated B2B Ecommerce for Sage 300 ERP
Webinar: Integrated B2B Ecommerce for Sage 300 ERP
 
Welcome to SoftSummit 2010
Welcome to SoftSummit 2010Welcome to SoftSummit 2010
Welcome to SoftSummit 2010
 
Microsoft Dynamics for Retail: Overview
Microsoft Dynamics for Retail: OverviewMicrosoft Dynamics for Retail: Overview
Microsoft Dynamics for Retail: Overview
 
Productize it case studies
Productize it case studiesProductize it case studies
Productize it case studies
 
Micro Focus iPrint
Micro Focus iPrintMicro Focus iPrint
Micro Focus iPrint
 

Andere mochten auch

Infographic: SDN, BYOD and Cloud! Oh my!
Infographic: SDN, BYOD and Cloud! Oh my!Infographic: SDN, BYOD and Cloud! Oh my!
Infographic: SDN, BYOD and Cloud! Oh my!
SolarWinds
 

Andere mochten auch (17)

Building an Effective School BYOD Plan
Building an Effective School BYOD PlanBuilding an Effective School BYOD Plan
Building an Effective School BYOD Plan
 
10 Steps to a Successful BYOD Strategy
10 Steps to a Successful BYOD Strategy10 Steps to a Successful BYOD Strategy
10 Steps to a Successful BYOD Strategy
 
How To Do BYOD Right
How To Do BYOD RightHow To Do BYOD Right
How To Do BYOD Right
 
SDN a strategic assessment
SDN a strategic assessment  SDN a strategic assessment
SDN a strategic assessment
 
tyntec BYOD User Survey 2015
tyntec BYOD User Survey 2015tyntec BYOD User Survey 2015
tyntec BYOD User Survey 2015
 
Infographic: SDN, BYOD and Cloud! Oh my!
Infographic: SDN, BYOD and Cloud! Oh my!Infographic: SDN, BYOD and Cloud! Oh my!
Infographic: SDN, BYOD and Cloud! Oh my!
 
Intro to SDN - Part I
Intro to SDN - Part IIntro to SDN - Part I
Intro to SDN - Part I
 
Surviving a BYOD Implementation - TCEA 2016
Surviving a BYOD Implementation - TCEA 2016Surviving a BYOD Implementation - TCEA 2016
Surviving a BYOD Implementation - TCEA 2016
 
Making BYOD Work for Your Organization
Making BYOD Work for Your OrganizationMaking BYOD Work for Your Organization
Making BYOD Work for Your Organization
 
6 essentials for secure BYOD in healthcare
6 essentials for secure BYOD in healthcare6 essentials for secure BYOD in healthcare
6 essentials for secure BYOD in healthcare
 
IBM Connect 2013: BYOD at IBM
IBM Connect 2013: BYOD at IBMIBM Connect 2013: BYOD at IBM
IBM Connect 2013: BYOD at IBM
 
BYOD & company owned comparison
BYOD & company owned comparisonBYOD & company owned comparison
BYOD & company owned comparison
 
Intro to SDN - Part III
Intro to SDN - Part IIIIntro to SDN - Part III
Intro to SDN - Part III
 
Intro to SDN - Part IV
Intro to SDN - Part IVIntro to SDN - Part IV
Intro to SDN - Part IV
 
NSWDEC BYOD Checklist
NSWDEC BYOD ChecklistNSWDEC BYOD Checklist
NSWDEC BYOD Checklist
 
The Financial Impact of BYOD Full Presentation
The Financial Impact of BYOD Full PresentationThe Financial Impact of BYOD Full Presentation
The Financial Impact of BYOD Full Presentation
 
Arista Networks - Building the Next Generation Workplace and Data Center Usin...
Arista Networks - Building the Next Generation Workplace and Data Center Usin...Arista Networks - Building the Next Generation Workplace and Data Center Usin...
Arista Networks - Building the Next Generation Workplace and Data Center Usin...
 

Ähnlich wie From byod to cyod

BYOD: Implementation and Security Issues
BYOD: Implementation and Security IssuesBYOD: Implementation and Security Issues
BYOD: Implementation and Security Issues
Harsh Kishore Mishra
 
BYOD- A Productivity Catalyst
BYOD- A Productivity CatalystBYOD- A Productivity Catalyst
BYOD- A Productivity Catalyst
Packet One
 
160419 CIO Enterprise Mobility Dig Advantage
160419 CIO Enterprise Mobility Dig Advantage160419 CIO Enterprise Mobility Dig Advantage
160419 CIO Enterprise Mobility Dig Advantage
Dr. Bill Limond
 
Marketing Program Overview_Sal A _2012 v2.1
Marketing Program Overview_Sal A _2012 v2.1Marketing Program Overview_Sal A _2012 v2.1
Marketing Program Overview_Sal A _2012 v2.1
Sal Abramo
 
Ten Commandments of BYOD
Ten Commandments of BYODTen Commandments of BYOD
Ten Commandments of BYOD
K Singh
 
Aisha visram presentacion bmobilew 2015 rev 2
Aisha visram presentacion bmobilew 2015 rev 2Aisha visram presentacion bmobilew 2015 rev 2
Aisha visram presentacion bmobilew 2015 rev 2
Aisha Visram
 

Ähnlich wie From byod to cyod (20)

BYOD (Bring Your Own Device) Risks And Benefits
BYOD (Bring Your Own Device) Risks And BenefitsBYOD (Bring Your Own Device) Risks And Benefits
BYOD (Bring Your Own Device) Risks And Benefits
 
BYOD: Implementation and Security Issues
BYOD: Implementation and Security IssuesBYOD: Implementation and Security Issues
BYOD: Implementation and Security Issues
 
Byod
ByodByod
Byod
 
Bring Your Own Device is a disruptive phenomenon that is a significant IT trend
Bring Your Own Device is a disruptive phenomenon that is a significant IT trendBring Your Own Device is a disruptive phenomenon that is a significant IT trend
Bring Your Own Device is a disruptive phenomenon that is a significant IT trend
 
BYOD
BYODBYOD
BYOD
 
BYOD- A Productivity Catalyst
BYOD- A Productivity CatalystBYOD- A Productivity Catalyst
BYOD- A Productivity Catalyst
 
BYOD - Highlights of "Consumerization"
BYOD - Highlights of "Consumerization"BYOD - Highlights of "Consumerization"
BYOD - Highlights of "Consumerization"
 
Leveraging byod
Leveraging byodLeveraging byod
Leveraging byod
 
160419 CIO Enterprise Mobility Dig Advantage
160419 CIO Enterprise Mobility Dig Advantage160419 CIO Enterprise Mobility Dig Advantage
160419 CIO Enterprise Mobility Dig Advantage
 
BYOD Blue Paper
BYOD Blue PaperBYOD Blue Paper
BYOD Blue Paper
 
Marketing Program Overview_Sal A _2012 v2.1
Marketing Program Overview_Sal A _2012 v2.1Marketing Program Overview_Sal A _2012 v2.1
Marketing Program Overview_Sal A _2012 v2.1
 
Ten Commandments of BYOD
Ten Commandments of BYODTen Commandments of BYOD
Ten Commandments of BYOD
 
Integrating Enterprise Mobility - an Assessment WHITE PAPER
Integrating Enterprise Mobility - an Assessment WHITE PAPERIntegrating Enterprise Mobility - an Assessment WHITE PAPER
Integrating Enterprise Mobility - an Assessment WHITE PAPER
 
Byod bpost
Byod bpostByod bpost
Byod bpost
 
Turbo-charging Your Organization's Productivity with Enterprise Social
Turbo-charging Your Organization's Productivity with Enterprise SocialTurbo-charging Your Organization's Productivity with Enterprise Social
Turbo-charging Your Organization's Productivity with Enterprise Social
 
ACT 2014 Business or Pleasure the Challenges of Bring Your Own Device Policie...
ACT 2014 Business or Pleasure the Challenges of Bring Your Own Device Policie...ACT 2014 Business or Pleasure the Challenges of Bring Your Own Device Policie...
ACT 2014 Business or Pleasure the Challenges of Bring Your Own Device Policie...
 
Aisha visram presentacion bmobilew 2015 rev 2
Aisha visram presentacion bmobilew 2015 rev 2Aisha visram presentacion bmobilew 2015 rev 2
Aisha visram presentacion bmobilew 2015 rev 2
 
Role of it in business
Role of it in businessRole of it in business
Role of it in business
 
Building a Smarter Workplace
Building a Smarter WorkplaceBuilding a Smarter Workplace
Building a Smarter Workplace
 
Digital insurance trends in Asia - Presentation to Allianz regional conferen...
Digital insurance trends in Asia  - Presentation to Allianz regional conferen...Digital insurance trends in Asia  - Presentation to Allianz regional conferen...
Digital insurance trends in Asia - Presentation to Allianz regional conferen...
 

Mehr von Mithi SkyConnect

Mehr von Mithi SkyConnect (20)

Baya 4 - Insanely productive web UX - Now available for you
Baya 4 - Insanely productive web UX - Now available for youBaya 4 - Insanely productive web UX - Now available for you
Baya 4 - Insanely productive web UX - Now available for you
 
How you can Leverage Mithi's flexible billing models to optimize costs
How you can Leverage Mithi's flexible billing models to optimize costsHow you can Leverage Mithi's flexible billing models to optimize costs
How you can Leverage Mithi's flexible billing models to optimize costs
 
Which of the 6 methods of email forwarding is suitable and secure for your re...
Which of the 6 methods of email forwarding is suitable and secure for your re...Which of the 6 methods of email forwarding is suitable and secure for your re...
Which of the 6 methods of email forwarding is suitable and secure for your re...
 
How to reduce mailbox size and protect email data
How to reduce mailbox size and protect email dataHow to reduce mailbox size and protect email data
How to reduce mailbox size and protect email data
 
India’s Largest Municipal Corporation improves citizen service using a zero d...
India’s Largest Municipal Corporation improves citizen service using a zero d...India’s Largest Municipal Corporation improves citizen service using a zero d...
India’s Largest Municipal Corporation improves citizen service using a zero d...
 
Rolling out Baya V3 with ConnectXF
Rolling out Baya V3 with ConnectXF  Rolling out Baya V3 with ConnectXF
Rolling out Baya V3 with ConnectXF
 
Webinar: Using the Baya V3 interface
Webinar: Using the Baya V3 interface Webinar: Using the Baya V3 interface
Webinar: Using the Baya V3 interface
 
Webinar Mastery Series: With SaaS, Are you heading for a vendor lock in?
Webinar Mastery Series: With SaaS, Are you heading for a vendor lock in?Webinar Mastery Series: With SaaS, Are you heading for a vendor lock in?
Webinar Mastery Series: With SaaS, Are you heading for a vendor lock in?
 
Webinar Mastery Series: Transform Teamwork Productivity with the new SkyConne...
Webinar Mastery Series: Transform Teamwork Productivity with the new SkyConne...Webinar Mastery Series: Transform Teamwork Productivity with the new SkyConne...
Webinar Mastery Series: Transform Teamwork Productivity with the new SkyConne...
 
Webinar Mastery Series: How Security & Compliance become easier with SkyConne...
Webinar Mastery Series: How Security & Compliance become easier with SkyConne...Webinar Mastery Series: How Security & Compliance become easier with SkyConne...
Webinar Mastery Series: How Security & Compliance become easier with SkyConne...
 
How Cloud Email delivers security, reliability, and speed to Indian Oil Corpo...
How Cloud Email delivers security, reliability, and speed to Indian Oil Corpo...How Cloud Email delivers security, reliability, and speed to Indian Oil Corpo...
How Cloud Email delivers security, reliability, and speed to Indian Oil Corpo...
 
SkyConnect
SkyConnectSkyConnect
SkyConnect
 
SkyConnect Product Overview
SkyConnect Product Overview SkyConnect Product Overview
SkyConnect Product Overview
 
How all levels of an enterprise can benefit from mithi's email server software
How all levels of an enterprise can benefit from mithi's email server softwareHow all levels of an enterprise can benefit from mithi's email server software
How all levels of an enterprise can benefit from mithi's email server software
 
Lifecycle support services for high server uptime and lower costs
Lifecycle support services for high server uptime and lower costsLifecycle support services for high server uptime and lower costs
Lifecycle support services for high server uptime and lower costs
 
Business case study how one product deployed in 3 diverse enterprises reaped ...
Business case study how one product deployed in 3 diverse enterprises reaped ...Business case study how one product deployed in 3 diverse enterprises reaped ...
Business case study how one product deployed in 3 diverse enterprises reaped ...
 
Selecting an email solution for my enterprise
Selecting an email solution for my enterpriseSelecting an email solution for my enterprise
Selecting an email solution for my enterprise
 
Sbi life email and collaboration as a service on public cloud - an experience
Sbi life   email and collaboration as a service on public cloud - an experienceSbi life   email and collaboration as a service on public cloud - an experience
Sbi life email and collaboration as a service on public cloud - an experience
 
Real time collaboration with webchat in baya webmail client
Real time collaboration with webchat in baya webmail clientReal time collaboration with webchat in baya webmail client
Real time collaboration with webchat in baya webmail client
 
Hosted collaboration service mithi sky connect
Hosted collaboration service   mithi sky connectHosted collaboration service   mithi sky connect
Hosted collaboration service mithi sky connect
 

Kürzlich hochgeladen

CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
giselly40
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
vu2urc
 

Kürzlich hochgeladen (20)

Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdf
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 

From byod to cyod

  • 1. From BYOD ‘Bring Your Own Device’ to CYOD ‘Choose Your Own Device’ Almost Impossible To Ignore Mobile Devices In The Workplace… www.mithi.com
  • 2. Overview… - More than a decade ago, owning a mobile phone with advent of 2G technology allowed us to send multimedia messages. - Executives had now reached the zenith of connectivity by accessing corporate emails via their Blackberry. - Today every smart device like Smartphones, Tablets, Notebooks are assured of having business applications. - Business Applications includes address book, calendar, appointment scheduler, calculator, along with email clients. - An interesting aspect is enterprise mobility is being pushed from the consumer to the enterprise. www.mithi.com
  • 3. The Concept of ‘Bring Your Own Device’ (BYOD)… To BYOD or not to BYOD is not the question anymore… • Using the personal device for office work has become regular, structured and streamlined. • Enterprises are beginning to realize that they cannot avoid corporate data from getting into personal devices. • Rather than forcing employees into stealth-mode BYOD, it is more important to encourage it at an official level. www.mithi.com
  • 4. The Concept of ‘Choose Your Own Device’ (CYOD)… BYOD Replaced by CYOD ‘Choose Your Own Device’… • CYOD provide employees with the choice of choosing personal device to the workplace from the range of IT-approved devices. • It helps the organization to enforce at least a particular IT-approved level of security along with the advantage of having users assume some costs of buying the device. • it gives the user technology familiarity, has a positive effect on employee morale, and gives a boost in productivity. www.mithi.com
  • 5. The Advantages Of Allowing Personal Devices Can Be… Personal Productivity and Accessibility: • Employees having 24×7 access to email and other Office business applications can help increase an organization’s global reach. It streamlines and speeds up business services like HR self-help or approvals. Business Content and Collaboration: • Employees can drive a higher sale by using their devices to engage prospects and customers that enhance the level of customer engagement. www.mithi.com
  • 6. Primary Concern of Using a hosted email & business applications over personal devices… Security: • The main concern is to safeguarding the corporate data that is stored on employee’s personal devices by enabling a basic password or a PIN on their devices. Personal Use: • Personal devices at workplace could result in employees wasting precious work time to indulge in personal activities like chatting, using social media or exploring other forms of tech entertainment. Working with Organization’s Technology: • Some personal devices may not meet the requirements for being fully compatible with the organization’s policies. www.mithi.com
  • 7. Conclusion… • Enterprises have to accept and gear up for this change. • The IT departments need to start formalizing policies covering acceptable BYOD usage. • The average office workers now expect the same consumerism that they have become accustomed to with their personal device, from their office device. • Engaging the employee will be equally important as engaging the customer. • Advances in holographic technology, augmented reality (Google Glass), smartwatches, etc. will lead to the ultimate goal for an organization that allows employee to be productive. www.mithi.com
  • 8. • http://blog.snapinspect.com/wp-content/uploads/2014/03/Cloud-Business- Phone-Service_Standardize-Your-BYOD-Property-Management.jpg • http://www.bandwidthblog.com/wp-content/uploads/2012/10/byod.jpg • http://business-technology.co.uk/wp-content/uploads/2013/12/BYO.jpg • http://michellgroup.com/wp-content/uploads/2014/10/byod_MCG.png • http://economictimes.indiatimes.com/thumb/msid-25241623,width- 640,resizemode-4/5-ways-to-manage-employee-productivity.jpg • http://images.atelier.net/sites/default/files/imagecache/scale_crop_587_310/artic les/shutterstock_97988600.jpg • http://qatestlab.com/assets/software-testing-company-12.png • http://images.techhive.com/images/idge/imported/article/cio/2013/05/30/legal1- 100340720-orig.jpg Image Credits… www.mithi.com