Bring Your Own Device Shakes Up IT Departments

Size: px
Start display at page:

Download "Bring Your Own Device Shakes Up IT Departments"

Transcription

1 Bring Your Own Device Shakes Up IT Departments As employees quietly bring their personal devices to work, and forward-thinking companies respond, this win-win workplace revolution presents some challenges. An integrated bring your own device concept helps maximize the benefits while minimizing the risks. 1

2 The Facebook generation has been entering the workforce in waves for many years now. Having grown up with the ubiquitous availability of IT, its members accept and expect high levels of automation, 24-7 communication, and seamless connectivity as a way of life. With their more open attitude toward data privacy and a general disdain for controls and standardization, they come equipped with a plug and play mindset, experience in leading-edge IT concepts, and familiarity with devices such as the MacBook, iphone, and ipad and applications such as Facebook, Skype, and Twitter. For the Facebook generation employee, it is their personal IT experience that defines their baseline expectation of IT tools and services in the corporate environment. A well-designed BYOD strategy and implementation will ensure that personal IT devices boost employee productivity and satisfaction rates without increasing costs. Findings in a recent A.T. Kearney study appear to support this, indicating a clear trend toward the use of personal IT devices in the corporate environment, with almost 40 percent of respondents saying they use at least one personal IT device for business purposes. Clearly, the computer is no longer perceived as just the electronic means of getting the job done it has become a design tool that fosters personal expression and creativity, and not just in fields such as advertising and marketing but also in less conventional areas such as distribution. A fault line between IT standardization and IT personalization has started to emerge and requires management attention. So How Does That Work? For companies, it is difficult to reconcile people using their own devices at work against the practices and norms that have traditionally pervaded corporate IT: cost efficiency predicated on standardized hardware and software that is tightly controlled and governed. However, the number of companies whose IT departments are open to this new trend is rising, and they are beginning to accept a variety of IT devices and applications that are also used on a personal basis (see figure 1 on page 3). The umbrella term used to describe this concept is bring your own device (BYOD). BYOD encompasses a broad range of possibilities, from the simple connection of personal IT devices (such as tablets and smartphones) to the corporate network, up to complex funding models in which employees either receive a stipend for buying their own work equipment or contribute to any additional costs of a higher-value IT device in exchange for some personal usage rights. The result? Companies report improved productivity and efficiency and lower costs. For example, a software firm ran a global pilot in which employees chose their own company computer and the company supported each purchase with a payment of up to $2,000, on condition that an external three-year maintenance contract was part of the deal. From the pilot alone, the company was able to reduce device management costs by 20 percent and cut the budget for maintenance and upgrade tasks by 80 percent. 2

3 Figure 1 How personal devices safely access the corporate network 1 2 Within corporate network: access via separate firewall Outside corporate network: access via Internet (VPN) Notebook Tablet Smartphone Corporate IT 1 2 Internet Corporate PC Corporate PC BYOD firewall Secure corporate network Application Application Corporate firewall Cloud services Data Data Note: BYOD is bring your own device. Source: A.T. Kearney analysis For those successfully implementing BYOD initiatives, there are numerous benefits. Process times are shorter as employees use their devices outside their regular working hours and are consequently available after hours and out of the office to deal with basic tasks such as responding to s and attending video meetings. In addition, employees who have tools tailored to their needs as they perform their duties, rather than tools that meet company-wide standards, have a more positive attitude, and are more motivated and more efficient. A fault line between IT standardization and IT personalization has started to emerge and requires management attention. And because companies and employees share the cost of purchasing some IT devices, the burden on the IT budget is lower. Employees also benefit because they do not have to buy a second device for personal use. This assumes that their devices substitute, rather than supplement, the equipment already provided by the company. 3

4 The advantages of the BYOD concept are not, however, without certain challenges. These include the following: Protecting data. Less attention is often paid to the security of sensitive corporate data on private systems than on dedicated business IT systems, which exposes the organization to heightened risk. Furthermore, less standardization means more potential security vulnerabilities. Providing IT support. It goes without saying that users expect comprehensive IT support regardless of the heterogeneous system landscape. IT support teams obviously need to widen their skills and re-tool to address a more diverse IT asset base, a greater variety of device configurations, and more software incompatibilities and system conflicts quickly, competently, and cost effectively. Purchasing IT. Existing IT supply contracts will have to be recast, as fewer purchases make it difficult to obtain volume discounts on standard equipment and specifications. Smart Solutions Given the attractiveness of BYOD on the one hand and the significant challenges on the other, A.T. Kearney has devised an integrated BYOD concept that addresses five core areas to help capitalize on the benefits while minimizing the associated risks (see figure 2): Adapt the procurement concept. Defining a catalog of standard devices for various usage categories and including a list of high-value devices allows employees to choose their own devices and use them on a personal basis, and pay for any additional associated costs. The ongoing maintenance services for the redefined catalog is then outsourced to hardware suppliers. Figure 2 Focus on five core areas to boost benefits and reduce risk Procurement License and software management Architecture (IT security) Help desk Communications Source: A.T. Kearney analysis 4

5 Figure 3 Anatomy of a win-win situation how BYOD costs break down ($ thousand) Illustrative Savings to company: 13% Total savings: 22% Savings to employees: 40% Employees cost External SLAmployees cost 655 Company cost Internal service staff 131 Depreciation hardware Depreciation software 66 Initial cost to company Initial total cost Initial cost to employees BYOD cost to employees BYOD total cost BYOD cost to company Source: A.T. Kearney analysis Because a BYOD concept generally means cost savings for both the employee and the company when it comes to replacing workplace computers, the outcome is a classic win-win situation for everyone (see figure 3). Even if you continue to run with a full IT budget based on historic hardware costs, any additional costs for maintenance, for example, are likely to be offset by employees contributing to their share of IT costs. Improve license and software management. The company benefits from centralizing the packaging, distribution, provision, and management of software licenses for all applications. Define a comprehensive communications campaign. Implementing a communications campaign both within the company, for example in the form of IT governance guidelines, and outside the company, in the form of marketing measures, can highlight the company s innovative practices. This external marketing of a BYOD initiative serves to increase its appeal to young, qualified potential employees. Expand the IT help desk. Expanding the capacity of the IT help desk will be necessary to cope with the heterogeneous IT landscape and anticipated rise in user queries following the introduction of the BYOD concept. This usually means revised training, new support portals, wikis for self-help, and redefined service levels. 5

6 Alter the architecture (introduce virtualized work environments). The savings can only take effect at the workplace level when there is sufficient investment in a secure and capable IT architecture. Such investments should be seen in the context of the benefits already discussed increased productivity and efficiency and in the positive impact on the company s image. Making core applications such as Microsoft Office available to employees via the corporate intranet, either as a browser solution or a virtual application, has enormous advantages in that the company s actual application landscape is detached from the hardware-specific requirements of heterogeneous IT devices. These are equipped with an appropriate framework to ensure the secure access and use of enterprise applications. As the main applications and key data are provided over the Internet, IT security requirements and user-specific access and identity-management protocols are put in place. It is not simply a matter of providing access to data but also of safeguarding the use of corporate applications via the Internet. Getting Personal Pays Off Relaxing standardization with a successful BYOD concept begins with an analysis of the corporate culture to determine costs, benefits, potential users, and future IT requirements. Next, we make sure all statutory requirements regarding IT security, compliance, and tax legislation are addressed. Performing a pilot with select users is a good way to test the concept before going live. A well-designed strategy and implementation will ensure that personal IT devices boost employee productivity and satisfaction rates without increasing costs leading to a lasting advantage for companies and their employees. Author Robert Jekel, principal, Zurich robert.jekel@atkearney.com 6

7 A.T. Kearney is a global team of forward-thinking, collaborative partners that delivers immediate, meaningful results and long-term transformative advantage to clients. Since 1926, we have been trusted advisors on CEO-agenda issues to the world s leading organizations across all major industries and sectors. A.T. Kearney s offices are located in major business centers in 39 countries. Americas Atlanta Calgary Chicago Dallas Detroit Houston Mexico City New York San Francisco São Paulo Toronto Washington, D.C. Europe Amsterdam Berlin Brussels Bucharest Budapest Copenhagen Düsseldorf Frankfurt Helsinki Istanbul Kiev Lisbon Ljubljana London Madrid Milan Moscow Munich Oslo Paris Prague Rome Stockholm Stuttgart Vienna Warsaw Zurich Asia Pacific Bangkok Beijing Hong Kong Jakarta Kuala Lumpur Melbourne Mumbai New Delhi Seoul Shanghai Singapore Sydney Tokyo Middle East and Africa Abu Dhabi Dubai Johannesburg Manama Riyadh For more information, permission to reprint or translate this work, and all other correspondence, please insight@atkearney.com. A.T. Kearney Korea LLC is a separate and independent legal entity operating under the A.T. Kearney name in Korea. 2012, A.T. Kearney, Inc. All rights reserved. The signature of our namesake and founder, Andrew Thomas Kearney, on the cover of this document represents our pledge to live the values he instilled in our firm and uphold his commitment to ensuring essential rightness in all that we do.

THE PLATFORM EQUINIX VISION

THE PLATFORM EQUINIX VISION THE PLATFORM EQUINIX VISION Build Here, and Go Anywhere SUMMARY Key trends are driving the need for a single interconnection platform for digital business On the Equinix global interconnection platform

More information

Association of Corporate Counsel

Association of Corporate Counsel Type in document reference # if needed Privacy protection in a Globalized World Association of Corporate Counsel New York, 24 March 2015 1 The plan Bringing out the main cross-border privacy issues for

More information

THE PLATFORM EQUINIX VISION

THE PLATFORM EQUINIX VISION THE PLATFORM EQUINIX VISION Build Here, and Go Anywhere SUMMARY Key trends are driving the need for a single interconnection platform for digital business On the Equinix global interconnection platform

More information

EY Cyber Response Services. Plan. React. Recover.

EY Cyber Response Services. Plan. React. Recover. EY Cyber Response Services Plan. React. Recover. Insurance claim preparation Data recovery How EY can help Data privacy and GDPR compliance Cyber planning Our full suite of cyber capabilities Litigation

More information

LEVEL 3 SM WEBSITE ACCELERATION SERVICES

LEVEL 3 SM WEBSITE ACCELERATION SERVICES LEVEL 3 SM WEBSITE ACCELERATION SERVICES WEBSITE CONSUMERS ARE IMPATIENT, which makes your website performance extremely critical. Whether you are delivering content to a desktop, tablet or mobile device,

More information

HOT TOPICS IN DATA PRIVACY REGULATION IN RUSSIA

HOT TOPICS IN DATA PRIVACY REGULATION IN RUSSIA HOT TOPICS IN DATA PRIVACY REGULATION IN RUSSIA Ksenia Andreeva Anastasia Dergacheva Vasilisa Strizh November 27, 2018 2018 Morgan, Lewis & Bockius 2017 Morgan, Lewis & Bockius Contents News from the Russian

More information

Enterprise Case Study

Enterprise Case Study REUTERS / Stefano Rellandini Enterprise Case Study The Future of Your WAN Dimitrios Voutsinas Head of Network Design and Development About Thomson Reuters We are the leading source of intelligent information

More information

Building Interconnection 2017 Steps Taken & 2018 Plans

Building Interconnection 2017 Steps Taken & 2018 Plans Building Interconnection 2017 Steps Taken & 2018 Plans 2017 Equinix Inc. 2017 Key Highlights Expansion - new markets Launch - Flexible DataCentre Hyperscaler edge Rollout - IXEverywhere - SaaS, IoT & Ecosystems

More information

Cyber Risk Services Going beyond limits

Cyber Risk Services Going beyond limits Cyber Risk Services Going beyond limits Current Threat Environment Security breaches: 318 Scanned websites with vulnerabilities: 78% Average identities exposed per breach: 1.3 Million Email malware rate

More information

MEDIA KIT 2018 CLOUDSCENE.COM

MEDIA KIT 2018 CLOUDSCENE.COM MEDIA KIT 2018 CLOUDSCENE.COM THE WORLD'S LARGEST CLOUD DIRECTORY Founded by serial tech entrepreneur, Bevan Slattery, Cloudscene is the world's largest cloud directory and industry resource for the data

More information

Cloud Computing: Overcoming the Legal and Regulatory Challenges. November

Cloud Computing: Overcoming the Legal and Regulatory Challenges. November Cloud Computing: Overcoming the Legal and Regulatory Challenges November 2011 2 Cloud Computing: Overcoming the Legal and Regulatory Challenges November 2011 Cloud Computing Overcoming the Legal and Regulatory

More information

Congrès National Smart City 2018

Congrès National Smart City 2018 Congrès National Smart City 2018 Smart Canton Genève Quels enjeux de gouvernance? Gianfranco Moi Deputy Director General 4/12/2018 - Page 1 State of Geneva territory 4/12/2018 - Page 2 Smart City Index

More information

GDPR Privacy Webinar. Prioritizing Your Path towards GDPR Compliance Annika Sponselee and Nicole Vreeman 28 February 2018

GDPR Privacy Webinar. Prioritizing Your Path towards GDPR Compliance Annika Sponselee and Nicole Vreeman 28 February 2018 GDPR Privacy Webinar Prioritizing Your Path towards GDPR Compliance Annika Sponselee and Nicole Vreeman 28 February 2018 Prioritizing Your Path to GDPR Compliance Presented by Half-Day Workshops Online

More information

The Road to Industry 4.0. Secure Industrial Visibility

The Road to Industry 4.0. Secure Industrial Visibility The Road to Industry 4.0 Secure Industrial Visibility 2 The Road to Industry 4.0 3 Current situation Industrial digitization is a global trend. It gives insights to production, it reduces pro duction costs

More information

Why trading firms choose... Connexus Voice. For Traders

Why trading firms choose... Connexus Voice. For Traders Why trading firms choose... Connexus Voice For Traders Intelligent SIP based Voice Services Financial traders need instant connectivity to their counterparties, and private Connexus Voice circuits provide

More information

Pink Elephant s Critical Success Factors for Successful IT Service Management. Pink Elephant Leading The Way In IT Management Best Practices

Pink Elephant s Critical Success Factors for Successful IT Service Management. Pink Elephant Leading The Way In IT Management Best Practices Pink Elephant s Critical Success Factors for Successful IT Service Management Pink Elephant Leading The Way In IT Management Best Practices Critical Success Factors For Successful ITSM 1. 2. 3. 4. 5. 6.

More information

Smarter Phones, Smarter Moves

Smarter Phones, Smarter Moves Smarter Phones, Smarter Moves The $200 billion mobile phone industry has reached a watershed moment. The rise of the smartphone iphone, Droid, Galaxy has pushed some handset makers to find new ways to

More information

Technical Guide for Offshore Institutions to access China Foreign Exchange Trade System

Technical Guide for Offshore Institutions to access China Foreign Exchange Trade System Technical Guide for Offshore Institutions to access China Foreign Exchange Trade System V1.0 September 2015 Table of Contents Technical Guide for Offshore Institutions to access... 1 1. Introduction...

More information

IBM Innovation Centre BeNeLux

IBM Innovation Centre BeNeLux ISV & Developer Relations IBM Innovation Centre BeNeLux Overview Frans Baas Frans_Baas@nl.ibm.com Innovation According to the dictionary: in no va tion The act of introducing something new. Something newly

More information

egensburg, February 1st, 2005

egensburg, February 1st, 2005 FCOS Press Briefing Giesecke & Devrient at a glance Christian Jüttner Vice President Strategic Marketing Regensburg, February 1st, 2005 Our Vision: Giesecke & Devrient as the technology and global leader

More information

Your Cloud Strategy Demands a Strong Network Strategy

Your Cloud Strategy Demands a Strong Network Strategy Your Cloud Strategy Demands a Strong Network Strategy An Executive Brief Sponsored by GTT January 2015 Roopashree (Roopa) Honnachari Industry Director Business Communication Services & Cloud Computing

More information

The IBM Platform Computing HPC Cloud Service. Solution Overview

The IBM Platform Computing HPC Cloud Service. Solution Overview The IBM Platform Computing HPC Cloud Service Solution Overview Industry-leading workload management 20 years managing distributed scale-out systems with 2000+ customers in many industries High performance

More information

Nexcenter Providing world-class quality and full support Global x Non-stop data center service

Nexcenter Providing world-class quality and full support Global x Non-stop data center service Data Center Nexcenter Providing world-class quality and full support Global x Non-stop data center service NTT Communications Corporation Website http://www.ntt.com http://www.ntt.com/nexcenter About NTT

More information

Managed Hosting Services

Managed Hosting Services PRODUCT OVERVIEW Managed Hosting Services A Portfolio of Managed Hardware, Application and Monitoring Services Tailored to Your Unique IT Requirements 1 CenturyLink VoIP Solutions 2 PRODUCT OVERVIEW Managed

More information

PLAN EARLY FOR DATA ERASURE... ISN T MANAGEMENT BOARD DATA MORE SENSITIVE THAN SALES DATA?

PLAN EARLY FOR DATA ERASURE... ISN T MANAGEMENT BOARD DATA MORE SENSITIVE THAN SALES DATA? erasure CERTIFIED DATA ERASURE: CUSTOMIZED, SECURE, EFFICIENT. PLAN EARLY FOR DATA ERASURE... ISN T MANAGEMENT BOARD DATA MORE SENSITIVE THAN SALES DATA? PAGE 03 Plan early for data erasure...... TO MAXIMIZE

More information

Data Center. Nexcenter Providing world-class quality and full-support Global x Non-stop data center service

Data Center. Nexcenter Providing world-class quality and full-support Global x Non-stop data center service Data Center Nexcenter Providing world-class quality and full-support Global x Non-stop data center service Consistent contracting worldwide with the ability to distribute workloads globally. Quality Supporting

More information

Security and networks

Security and networks Security and networks Creating a secure business in a hyper connected world SHIV K. BAKHSHI, PH.D. VP, INDUSTRY RELATIONS, GROUP FUNCTION TECHNOLOGY ITU Regional workshop, Algiers, Algeria, FeBruary 12,

More information

Cloud Computing - Reaping the Benefits and Avoiding the Pitfalls. Stuart James & Delizia Diaz. Intellectual Property & Technology Webinar

Cloud Computing - Reaping the Benefits and Avoiding the Pitfalls. Stuart James & Delizia Diaz. Intellectual Property & Technology Webinar Intellectual Property & Technology Webinar Cloud Computing - Reaping the Benefits and Avoiding the Pitfalls Stuart James & Delizia Diaz 37 Offices in 18 Countries Birmingham Wednesday, 11 July 2012 Speakers

More information

HKTDC The World's Full-Service Trade Promotion Organisation

HKTDC The World's Full-Service Trade Promotion Organisation HKTDC The World's Full-Service Trade Promotion Organisation The Hong Kong Trade Development Council (HKTDC) creates opportunity by promoting the global trade of goods and services, and connecting the world

More information

FDA Releases FSMA Final Rule on Accreditation of Third Party Certification Bodies

FDA Releases FSMA Final Rule on Accreditation of Third Party Certification Bodies Hogan Lovells US LLP Columbia Square 555 Thirteenth Street, NW Washington, DC 20004 T +1 202 637 5600 F +1 202 637 5910 www.hoganlovells.com MEMORANDUM From: Joseph A. Levitt Elizabeth Barr Fawell Maile

More information

GDPR and digital advertising: Strategies and best practices for implementing GDPR compliance

GDPR and digital advertising: Strategies and best practices for implementing GDPR compliance IP, Tech & Data GDPR and digital advertising: Strategies and best practices for implementing GDPR compliance Presented by: Gerard M. Stegmaier, Partner, Washington, D.C. October 17, 2018 What is GDPR,

More information

Getting to Data Nirvana Data lakes and GDPR

Getting to Data Nirvana Data lakes and GDPR Getting to Data Nirvana Data lakes and GDPR A User's guide 1 Hogan Lovells Data lakes and GDPR: A User's guide 3 Copyright 2018. This report is the property of Hogan Lovells and may not be published or

More information

Opportunities for Action in Technology and Communications. Mobile Payments: Killer App or Paper Tiger?

Opportunities for Action in Technology and Communications. Mobile Payments: Killer App or Paper Tiger? Mobile Payments TC 8/01 9/6/01 11:33 AM Page 1 Opportunities for Action in Technology and Communications Mobile Payments: Killer App or Paper Tiger? Mobile Payments: Killer App or Paper Tiger? Just how

More information

One Planet. One Network. Infinite Possibilities.

One Planet. One Network. Infinite Possibilities. One Planet. One Network. Infinite Possibilities. IPv6 in the Global Crossing IP Network May 26, 2005 Ed Bursk, Vice President Government Global Crossing Overview Global Crossing was founded seven years

More information

IPC Financial Markets Network

IPC Financial Markets Network Why trading firms choose... IPC Financial Markets Network worldwide connectivity you can count on throughout the trade lifecycle Strength for Voice and and Data Services Today s trading global, faster,

More information

SMART CITIES AND BIG DATA: CHALLENGES AND OPPORTUNITIES

SMART CITIES AND BIG DATA: CHALLENGES AND OPPORTUNITIES SMART CITIES AND BIG DATA: CHALLENGES AND OPPORTUNITIES EUROPEAN UTILITY WEEK NOVEMBER 5, 2014 ERIC WOODS RESEARCH DIRECTOR 2014 Navigant Consulting, Inc. Notice: No material in this publication may be

More information

Overview of IBM Cloud Services and Academic Initiatives Driving Better Student Outcomes from a Better Cloud and Technology Partner

Overview of IBM Cloud Services and Academic Initiatives Driving Better Student Outcomes from a Better Cloud and Technology Partner Overview of IBM Cloud Services and Academic Initiatives Driving Better Student Outcomes from a Better Cloud and Technology Partner Lysa Banks Lead Architect and Program Manager for Industry Cloud Solutions

More information

Effective Partnerships: Security and Privacy in Smart Cities

Effective Partnerships: Security and Privacy in Smart Cities SESSION ID: SEC-R03 Effective Partnerships: Security and Privacy in Smart Cities Mr. Robert (Bob) Butler Chief Security Advisor IO Data Centers LLC Dr. Irv Lachow Principal Cyber Researcher The MITRE Corporation

More information

The Mission of the Abu Dhabi Smart Solutions and Services Authority. Leading ADSSSA. By Michael J. Keegan

The Mission of the Abu Dhabi Smart Solutions and Services Authority. Leading ADSSSA. By Michael J. Keegan Perspective on Digital Transformation in Government with Her Excellency Dr. Rauda Al Saadi, Director General, Abu Dhabi Smart Solutions and Services Authority By Michael J. Keegan Today s digital economy

More information

LinkedIn Economic Graph Project

LinkedIn Economic Graph Project LinkedIn Economic Graph Project Understanding Trade Through International Connections In Partnership with the Ontario Ministry of International Trade FEBRUARY 8 The Economic Graph as a Tool to Advance

More information

Hello! We focus on service design & strategy combined with digital product creation

Hello! We focus on service design & strategy combined with digital product creation Hello! we are Fjord 01 Hello we are Fjord 02 What is service Design 03 Fjord s Design rule of 3 04 Design for public sector 05 Design By Prototyping: Red Cross case 06 Designs Methods Presentation Name

More information

Innovative and Flexible financing. for the New Economy C APITAL. The Leader in End-to-End Financial Services for Your Network Investments

Innovative and Flexible financing. for the New Economy C APITAL. The Leader in End-to-End Financial Services for Your Network Investments C APITAL The Leader in End-to-End Financial Services for Your Network Investments Cisco Systems Capital (Australia) Pty Limited Innovative and Flexible financing for the New Economy Challenges Constrained

More information

At Home in the Cloud The Emerging Opportunity for Telecom Operators

At Home in the Cloud The Emerging Opportunity for Telecom Operators Perspective Peter Weichsel Jens Niebuhr Germar Schroeder Dany Sammour At Home in the Cloud The Emerging Opportunity for Telecom Operators Contact Information Beirut Bahjat El Darwiche +961-1-985-655 bahjat.eldarwiche@booz.com

More information

Disclaimer This presentation may contain product features that are currently under development. This overview of new technology represents no commitme

Disclaimer This presentation may contain product features that are currently under development. This overview of new technology represents no commitme LHC2673BU Clearing Cloud Confusion Nick King and Neal Elinski #VMworld #LHC2673BU Disclaimer This presentation may contain product features that are currently under development. This overview of new technology

More information

Introducing OSIsoft. Presented by Zsolt Oros, Regional Manager DACH & EE

Introducing OSIsoft. Presented by Zsolt Oros, Regional Manager DACH & EE Introducing OSIsoft Presented by Zsolt Oros, Regional Manager DACH & EE Who we are? Copyr i ght 2014 O SIs oft, LLC. 2 OSIsoft is a company with a focus One System. Singular focus. 1980 20% Founded Revenue

More information

Value of Urban Data. Using Data to Empower Cities and Citizens. Petr Suska Senior Project Manager. Brussels, May 30th. Fraunhofer IAO.

Value of Urban Data. Using Data to Empower Cities and Citizens. Petr Suska Senior Project Manager. Brussels, May 30th. Fraunhofer IAO. Value of Urban Data Using Data to Empower Cities and Citizens Brussels, May 30th Fraunhofer 1 Petr Suska Senior Project Manager Fraunhofer IAO Profile of the Fraunhofer Society Founded: 1949 about 24,000

More information

Cybersecurity. The Board s Role

Cybersecurity. The Board s Role Board Practice Cybersecurity The Board s Role There are two kinds of big companies in the United States. There are those who ve been hacked and those who don t know they ve been hacked. james comey former

More information

Cisco Collaborative Knowledge

Cisco Collaborative Knowledge Cisco Collaborative Knowledge Product Overview. Your workforce needs knowledge, speed and flexibility to solve real-world business challenges in today s fast moving digital economy. Cisco Collaborative

More information

MARKETING ALLIANCE MEDIA KIT 2016/17

MARKETING ALLIANCE MEDIA KIT 2016/17 1 MARKETING ALLIANCE MEDIA KIT 2016/17 2 Our Audience Social Media over 2.5 million C-Level Executives, NGOs, and business owners Our Magazines Featured on itunes and Google Play and promoted through our

More information

about us bandwidth changes everything

about us bandwidth changes everything about us bandwidth changes everything bandwidth changes everything We are a facilities based bandwidth infrastructure provider, delivering scalable, fibre based network solutions to our customers across

More information

HOT CONSUMER TRENDS Michael Björn PhD, Head of Research Ericsson ConsumerLab

HOT CONSUMER TRENDS Michael Björn PhD, Head of Research Ericsson ConsumerLab HOT CONSUMER TRENDS 2016 Michael Björn PhD, Head of Research Ericsson ConsumerLab Ericsson ConsumerLab REPRESENTING 1.1 billion 100,000 PEOPLE RESPONDENTS/YEAR Ericsson AB 2015 2016-11-10 Page 2 40 MORE

More information

NetIQ User Conferentie NetIQ Update. Travis Greene Chief Service Management Strategist

NetIQ User Conferentie NetIQ Update. Travis Greene Chief Service Management Strategist NetIQ Update Travis Greene Chief Service Strategist About NetIQ Strength, Leadership and Innovation NetIQ, An Attachmate Business One of the top 25 software companies in the world Thousands of customers,

More information

T2S VANSP. End-to-end solutions for state-of-the-art connectivity and messaging

T2S VANSP. End-to-end solutions for state-of-the-art connectivity and messaging T2S VANSP End-to-end solutions for state-of-the-art connectivity and messaging A next-generation, T2S-ready solution......with the lowest total cost of ownership. SIA-Colt enable CSDs, central banks and

More information

ADDRESSING CLIMATE FROM THE GROUND UP

ADDRESSING CLIMATE FROM THE GROUND UP E2 Environmental Entrepreneurs ADDRESSING CLIMATE FROM THE GROUND UP Jamie Ponce Chicago City Director, C40 Cities Climate Leadership Group 21-February-2014 The C40 Cities Climate Leadership Group is a

More information

Considerations to be made on the path to Self-Maintenance

Considerations to be made on the path to Self-Maintenance Considerations to be made on the path to Self-Maintenance Consider the benefits of having HP Technology Services provide support for your HP equipment 2007 Hewlett-Packard Development Company, L.P. The

More information

CRE investment weakens in Q as investors struggle to find product in prime markets

CRE investment weakens in Q as investors struggle to find product in prime markets 2006.3 2007.1 2007.3 2008.1 2008.3 2009.1 2009.3 2010.1 2010.3 2011.1 2011.3 2012.1 2012.3 2013.1 2013.3 2014.1 2014.3 2015.1 2015.3 2016.1 Europe Capital Markets, Q1 2016 CRE investment weakens in Q1

More information

The Value of Urban Data Petr Suska, Fraunhofer IAO, 30th OCT, 2017 New Delhi

The Value of Urban Data Petr Suska, Fraunhofer IAO, 30th OCT, 2017 New Delhi The Value of Urban Data Petr Suska, Fraunhofer IAO, 30th OCT, 2017 New Delhi Fraunhofer 1 Profile of the Fraunhofer Society Founded: 1949 about 24,000 staff 66 institutes and research units Fraunhofer

More information

Titolo della presentazione 1

Titolo della presentazione 1 GLOBAL FORUM 2003 Introducing stance Rome, November 6th, 2003 2 Why TI Sparkle: to strengthen TI s international position by leveraging on foreign assets and capabilities Introducing Understanding the

More information

Getting started with AWS security

Getting started with AWS security Getting started with AWS security Take a prescriptive approach Stephen Quigg Principal Security Solutions Architect 2016, Amazon Web Services, Inc. or its Affiliates. All rights reserved. Why is enterprise

More information

BlackBerry UEM is a Wise Investment for ABANCA

BlackBerry UEM is a Wise Investment for ABANCA Case Study BlackBerry UEM is a Wise Investment for ABANCA The Organization Company ABANCA Industry Banking Employees 2,000 Location A Coruña, Spain Products BlackBerry UEM http://www.abanca.com Born in

More information

Sectors within Investment Promotion

Sectors within Investment Promotion Sectors within Investment Promotion ICT CleanTech Life Science Hospitality Infra/Construction Communication systems Mobile terminal software Industrial IT Positioning and GIS Visualization Data Centers

More information

Incentives for IoT Security. White Paper. May Author: Dr. Cédric LEVY-BENCHETON, CEO

Incentives for IoT Security. White Paper. May Author: Dr. Cédric LEVY-BENCHETON, CEO White Paper Incentives for IoT Security May 2018 Author: Dr. Cédric LEVY-BENCHETON, CEO Table of Content Defining the IoT 5 Insecurity by design... 5 But why are IoT systems so vulnerable?... 5 Integrating

More information

"Home to the Cloud" e-shelter Marktplatz für eine Hybride und Multi-Cloud Welt Toan Nguyen, e-shelter

Home to the Cloud e-shelter Marktplatz für eine Hybride und Multi-Cloud Welt Toan Nguyen, e-shelter "Home to the Cloud" e-shelter Marktplatz für eine Hybride und Multi-Cloud Welt Toan Nguyen, e-shelter 1 The e-shelter quality promise we leverage our powerful data center platform to deliver top-class

More information

Choosing the Right Cloud Computing Model for Data Center Management

Choosing the Right Cloud Computing Model for Data Center Management Choosing the Right Cloud Computing Model for Data Center Management www.nsi1.com NETWORK SOLUTIONS INCOPORATED NS1.COM UPDATING YOUR NETWORK SOLUTION WITH CISCO DNA CENTER 1 Section One Cloud Computing

More information

Why is Office 365 the right choice?

Why is Office 365 the right choice? Why is Office 365 the right choice? People today want to be productive wherever they go. They want to work faster and smarter across their favorite devices, while staying current and connected. Simply

More information

SAP Security Remediation

SAP Security Remediation SAP Security Remediation Three Steps for Success Using SAP GRC Internal Audit, Risk, Business & Technology Consulting Introduction All companies need strong application security environments as part of

More information

Certificate. Certificate number: b. Certified by EY CertifyPoint since: April 15, 2016

Certificate. Certificate number: b. Certified by EY CertifyPoint since: April 15, 2016 Certificate Certificate number: 2016-004b Certified by EY CertifyPoint since: April 15, 2016 Based on certification examination in conformity with defined requirements in ISO/IEC 17021-1:2015 and ISO/IEC

More information

GreinTech Software Andrew Schrijver Jesse Suchoff Gregory Maugeri

GreinTech Software Andrew Schrijver Jesse Suchoff Gregory Maugeri GreinTech Software Andrew Schrijver Jesse Suchoff Gregory Maugeri November 7, 2017 Executive Summary Firm Profile Current Global Footprint Risk Identification and Exposure Proposed Solutions GreinTech:

More information

13.f Toronto Catholic District School Board's IT Strategic Review - Draft Executive Summary (Refer 8b)

13.f Toronto Catholic District School Board's IT Strategic Review - Draft Executive Summary (Refer 8b) AGENDA ADDENDU TE REGULAR EETING OF TE AUDIT COITTEE COITTEE PUBLIC SESSION Tuesday, June 6, 2017 6:30 P.. Pages 13. Staff Reports 13.f Toronto Catholic District School Board's IT Strategic Review - Draft

More information

Canada Highlights. Cybersecurity: Do you know which protective measures will make your company cyber resilient?

Canada Highlights. Cybersecurity: Do you know which protective measures will make your company cyber resilient? Canada Highlights Cybersecurity: Do you know which protective measures will make your company cyber resilient? 21 st Global Information Security Survey 2018 2019 1 Canada highlights According to the EY

More information

FACT SHEET. Asia Pacific AUSTRALIA (Sydney) - INDIA (New Delhi) - JAPAN (Tokyo) - SINGAPORE

FACT SHEET. Asia Pacific AUSTRALIA (Sydney) - INDIA (New Delhi) - JAPAN (Tokyo) - SINGAPORE Corporate Name DOCOMO Digital FACT SHEET Management Foundation 2009 Locations Employees +800 Hiroyuki Sato, CEO Corporate Headquarters London, United Kingdom DOCOMO Digital s staff serves clients around

More information

Métro service disruptions

Métro service disruptions Métro service disruptions Carl Desrosiers Chief Executive Officer Dominique Lemay Executive Director, Métro services May 30, 2013 A few figures for 2012 412.6 million passenger rides in 2012, a 1.9% increase

More information

This page intentionally left blank

This page intentionally left blank Database Concepts This page intentionally left blank Database Concepts Seventh Edition David M. Kroenke David J. Auer Western Washington University Boston Columbus Indianapolis New York San Francisco Hoboken

More information

Perspective. Rainer Bernnat Wolfgang Zink Nicolai Bieber Joachim Strach. Standardizing the Cloud A Call to Action

Perspective. Rainer Bernnat Wolfgang Zink Nicolai Bieber Joachim Strach. Standardizing the Cloud A Call to Action Perspective Rainer Bernnat Wolfgang Zink Nicolai Bieber Joachim Strach Standardizing the Cloud A Call to Action Contact Information Atlanta Ralph Alewine +1-404-519-0184 ralph.alewine@booz.com Beirut Ramez

More information

SPAD 502DL Plus Chlorophyll Meter DATA LOGGER MANUAL

SPAD 502DL Plus Chlorophyll Meter DATA LOGGER MANUAL SPAD 502DL Plus Chlorophyll Meter DATA LOGGER MANUAL Item # 2900PDL CONTENTS General Overview 2 Quick Start Guide 3 Identifying the Correct Com Port 4 GPS Connection 5 Data Logger Operation 7 Data Files

More information

SMB Cloud InsightsTM

SMB Cloud InsightsTM 2015 SMB Cloud InsightsTM CHINA DEFINITIONS Cloud Services Defined This research focuses on the cloud services that matter most to SMBs: IaaS, web presence and web applications, unified communications,

More information

PRODUCT OVERVIEW. Storage and Backup. Flexible Scalable Storage Solutions for. Product Overview. Storage and Backup

PRODUCT OVERVIEW. Storage and Backup. Flexible Scalable Storage Solutions for. Product Overview. Storage and Backup PRODUCT OVERVIEW Flexible Scalable Storage Solutions for Today s Data Driven Businesses 1 2 PRODUCT OVERVIEW Summary Data is essential in driving business and the sheer amount of it for any enterprise

More information

Lifesize Cloud-based Service Architecture. A comprehensive guide

Lifesize Cloud-based Service Architecture. A comprehensive guide Lifesize Cloud-based Service Architecture A comprehensive guide Reference Paper November 2017 A service built to provide a connected experience, running on a platform built to perform that s the Lifesize

More information

Most enterprises rank network security and end-to-end SLAs as the top two critical features for cloud enablement.

Most enterprises rank network security and end-to-end SLAs as the top two critical features for cloud enablement. GET AHEAD IN THE CLOUDS MARKET CONTEXT Cloud is now the default deployment model for any new enterprise application or workload. Over 95% of large enterprises report using some form of public or private

More information

Empowering a Digital Europe. Vincent Pang President of Western European Region, Huawei

Empowering a Digital Europe. Vincent Pang President of Western European Region, Huawei Empowering a Digital Europe Vincent Pang President of Western European Region, Huawei Agenda Partnering in Digital Infrastructure Cultivating Digital Innovation Contributing to Digital Ecosystem Local

More information

Private cloud for business

Private cloud for business Private cloud for business Your IT Everywhere, Always. Executive summary The business challenge of IT The evolution in IT has resulted in extreme specialization that reaches into all areas of business.

More information

HP Education Services Bulgaria

HP Education Services Bulgaria HP Education Services Bulgaria 7 th October 2009 Maia Hristova 2008 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice Agenda HP Training Center

More information

white paper SMS Authentication: 10 Things to Know Before You Buy

white paper SMS Authentication: 10 Things to Know Before You Buy white paper SMS Authentication: 10 Things to Know Before You Buy SMS Authentication white paper Introduction Delivering instant remote access is no longer just about remote employees. It s about enabling

More information

Beyond smartphone shopping the rise of smart assistants

Beyond smartphone shopping the rise of smart assistants Beyond smartphone shopping the rise of smart assistants Ericsson Consumer & IndustryLab May 2018 Smartphone shopping will peak globally the next disruption is AI-assisted shopping New York San Francisco

More information

Business Driven Data Communications

Business Driven Data Communications Business Driven Data Communications Michael S. Gendron PEARSON Boston Columbus Indianapolis New York San Francisco Upper Saddle River Amsterdam Cape Town Dubai London Madrid Milan Munich Paris Montreal

More information

Intelligent Networking: Deliver an Optimal Experience at Lower Costs

Intelligent Networking: Deliver an Optimal Experience at Lower Costs White Paper Intelligent Networking: Deliver an Optimal Experience at Lower Costs Regardless of the size of your branch offices, your remote locations now require the same network performance as the headquarters.

More information

Data Product Offerings worldwide connectivity you can count on throughout the trade lifecycle

Data Product Offerings worldwide connectivity you can count on throughout the trade lifecycle Why trading firms choose... IPC Data Product Offerings worldwide connectivity you can count on throughout the trade lifecycle Data Connectivity Services IPC s portfolio of Data Network Services Take a

More information

Certificate. Certificate number: b. Certified by EY CertifyPoint since: May 11, 2012

Certificate. Certificate number: b. Certified by EY CertifyPoint since: May 11, 2012 Certificate Certificate number: 2012-001b Certified by EY CertifyPoint since: May 11, 2012 Based on certification examination in conformity with defined requirements in ISO/IEC 17021-1:2015 and ISO/IEC

More information

EY Consulting. Is your strategy planning for the future or creating it? #TransformativeAge

EY Consulting. Is your strategy planning for the future or creating it? #TransformativeAge 2018 Ernst & Young Advisory. All rights reserved. Graphics studio France 1802SG1267. ED 04082018 EY Consulting Is your strategy planning for the future or creating it? #TransformativeAge The better the

More information

SAP Cloud Peering Safely and Swiftly Through the Clouds

SAP Cloud Peering Safely and Swiftly Through the Clouds SAP Cloud Peering Safely and Swiftly Through the Clouds Christian Stoeffler, SAP DE-CIX Summit, October 2017 INTERNAL Agenda Cloud and Interconnection Today: SAP Cloud Peering SAP s vision and strategy

More information

Create an ideal business environment

Create an ideal business environment Create an ideal business environment that is safe, productive, profitable and green Office Building Management Solutions Please all of the people all of the time Different tenants have different needs

More information

Guide Series. How to upgrade to Microsoft Windows 10? Guide Series

Guide Series. How to upgrade to Microsoft Windows 10? Guide Series How to upgrade to Microsoft Windows 10? Acuutech All rights reserved 2016 1 Contents Introduction... 2 Why use Windows 10?... 3 What are the advantages of Windows 10?... 4 Windows 10 editions comparison...

More information

Lifesize Cloud, Architecture. A comprehensive guide

Lifesize Cloud, Architecture. A comprehensive guide Lifesize Cloud, Architecture A comprehensive guide Reference Paper July 2016 A service built to provide a connected experience, running on a platform built to perform that s Lifesize Cloud, powered by

More information

Certificate. Certificate number: a. Certified by EY CertifyPoint since: May 11, 2012

Certificate. Certificate number: a. Certified by EY CertifyPoint since: May 11, 2012 Certificate Certificate number: 2012-001a Certified by EY CertifyPoint since: May 11, 2012 Based on certification examination in conformity with defined requirements in ISO/IEC 17021-1:2015 and ISO/IEC

More information

Future of the Data Center

Future of the Data Center Future of the Data Center Maine Digital Government Summit November 29, 2012 Dan Diltz Vice President, Public Sector 1 Session Description A new data center is the perfect opportunity to start fresh by

More information

HPE Partner Ready Digital Marketing Program

HPE Partner Ready Digital Marketing Program HPE Partner Ready Digital Marketing Program Accelerating your digital marketing proficiency and execution to drive business growth Collaborate Get started Table of Contents Changing B2B Buyer Behavior

More information

Storage as a Service From Hitachi Vantara

Storage as a Service From Hitachi Vantara Storage as a Service From Hitachi Vantara Cost-Effectively Manage Your Storage Needs SOLUTION PROFILE Companies are increasingly looking for ways to lower the cost of IT management. Capital expenditure

More information

PageUp Streamlined Its Review & Approval Process 200% Faster with Hoosh s Newly Upgraded Template Builder - CommsBuddy.

PageUp Streamlined Its  Review & Approval Process 200% Faster with Hoosh s Newly Upgraded  Template Builder - CommsBuddy. PageUp Streamlined Its Review & Approval Process 200% Faster with Hoosh s Newly Upgraded Template Builder - CommsBuddy The company PageUp is a cloud-based HR talent management software provider that enables

More information

Mobile Video Conferencing has Arrived:

Mobile Video Conferencing has Arrived: Mobile Video Conferencing has Arrived: Extending the Reach of Rich Collaboration Anytime, Anywhere A Frost & Sullivan White Paper frost.com Mobility Opens Up Ubiquitous Video Conferencing Capabilities...

More information

CYBERCRIMES IN THE UAE PHISHING, HACKING AND DATA LEAKS

CYBERCRIMES IN THE UAE PHISHING, HACKING AND DATA LEAKS CYBERCRIMES IN THE UAE PHISHING, According to the Economist, the world's most valuable resource is no longer oil, but data. The aim of cybercrimes such as phishing and hacking is essentially to gain access

More information