byod-news-roundup

Today’s BYOD news roundup takes a look at some of the legal wrinkles that come up when an organization lets its employees bring their own devices for work, some ways to simplify your BYOD security policy, and the fact that when people bring their own devices, they bring along with them their own cloud app accounts, something that many IT departments have ignored.

BYOD and the law

byod-and-the-law

The recently-held Enterprise Connect Orlando 2014 conference featured a session titled Assessing the Legal Issues Around BYOD, which looked at the  sort of legal exposure that companies with BYOD programs could face. Among the risks and potential liabilities covered in the session were:

  • Lost or stolen devices. The top concern in InformationWeek’s 2013 State of Mobile Security Survey and IT directors everywhere, a misplaced smartphone or tablet can give a malicious party the “keys to the kingdom”, either in the form of sensitive data or unauthorized access to corporate resources. The former can be dealt with through virtualization technologies that keep sensitive data in the cloud and off the device, while access control technologies such as mandatory passcodes  can help prevent the latter.
  • Mis-wipes. Many companies rely on Microsoft Exchange ActiveSync or IBM Notes Traveler for the ability to remotely wipe employee devices, but they’re blunt tools that completely wipe the device clean of all data, both corporate and personal. A number of EMM and containerization solutions make it possible to limit the wipe to just the corporate data, preserving personal information, including irreplaceable stuff such as personal photos (I’ve seen a number of people whose only copy of their recordings of their child’s first steps or words live on their smartphone). Still, there’s always a chance that a remote wipe may be done in error or extend to include personal data, which may provide grounds for a suit. Users need to be educated about such possibilities and the importance of regular backups.
  • Surrender for ediscovery. Employees have to be informed that they will be required to surrender their mobile devices if they are required for electronic discovery — the process of identifying and collecting and producing electronically-stored data in the course of an investigation or lawsuit. Some organizations provide employees who have surrendered their devices for ediscovery with a “courtesy device”.
  • “Texting while driving”. An employee who gets into a car accident while using a mobile device for work — a business call, text message, or other use of the device — may end up making the employer liable, as it happened on company time and the employer is the involved party with the deepest pockets. The damage awards have been in the millions. Everyone on the session panel recommended an outright ban on mobile device use while driving, but as the article puts it: “About the best we can do in the mobility policy is include guidance regarding the safest ways to avoid all distractions while driving, point out which situations are most potentially hazardous, and suggest techniques for avoiding them.”

Other points made in the session:

  • Privacy. MDM helps mitigate a number of problems with BYOD, including legal ones, but many users resist it out of fear that it will let IT view personal information. Employers should make clear what IT can and can’t see on employee devices with MDM software, a topic we’ve covered earlier.
  • Penalties. Mobile policies are just words if the penalty provisions in them aren’t enforced, and in court, advertised but unenforced penalties will work against you.
  • Policy, buy-in, and knowing the limits. Your best defense against all sorts of BYOD trouble, legal and technical, is a combination of policy input and buy-in from various departments (legal, HR, security, line of business managers), and recognize the limits of enterprise mobility management technology.

Mobile technology as we know it is still a relatively new field — less than a decade old — as is the law surrounding their use. There aren’t many precedents yet, but with good planning, clear communication of policy, and judicious use of management technologies, you can avoid setting one of them.

5 ways to simplify your BYOD security policy

simplify-your-byod-policy

Business News Daily reports on PJ Gupta’s (CEO of Amtel, a mobile security solutions firm) five tips for success with BYOD security:

  1. Protect enterprise data and apps. This is the primary goal of workplace BYOD management, and requires both security policies and technologies.
  2. Secure the device. Mobile devices use for work are both stores of valuable corporate data and access to even more online. You need to be able to manage access to the device as well as data both on the devices and accessible via the device, and be able to disable the device if necessary.
  3. Ensure personal privacy. While control of BYOD devices is important, the device, along with some of the data and use cases, is the employee’s. Limit location tracking to case where the device is misplaced or stolen, avoid rigid policies in blacklisting and blocking apps, and ensure that personal data is not wiped from the device without employee consent and only when absolutely necessary.
  4. Use enterprise mobility management solutions. A good cloud-based EMM solution makes enrollment easy, protects against all manner of threats, and stays out of the user’s way.
  5. Monitor and take action. Device management works best with vigilance: real-time monitoring of data access and audit trails, automatic alerts, and analytics can reveal threats that can be acted upon before the situation becomes much worse.

BYOC?

bring-your-own-cloud

Another recent conference, the Cloud Innovation Forum in Saratoga, California, a panel discussion covered what its panelists felt was a new challenge: BYOC — Bring Your Own Cloud. As people have been bringing their own devices for work, they’ve also been using their own accounts with cloud-based applications and services. While IT departments have focused on the devices, the applications on them, as well as the cloud-based computing and storage resources those apps that they use also create their own issues, and they need to be reckoned with.

The article concludes with this paragraph:

When it comes to security, this means moving more of our resources out to applications rather than on physical infrastructure as “a lot of applications are in the cloud and it’s hard to manage security on the device in this BYOD world,” according to [panelist] Rai.

this article also appears in the GSG blog

{ 0 comments }

those old iphone connectors

…is that they established a pretty good grip on the phone, allowing for recharging in situations that would otherwise be impossible:

old-school iphone connectors

I’d still put something soft and cushiony under that dangling iPhone, just in case.

this article also appears in the GSG blog

{ 1 comment }

This week’s Tampa Bay tech meetups

by Joey deVilla on March 26, 2014

meetups

I’ll be at a couple of Accordion Bay tech meetups tomorrow, and I’ve compiled a list of upcoming area meetups as well…

Afternoon: Open Studio Hours at Microsoft

Local Microsoft Tech Evangelist Joe “devfish” Healy is hosting open studio hours at Microsoft’s Tampa offices (5426 Bay Center Drive), from 10:00 a.m. to 6:30 p.m., where people can drop in, visit, work on a project, socialize, play board games (Joe apparently stand undefeated at Carcassone), and do general co-work-y stuff. At 6:30 p.m., it turns into a board games meetup. Here’s the meetup page for this get-t0gether.

I’ll be there in the afternoon to say “hi” to Joe and get some work done, after which I’ll head to…

Evening: Suncoast iOS Meetup at American Business Center

The Suncoast iOS Meetup is having its meetup at American Business Center (8340 Ulmerton Rd. Suite 200, Largo) at 7:00 p.m., and the topic is “App Showcase and Open Discussions”. Here’s the meetup page for this get-together.

Other upcoming Tampa Bay area meetups include:

{ 0 comments }

wireless-wars

With smartphone ownership in the US hitting nearly 60% at the start of this year, and data usage among those smartphone users climbing, it’s only expected that the war between wireless carriers is heating up. In this installment of our regular look at the wireless carrier industry, we provide an introduction to the two major fronts what they’re fighting over: customers and spectrum.

The fight for customers

people-with-smartphones

The rise of the smartphone raised the stakes for wireless carriers, and as more people use them more often, and as more devices become wireless network-enabled, the carriers’ battle for your business has become more intense. In the open, the war’s about customers, as you’ve likely seen through the recent carrier advertising campaigns and promotions, many of which have been driven by T-Mobile’s recent “Uncarrier” approach. If you look at Pew Internet’s latest figure on wireless-enabled device ownership in the US (they update them regularly; the ones we’re citing are from January 2014), you can see why the fight’s becoming more intense:

  • 90% of American adults have a cell phone
  • 58% of American adults have a smartphone
  • 32% of American adults own an e-reader
  • 42% of American adults own a tablet computer

big-4-wireless-subscribers

Click the graph to see the source.

Currently, AT&T and Verizon are the two giants of the US wireless carriers, each about the same size, with AT&T at 110 million subscriptions and Verizon at 103 million. The next two, Sprint and T-Mobile, are about half the giants’ sizes, with 54 million and 47 million subscribers, respectively. Masayoshi Son, CEO of the Japanese telco Softbank and Chairman of Sprint, has announced that he’d love for Sprint to purchase T-Mobile, thereby creating a carrier whose subscriber base would be on the same order of magnitude as the Big Two. ”With scale merit,” said Son in a recent Sprint earnings call, “we don’t have to settle with No. 3. We can compete fiercely.” It’s an audacious plan, but most pundits say that it’s not likely to get approved by US regulators.

The fight for spectrum

radio-waves

Behind the scenes, the carriers are fighting for something else: spectrum — a range of radio frequencies assigned for use by wireless carriers for the transmission of voice and data. Each radio frequency in these bands is capable of carrying a certain amount of data at any given moment, and as more wireless users go online, the frequency becomes more crowded. This means that more users make use of a given frequency, it has to be divided among more people, giving each user a smaller “slice”, slowing data transmissions.

Luckily for the carriers, a block of frequencies will soon become available. The frequencies, which are in the range of 600 megahertz, are currently used by television stations, and the FCC is “voluntelling” the stations to yield them, and if they don’t, may move them to other frequencies. These frequencies are so desirable that the industry nickname for them is “beachfront property” because of their properties: they travel farther than radio waves in the frequencies currently used in the US (850 megahertz and 1900 megahertz), pass through buildings, hills, and vegetation better, and require fewer towers. Simply put, the 600 megahertz band offers better range, less dropped connections and is cheaper to operate.

This band of frequencies will soon be made available via auction to eligible parties. As of August 2012, AT&T and Verizon own about three-quarters of the lower-band frequencies, with Sprint owning 12%, and T-Mobile owning less than a percent. Sprint and T-Mobile’s radio spectrum is largely in higher-freqnecy bands, which can carry more data, and serve them well in population- and tower-dense city areas. However, corporate accountants view the lower frequencies as more valuable assets; in fact, Verizon’s accounts have their frequencies in their books as worth more than all their properties and equipment combined.

There’s considerable evidence that the auction, as currently set up, favors AT&T and Verizon, much to the chagrin of T-Mobile and Sprint. The stakes are high enough that the carriers have been spending considerable sums not just on lobbying, but influence. American University professor James Thurber, who’s been studying lobbying for three decades, says that the carriers have likely spent as much as $80 million — twice their lobbying spending — on behind-the-scenes promotions in which they give cash to PR firms, think tanks, “grassroots” and “toproots” organizations, academics, and other influencers, all in order to shift perceptions in their favour. This less-seen battle is covered in a recent Slate article that says that the future of wireless communication may be decided by a massive influence web of lobbyists, think tanks, and academics who are paid for their opinions.

this article also appears in the GSG blog

{ 0 comments }

If conference calls happened in real life

by Joey deVilla on March 25, 2014

conference-calls-real-life

Our line of work puts us right in the middle of the mobile and telecom industries, so it’s only natural that we work with a number of employees, suppliers, partners, and customers not just across the US, but around the world as well. As a result, a daily part of a lot of our lives — mine included — is the conference call.

Conference calls have many advantages, including allowing global teams to meet and collaborate, reducing travel time and costs, and creating the kind of “work anywhere, any time” flexibility that fits busy lives. They also have their disadvantages, which are sent up hilariously in this video by the comedy film duo of Tripp and Tyler, titled A Conference Call in Real Life:

this article also appears in the GSG blog

{ 0 comments }

It’s time to fix tech culture

by Joey deVilla on March 24, 2014

how to get rid of old people

Here’s a classic piece of not-so-savory tech culture. It’s a video featuring Jakob Lodwick, then a partner at Connected Ventures, the people behind CollegeHumor, Busted Tees and Vimeo, giving a grand tour of the office. He opens the tour by emphasizing that the office is full of “young, vibrant” people — he was in his twenties at the time. Around the 4:35 mark, the video goes deeper into the topic of “old people” — that they just don’t get the internet and can’t come up with new ideas. To help save your startup from the scourge of “The Olds”, Lodwick proceeds to give the viewer tips on how to use slinkies to get rid of old people, and even an example of how they harassed an older employee into leaving. After all, you need to replace them with young people with “vibrant new ideas” and who just oh-so-conveniently happen to be in Lodwick’s demographic:

It’s hard to tell how much of this in tongue–in-cheek — in fact, Lodwick himself may not be too sure how much of what he said is tongue-in-cheek. It’s part of the zeitgeist, in this age where not only young influential-if-douchey techies like Facebook CEO Mark Zuckerberg declare that “Young people are just smarter”, but even older ones as well: witness Dave Winer’s recent “Only hire young males, but I didn’t say it” piece, which he wrote at the sprightly age of 58. It highlights a long-standing problem in Silicon Valley: they’ve got an ageism problem, and it’s getting sillier.

Memo to Connected Ventures: Maybe it’s time to get this video taken down, for PR’s sake. Just sayin’.

geeks and botox

In a recent article in The New Republic titled The Brutal Ageism of Tech, there’s an interview with Dr. Seth Matarasso — described in the article as “a reality-show producer’s idea of a cosmetic surgeon”, who says “Love me, mean it,” instead of “goodbye” — who has a practice in San Francisco. A lot of his work lately has come from men in the tech industry who need to look younger in order to get ahead. Worse still, the men coming to see him are getting younger; he’s turned away applicants still in their twenties.

Hey, I’m no opponent of youthful vigor, but it’s not the only thing. There’s a lot to be said for being seasoned and having experience too. Besides, twenty-somethings creating products that twenty-somethings will buy may be profitable in the short term, but may turn out to be bad for products in the long run, as the New York Times points out.

noah kagan bitch slide

If it’s good not to be old in the Valley, it’s also good not to be a woman. From people using photos of their ex-girlfriends in presentations with their faces blotted out and replaced with the word “bitch”, to Julie Ann Horvath’s departure from GitHub, to the threats directed against Adria Richards, to the guys at Penny Arcade and their “Dickwolves” shenanigans, and the general formula for treating women in tech, it’s no wonder that PC’s Sascha Segan doesn’t want his daughter working in Silicon Valley.

gopman - lower part of society

If’s it’s not good to be old or a woman in the Valley, it’s also good not to be poor, and that’s “poor” from a techie’s point of view. From the Google Bus culture/class war to Greg Gopman’s Facebook rant about how the homeless won’t stay in their place (and the chorus of me-too’s) to Sarah Lacy’s unsympathetic view of the people who are too damn lazy to build a tech company and just operate public transit instead to know-nothing libertarian (which increasingly is losing its original intent and becoming “freedom for me, corporate control for thee”) suggestions that 911 emergency calls come with a charge of $100 to “weed out the noise”, there’s this growing notion in the Valley (and hey, Wall Street too) that bad bank balances mean bad character, that not getting paid nice techie wages is some kind of punishment for a moral failing.

There are enough stories about programmers being dicks that there’s a Tumblr called — wait for it – Programmers Being Dicks.

What’s it going to take for us to pull our own entitled heads out of our entitled asses? It’s going to take some effort, empathy — be sure to read Reg “raganwald” Braithwaite’s excellent piece on the subject — and the courage to speak out whenever this kind of dickery pops in our industry. It’s not easy, but hey, neither is programming, and we’re up for that challenge, right?

{ 8 comments }

The infographic below is just about a year old, but I missed it the first time around, and its information is still relevant. Its big point: the United States is experiencing the highest level of entrepreneurship in more than a decade:

who-are-us-entrepreneurs

Click the infographic to see it at full size.

gem 2012 us reportThe content of the infographic is a distillation of the Global Entrepreneurship Monitor’s (GEM) 2012 US Report, which says the US is seeing the highest level of entrepreneurship since 1999, when GEM first started producing these reports.

Having just joined an established entrepreneurial company and working from a home office in Florida, some observations in the report were of great interest to me. See if you can spot them:

  • Entrepreneurial activity hit 13% in 2012, the highest rate since GEM began recording it in 1999.
  • In 2012, more than 43% of Americans believed that there were good opportunities for entrepreneurship around them. In 2011, only about 23% believed this. Also, more than 56% of Americans believed that they had the capabilities to start a business.
  • US entrepreneurs participate in the business services sector to a higher degree than those in other economies, but the majority of entrepreneurs nonetheless operate in the consumer sector.
  • More than two-thirds of US entrepreneurs start at home, and 59% of established business owners continue to operate out of a home office.
  • More than one-fifth of American entrepreneurs surveyed employ a part-time employee, a family member, or an unpaid or volunteer person.
  • 30% of US entrepreneurs outsource some of their business activities.
  • In 2012, 37% of US entrepreneurs said they would add 5 or more employees in the next 5 years.
  • The median level of funding that American entrepreneurial businesses needed to start was US$15,000, with 82% of it coming from personal or “friends, family, and fools” sources.
  • US women continued to report lower levels of entrepreneurship — 7 women entrepreneurs for every 10 men — citing lower levels of intentions, less positive attitudes, and lower growth aspirations. The greatest disparities between men and women entrepreneurs were surprisingly not in the older age groups, but the younger ones. Women entrepreneurs were more likely to start with less funding (mostly from personal and family sources), less likely than men to be profitable at the established business stage, and nearly twice as likely to cite inadequate funding as the reason they stopped their businesses.
  • Younger entrepreneurs had the highest intentions; older entrepreneurs had the highest established business ownership.
  • First-generation immigrants had more positive attitudes towards entrepreneurship and were more likely to start or run a new business. 16% of 1st-gen immigrants did so, while 9% of 2nd-gen did (the rate for non-immigrants is 13%). “First-generation immigrant entrepreneurs,” says the report, “were highly opportunity-driven, educated and wealthy.”
  • The most entrepreneurial states in 2012 were Florida and Texas. The report says “Entrepreneurs in Florida displayed higher capability perceptions and risk taking; they were more often male, necessity-motivated, and low income, and had above-average levels of internationalization…Texas reported high opportunity perceptions and high entrepreneurship levels among women and youth.”

florida - america's entreprenurial state

{ 0 comments }