@Nathan due to the hurricane, my husband had to work remotely this week (that only worked for one day because then the power went out). But the company issued its own laptop for that and did not want access to take place from a personally owned device. It also issues the Blackberry, which blocks whatever the company usually blocks at work. I should mention it's a bank, and banks are extremely cautious in that regard.
@Mary, same here. I was sick all week with flu-like symptoms, and I worked remotely. Except for when I was recovered today and met with a potential customer. I like the option. Having worked at home for 5 1/2 years, however, I prefer the office, but with the option to get out of the office and work where I need to. Be it a coffee shop or at home when I need to.
You got it, Mary. The biggest one is my use if iCloud on my personal device. At my work it's a giant "no-no". Storing corporate data on an untrusted network. Plus I don't at all feel comfortable keeping in touch with work on a device I use for personal and entertainment. Just seems... creepy.
It's important to keep personal and work devices separate for a lot of reasons, but perhaps most importantly, work data is often subject to regulations that require it to be stored and accessible in certain ways. If personal data creeps in there, it could compromise the company in some industries (financial trading, for instance).
I'm going to disagree here. I think the propensity to work extra hours has more to do with the job itself than the technology. I speak from experience. I was overworking 20 years ago when I did not have an iPhone and could really only work well in my office, with the necessary tools. Today, the trend is away from exceeding business hours too much, and I'm fully equipped to work anywhere.
Work duties are handled on personal devices with some regularity. I don't think anyone is using personal devices to access company data so that's not an issue. I do see people using personal phones to communicate with clients and supervisors outside business hours.
The ThinkerNet does not reflect the views of TechWeb. The ThinkerNet is an informal means of communication to members and visitors of the Internet Evolution site. Individual authors are chosen by Internet Evolution to blog. Neither Internet Evolution nor TechWeb assume responsibility for comments, claims, or opinions made by authors and ThinkerNet bloggers. They are no substitute for your own research and should not be relied upon for trading or any other purpose.
In the 1970 science fiction thriller Colossus: The Forbin Project, two giant supercomputers from the United States and Soviet Union secretly join forces to take control of the collective nuclear might of the two countries. In the film, the two machines discover each other's existence, communicate back-and-forth, share their collective data, and cut their human creators out of the process. It is the ultimate example of machine-to-machine communications, or M2M.
In the fall of 2011, around 160,000 students in 190 countries enrolled in a Stanford-sponsored online course about artificial intelligence. About 23,000 completed the course and got certificates, including 248 who got a perfect score. The university offered the same course the old-fashioned way to students sitting in Stanford classrooms. None of the those students got a perfect score.
As Mitch Wagner discussed today, Yahoo is acquiring Tumblr. The big Internet debate at the moment is whether Tumblr will be good or bad for Yahoo. Regardless of their stances on the future of Yahoo itself, many claim that Yahoo will somehow ruin Tumblr.
The whole Amazon.reader debate is a double-stupid. It's stupid to think that there's any e-book buyer who doesn't know Amazon's URL, and it was stupider to let ICANN launch the whole free-form TLD initiative to start with.
Enterprises would like to move to cloud computing but are hesitant because they are concerned about providers’ ability to secure company data. Here are some tips that help to ensure that if breaches occur, the business is not left holding the bag.
Edmunds separates customers into segments based on the info it collects on its site and from partners, and uses that to push out custom content, said Brian Baron, director of business analytics for Edmunds.com, at Predictive Analytics Innovation Summit.
The automotive website uses propensity modeling to target ads and customer registration forms, said Brian Baron, director of business analytics for Edmunds.com, at Predictive Analytics Innovation Summit.
Expert Integrated Systems: Changing the Experience & Economics of IT In this e-book, we take an in-depth look at these expert integrated systems -- what they are, how they work, and how they have the potential to help CIOs achieve dramatic savings while restoring IT's role as business innovator. READ THIS eBOOK
your weekly update of news, analysis, and
opinion from Internet Evolution - FREE! REGISTER HERE
Wanted! Site Moderators Internet Evolution is looking for a handful of readers to help moderate the message boards on our site as well as engaging in high-IQ conversation with the industry mavens on our thinkerNet blogosphere. The job comes with various perks, bags of kudos, and GIANT bragging rights. Interested?