990 resultados para Bring Your Own Device (BYOD)


Relevância:

100.00% 100.00%

Publicador:

Resumo:

Imprese di piccole e grandi dimensioni hanno dovuto convivere con il ritmo di uscita di nuovi e più potenti modelli di PC, consolle per videogiochi, telefoni cellulari, tablet, fotocamere digitali. I cicli di vita si sono ridotti drasticamente, tanto da far sembrare un’emergenza il rilascio di un nuovo prodotto quasi ogni anno. Le aziende, se ancora non lo hanno fatto, sono chiamate ad affrontare una transizione interna per aggiornare le politiche aziendali in modo da stare al passo con il progresso tecnologico. Se un tempo le regole interne vietavano o scoraggiavano l’utilizzo di dispositivi personali nell’ambiente di lavoro, nell’era moderna sono costrette ad accettarlo se non addirittura ad incoraggiarlo ed il fenomeno che mi accingerò ad analizzare in questo elaborato, denominato Bring Your Own Device (BYOD), punta proprio all’esplorazione degli sforzi progettuali che sono richiesti ad una grande azienda multinazionale per poter recepire i trend informatici. Con più di cinque miliardi di dispositivi mobili in tutto il mondo – e solo 2 miliardi di computer – il passaggio al ‘mobile’ come forma principale di collegamento alle reti aziendali procede con sempre maggiore rapidità. Negli anni recenti si è potuto assistere all’evoluzione del panorama di dispositivi portatili che ha permesso ad un pubblico di users sempre più vasto di potersi permettere l’acquisto di dispositivi di ultima generazione a prezzi non proibitivi. I fornitori di tecnologie hanno confezionato prodotti sempre più pensati per un uso privato, fornendo un’ampia scelta di soluzioni non solo a livello enterprise, come accadeva agli albori del boom tecnologico, ma maggiormente rivolte al singolo consumatore. Guardando ai trend sviluppatisi negli anni recenti, è possibile riconoscere una scia di segnali che preannunciavano quanto sta avvenendo adesso con il BYOD.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

 The penetration of social networking platforms such as Facebook is becoming pervasive in education, along with mobile applications (apps) and mobile devices. Students are using these technologies and apps to organise their learning material. Social media via apps is the most popular activity among college students. In this paper we discuss how teachers could take advantage of Facebook social media platform to promote community-based-learning environment that is flexible, portable and challengeable. We describe how this could be achieved with no restriction to any particular mobile device brand or operating system and how student would simply bring their own device (BYOD).

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Using modern devices like smartphones and tablets offers a wide variety of advantages; this has made them very popular as consumer devices in private life. Using them in the workplace is also popular. However, who wants to carry around and handle two devices; one for personal use, and one for work-related tasks? That is why “dual use”, using one single device for private and business applications, may represent a proper solution. The result is “Bring Your Own Device,” or BYOD, which describes the circumstance in which users make their own personal devices available for company use. For companies, this brings some opportunities and risks. We describe and discuss organizational issues, technical approaches, and solutions.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Bring-your-own-device electronic examinations (BYOD e-exams) are a relatively new type of assessment where students sit an in-person exam under invigilated conditions with their own laptop. Special software restricts student access to prohibited computer functions and files, and provides access to any resources or software the examiner approves. In this study, the decades-old computer security principle that ‘software security depends on hardware security’ is applied to a range of BYOD e-exam tools. Five potential hacks are examined, four of which are confirmed to work against at least one BYOD e-exam tool. The consequences of these hacks are significant, ranging from removal of the exam paper from the venue through to receiving live assistance from an outside expert. Potential mitigation strategies are proposed; however, these are unlikely to completely protect the integrity of BYOD e-exams. Educational institutions are urged to balance the additional affordances of BYOD e-exams for examiners against the potential affordances for cheaters.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

We report on use of iPads (and other IOS devices) for student fieldwork use and as electronic field notebooks and to promote active. We have used questionnaires and interviews of tutors and students to elicit their views and technology and iPad use for fieldwork. There is some reluctance for academic staff to relinquish paper notebooks for iPad use, whether in the classroom or on fieldwork, as well as use them for observational and measurement purposes. Students too are largely unaware of the potential of iPads for enhancing fieldwork. Apps can be configured for a wide variety of specific uses that make iPads useful for educational as well as social uses. Such abilities should be used to enhance existing practice as well as make new functionality. For example, for disabled students who find it difficult to use conventional note taking. iPads can be used to develop student self-directed learning and for group contributions. The technology becomes part of the students’ personal learning environments as well as at the heart of their knowledge spaces – academic and social. This blurring of boundaries is due to iPads’ usability to cultivate field use, instruction, assessment and feedback processes. iPads can become field microscopes and entries to citizen science and we see the iPad as the main ‘computing’ device for students in the near future. As part of the Bring Your Own Technology/Device (BYOD) the iPad has much to offer although, both staff and students need to be guided in the most effective use for self-directed education via development of Personal Learning Environments. A more student-oriented pedagogy is suggested to correspond to the increasing use of tablet technologies by students

Relevância:

100.00% 100.00%

Publicador:

Resumo:

In recent years there has been a personal and organizational trend toward mobility and the use of mobile technologies such as laptops, mobile phones and tablets. With this proliferation of devices, the desire to combine as many functions as possible into one device has also arisen. This concept is commonly called convergence. Generally, device convergence has been segmented between devices for work and devices for home use. Recently, however, the concept of Bring Your Own Device (BYOD) has emerged as organizations attempt to bridge the work/home divide in hopes of increasing employee productivity and reducing corporate technology costs. This paper examines BYOD projects at IBM, Cisco, Citrix, and Intel and then integrates this analysis with current literature to develop and present a BYOD Implementation Success model.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Over the past six years Lowestoft College has embraced the revolution in mobile learning by welcoming Web 2.0, social media, cloud computing and Bring Your Own Device (BYOD). This open attitude to new technologies has led to a marked improvement in student achievement rates, has increased staff and student satisfaction and has resulted in a variety of cost savings for senior management during the current economic downturn.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

O uso de dispositivos móveis está a ganhar cada vez mais espaço dentro das organizações. O aumento do consumo de material informático por parte dos consumidores está a levar a que os mesmos comecem a tentar utilizar os seus dispositivos móveis1 Notebooks, Tablets e Smartphones no interior das organizações. Este tipo de comportamento, levou ao aparecimento de uma nova tendência – o Bring Your Own Device (BYOD), a utilização de dispositivos móveis para fins laborais, levanta várias e sérias questões de segurança aos departamentos de TI das organizações, fazendo com que as organizações necessitem de definir novas políticas de segurança para que a sua informação e os seus dados se mantenham seguros. O trabalho adiante desenvolvido pretende mostrar de que forma as organizações veem esta mudança de paradigma, em que os próprios colaboradores utilizam os seus dispositivos móveis como ferramenta de trabalho na organização. Por outro lado analisar os modelos de segurança que se podem associar ao BYOD e aos dispositivos móveis para permitir uma maior segurança dos dados e informação que circula entre a organização e o dispositivo móvel.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

As mobile touch screen digital devices (MTSD) have moved into a more prominent position in classrooms and schools, the development of new policies to address these devices have also emerged at a rapid pace. While policy documents aimed at MTSD usage in schools are evident at range of levels, from school-based to education ministries and departments, there is relatively little research that examines such documents or their impact on teaching and learning. This paper reports on initial analyses of educational digital media and MSTD policies in education departments and schools in Victoria, Australia and Alberta, Canada. We examined these policy documents in relation to implications for resourcing, usage and teaching practice, as a part of a large-scale Canadian-funded comparative research project studying digital tools and practices. Schools must mediate and negotiate complex entangled environments that are all at once enabling and dis-abling of innovation, in relation to digital technologies. These complex environments are made visible through a closer reading of artifacts such as policy documents guiding technology use in schools and classrooms. Our paper will interrogate such documents, across both countries (Canada and Australia) and regions (Victoria and Alberta), in relation to several emergent themes: private vs. school funded ownership, attitudes towards ‘bring your own device' (BYOD) initiatives and "co-contributions", equity and access, and surveillance and control. As well, we will address how hopes and fears and understandings of digital literacy are represented, described and enacted through such policies. Our analyses will also contextualize our data in terms of the broader cultural, political and educational considerations that framing and undergirding policies in both countries, and, finally, we will address the different (and similar) assumptions that are communicated within the digital policy documents.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

La identificación del perfil del Chief Information Officer (CIO) en el entorno empresarial nacional responde a la necesidad de comparar o constatar el rol aplicado en Colombia en relación a la expectativa de la academia y la pertinencia que lleva en un entorno empresarial global. La migración del concepto de CIO y sus definiciones es resultado de la implementación local de prácticas, teorías y estrategias de alto impacto en mercados internacionales. En el presente documento, se profundiza en las competencias estratégicas y roles prácticos que abarca el perfil del CIO como es visto desde aportes académicos y casuísticos en fuentes internacionales líderes en la construcción de conocimiento.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Com o crescente número de fabricantes de produtos, serviços e soluções de TI, direcionando boa parte de sua produção ao indivíduo, desenvolvendo dispositivos pessoais móveis, redes sociais, armazenamento remoto de arquivos, aplicativos grátis ou a custos acessíveis a boa parte dos profissionais do mercado de trabalho atual, os indivíduos estão, cada vez mais, se munindo de dispositivos e aplicações para organizar suas vidas, se relacionar com pessoas e grupos sociais e para se entreterem, entre outras coisas. Consequentemente, muitos levam estas tecnologias pessoais para dentro do ambiente corporativo e as utilizam para auxiliar em suas tarefas profissionais. Este fenômeno tem sido chamado, pelos estudos não-científicos sobre o tema, de Consumerização de TI ou BYOD (Bring Your Own Device). O objetivo deste estudo é identificar o conjunto de fatores críticos que as organizações devem levar em consideração no momento em que criam ou aprimoram sua política de utilização de tecnologias pessoais para a condução de atividades corporativas. Para identificar este conjunto de fatores críticos são utilizadas técnicas de análise de conteúdo, para analisar o material coletado, que são estudos não-científicos, tais como: pesquisas de empresas de consultoria na área de administração de TI, estudos de instituições de diferentes indústrias e entrevistas com pesquisadores e profissionais da área de TI e de outras áreas do Brasil e dos Estados Unidos da América. São identificados sete fatores, dos quais, três são críticos à política de utilização de tecnologias pessoais no ambiente corporativo, dois são impulsionadores do fenômeno e dois são fatores beneficiados pelo fenômeno.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

myTU, eine persönliche Lernplattform für Smartphones, die seit 2011 an der Technischen Universität Bergakademie Freiberg im Einsatz ist, wird zukünftig mit neuen und erweiterten Funktionen ausgestattet. Ziel ist es eine generalisierte Lernplattform für alle Hochschulen anzubieten, die das BYOD-Konzept konsequent umsetzt. Ausgehend von der derzeitigen Struktur und Umfang des Projektes wird eine Verbindung mit OPAL geschaffen, das Layout und die Schnittstellen generalisiert, Funktionen erweitert und ein mehrstufiges Authentisierungskonzept entwickelt und integriert. Im Folgenden wird der Status Quo erläutert und neue Konzepte des Projektes vorgestellt.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

El presente proyecto propone la utilización de un protocolo de obtención y gestión de certificados llamado SCEP (Simple Certificate Enrollment Protocol), utilizado inicialmente para el aprovisionamiento automático de certificados en routers y switches de la marca Cisco Networks, para su uso en dispositivos personales o corporativos dentro del ámbito laboral. En la actualidad, se están aplicando nuevas técnicas más eficientes de control del uso de los dispositivos corporativos por parte de los empleados de determinadas empresas. Estas empresas son las encargadas de proporcionar a sus empleados dichos dispositivos, que en muchos casos son un ordenador personal y un teléfono móvil. En las empresas del sector de las TIC, el uso de esos dispositivos es la principal herramienta de sus empleados, con lo que la seguridad y control son mecanismos fundamentales que deben estar presentes y garantizados. Además, nuevas tendencias como el BYOD (Bring Your Own Device o el teletrabajo, permiten a los empleados tanto el uso de los dispositivos corporativos lejos del ámbito laboral (en su domicilio, por ejemplo), como el uso de dispositivos no preparados de antemano por la empresa. A priori, estas técnicas suponen un avance en comodidad para los empleados; pero puede significar todo lo contrario cuando se habla del mantenimiento de la seguridad y el control de acceso a los recursos de la empresa desde dichos dispositivos (obtención de certificados para acceder a recursos internos, envío de información cifrada entre individuos de la misma empresa, etc). Es aquí donde cobra sentido la idea de utilizar un protocolo de aprovisionamiento y gestión automatizada de certificados para garantizar la seguridad y control de acceso en la PKI (Public Key Infrastructure) corporativa, permitiendo el uso de dispositivos personales, y evitando la acumulación de trámites burocráticos incómodos tanto para el empleado como para la empresa. Este proyecto plantea la utilización del protocolo SCEP como mecanismo para la realización de la gestión automatizada de certificados ampliando su utilización a dispositivos de escritorio Windows y móviles Android.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

This article presents the attitudes of 80 teenagers-growing up in one of the most contested localities in Northern Ireland-to cross-community marriages, i.e. those between Catholics and Protestants. Research suggests that adults in interface areas continue to exhibit ethno-sectarian prejudices despite wider political developments such as the Good Friday Agreement. The teenagers perceived that their families would be largely unsupportive of cross-community unions but felt that their own views were much less prejudiced than those of their parents. However, while the majority of teenagers had no objections in principle to marrying outside their religious group, they outlined a number of practical difficulties which couples from cross-community unions would face. These included deciding where to live, in which religion, if any, to bring children up and where to send children to school. Most of the teenagers suggested that these potential problems would work against them marrying outside their own religious group. These practical dilemmas provide a more nuanced set of reasons for marrying within one's own community than dilemmas based on traditional prejudices and stereotypes and suggest that teenagers living in sectarian enclaves are more receptive to cross-community marriages than their parents.