Tag Archives: BYOD

Planning for the Wireless Future

A recent article in my local paper showcased a new solar powered phone charger and wi-fi hotspot built into a park bench. Apparently these are coming to cities such as Boston and New York, but they are already in a park in my own town. This got me thinking about the ubiquity of wireless connections and the expectations that there should be access almost everywhere. Vehicles are becoming personal internet access points, and I suspect that I could even turn my bicycle into a hot spot. With this expectation of widespread and growing wireless access, how is a network architect supposed to plan for the future? In this post I hope to synthesize best practices of corporate and campus planners to help you plan your own infrastructure.

 Greenfield or Incremental?

Unless you are moving into a brand new building you don’t have the luxury of the greenfield approach, or starting from scratch. The folks at Cisco and other network component providers recommend developing a master plan and then tackling the project in stages. A wireless network consists of routers and switches in the back end and access points at the front end. If you have not been performing periodic upgrades then the entire infrastructure may need to be replaced.

When replacing the system components, look to the future in terms of technology and capacity. There is still a lot of equipment running on the old 802.11b/g standard but 802.11n is a better solution. Even better is 802.11ac but there are not many current devices that can access this standard, although they are coming fast. When developing a plan, look out at least five years to estimate the wireless devices that will be accessing your network. Don’t forget about bring your own devices (BYOD) and Internet of Things (IoT) introducing devices that we may not even have thought of yet.

Appetite for Bandwidth

A December 2015 Educause survey found that 61% of undergraduates in a typical college or university are trying to connect at least two wireless devices to the network at the same time. Some are trying to connect up to four devices at once. University of Oregon enrolled 23,634 students for fall 2016 so using the average of two devices, that is over 47,000 devices potentially hitting the network. That is a lot of access points and switches that need to be working right. Particularly for colleges, but also for businesses, it is important to have the right mix of access, speed, and reliability.

In the article mentioned above, Michael Spande, director of Enterprise Services at Bethel University, says “People pick their colleges based on factors like how good the wireless network is. They share their experiences online, and we can either look good or have a big black eye.” Quality wireless access has become a competitive differentiator.

Refresh, Refresh, Refresh

Whether you are managing a university, corporate, or hospital network, it is important to keep refreshing the hardware and software to ensure high performance. It is hard to predict what the future will hold, so network architects need to be part seers and part engineers. Just like PCs, the technology changes so quickly that a planned refresh cycle is critical to keep up with demand and with newer devices trying to access the network. Some recommend replacing one-quarter of the components every year while others stretch that out to a five-to-six-year refresh cycle. It depends a lot on demand and requirements of the devices accessing the network.

Thoughts

I remember when we installed the first wireless access points, they truly were a novelty. We targeted conference rooms because all of the offices were already hard-wired so wi-fi in those areas would have been redundant. Times have changed and wireless access is the future. Whether sitting on a park bench or in a restaurant, or playing golf on the front nine, our “always on” society is quickly adjusting to internet access anytime, anywhere. Are you ready?

Author Kelly BrownAbout Kelly Brown

Kelly Brown is an IT professional and assistant professor of practice for the UO Applied Information Management Master’s Degree Program. He writes about IT and business topics that keep him up at night.

IT Trends: How Will You Access Your Data in the Years to Come?

shutterstock_91611515I have been thinking lately about information technology trends and I want to highlight a few in the blog this week. This helps me to keep up on the latest in technology and I hope that it helps you as well.

The Cloud

According to a recent list from Gartner, one of the emerging trends over the next couple of years is that the cloud will become the most important data repository. This will have significant impact on IT organizations in the fact that devices such as PCs and laptops will be merely a window into the data and the applications. The computer will not actually house information; it will all be hosted in the cloud. Laptops could become simple terminals and more computing will be pushed to the tablet, which could serve the same function. With this push to mobile devices, the desktop PC could drop out of the scene completely. Device management will change dramatically, especially as employees become even more mobile.

Mobile

Another trend identified by Gartner is an increasingly mobile workforce. This includes not only telecommuters, but also those working in a progressively 24/7 world on company-issued devices as well as on personal devices. The line is blurring between the two, and IT organizations need to get a handle on who and what devices have access to their proprietary information. This goes beyond a Bring-Your-Own-Device (BYOD) policy and enters into the area of network design with an eye toward mobile security.

Security

With the movement towards the cloud and mobile devices, Sophos—the network and server security vendor—predicts there will be more attacks on personal and corporate data. They also predict mobile devices will leave personal data more vulnerable to theft, particularly through the use of apps. With larger numbers of employees working remotely and passing corporate data across their mobile devices, this trend spells trouble for the IT organization. The spotlight will be on them to keep the corporate data safe on the inside and keep viruses and intruders on the outside. More emphasis will be put on security, particularly the mobile variant. The upside to all of this is an increase in opportunities for security professionals. According to Robert Half, the staffing specialists, security professionals are one of the technical specialties in highest demand. If the trend towards mobile and cloud computing continues, this demand will become even more acute.

Thoughts

One of the benefits of trend spotting is that it points to where future opportunities lie. There is a need now for security professionals, cloud computing professionals, and those that can integrate mobile platforms with enterprise applications. If you are at a crossroads in your career, I would explore one of these areas. If you are just starting your IT career or education, I think any of these will be solid fields for years to come, with options to branch out into the periphery. Have you seen any other IT trends worth noting? Let me know. I will highlight other trends in future blog posts.

Author Kelly BrownAbout Kelly Brown

Kelly Brown is an IT professional, adjunct faculty for the University of Oregon, and academic director of the UO Applied Information Management Master’s Degree Program. He writes about IT and business topics that keep him up at night.

The Consumerization of IT

In a recent post on TrendMicro blog, Cesare Garlati likens the IT consumerization trend to an iceberg. The visible evidence of personal devices being brought to work (i.e tablets and smartphones) is only 10 percent of the problem. The other 90 percent of the problem lies under the surface and represents the hidden problems of company data leaving the company and potential viruses coming into the environment. The lines between consumer devices and work devices have blurred significantly over the last ten years but as IT professionals we often have not kept up on the problem of security. That security extends to our infrastructure and our networks.

History

In the early days of computing, there were no personal computers except for maybe the do it yourself Heathkit. Once personal computers came into fashion, there was minimal networking available, so it was a stand-alone device that transferred data back and forth with disks. As networking became more mature, we worked our way through dial-up modems, LAN cables, and then finally wireless networks which are fast becoming ubiquitous. The differences between a consumer device and a work device are quickly disappearing. Is your organization ready for this new reality?

Devices

As mentioned above, devices have essentially become smaller and much more sophisticated over the last thirty to forty years, accelerating in the last ten years. Often, employees are asked to carry a device for work so that they can check on work status or to keep in contact with customers and vendors. Increasingly, these are handheld devices, often a smartphone. Where is the line between a company device and a personal device? Applications increasingly have web interfaces so why can’t a person use their personal smartphone to access customer data and then download the latest version of Angry Birds? In the future, as devices continue to become smaller, an astute IT worker won’t even be able to tell when a consumer device comes in the door.

Networks

Networks today are becoming ubiquitous and increasingly user friendly. With the advent of 4G networks and widespread wi-fi, many are connected 24/7, no matter where they go. In a recent article, a partnership between Google and Raven Industries is set to launch helium balloons equipped with network equipment to provide connectivity to rural areas in the US and particularly in developing countries. The combination of smaller consumer devices and ubiquitous Internet connectivity is destroying the old command and control mentality of IT departments. No longer do they have the luxury of denying access to a particular device or class of devices. The prudent IT group will work to mitigate any risks involved in unsecured devices and work to educate employees.

Thoughts

Some organizations are now giving a stipend to employees to purchase their own computer. This of course makes it harder to maintain patch images for every make and model under the sun but, if executed correctly, IT does have a say in the security components that are installed.

How does your organization handle consumer devices in the work place? Do you embrace them, tolerate them, or fear them? Let me know your thoughts.

 

Author Kelly BrownAbout Kelly Brown

Kelly Brown is an IT professional, adjunct faculty for the University of Oregon, and academic director of the UO Applied Information Management Master’s Degree Program. He writes about IT topics that keep him up at night.

To BYOD or not to BYOD

shutterstock_128593868Bring Your Own Device or BYOD is a hot topic these days, but what’s the big deal? It seems that everyone has their own smartphone/pocket computer. We learned to deal with the Blackberry years ago. Why not blur the lines between consumer technology and business technology? Can’t we all just get along? While it may seem that your IT department is the very embodiment of Dilbert’s Mordac, The Preventer of Information Services, there is a very good reason why they are cautious and you should be too.

Security

The device belongs to the employee but the data belongs to the company. Mobile devices are great for extending our workflow, our workday, and for keeping us in constant contact. In the midst of all of this work, wherever it may happen, an employee will most likely pass company data through their mobile device, either for viewing, editing or storing. Company confidential information is worrisome enough but what about personally identifiable information (PII) belonging to your customers? Is every mobile device protected by a PIN? Is data encrypted on your device while at rest? Is data always encrypted while transiting over the network? How are employees sharing data? Over the cloud? Whose cloud? There is a lot to think about when deciding on a BYOD policy and deciding whether to allow personal devices to access your network. Bill Ho, president of Biscom has created a list of security items to consider when creating a BYOD security policy.

Platform

As the number of IT personnel has shrunk through cost cutting and rightsizing, the number of smart devices and platforms has exploded. Blackberry used to be the only game in town, but now we have Apple iOS, Android, Windows Phone, WebOS and other platforms with fun version names like Ice Cream Sandwich and Jellybean. Further up the stack, there are apps that have their own security issues. The sheer combinatorics of it all would cause any IT professional to run screaming for the network closet. To do justice to a solid BYOD policy, an organization would need at least one full time person to monitor platforms and applications that are accessing the enterprise systems. Do you have that kind of manpower? Is there a middle ground without compromising information security mentioned above?

Compatibility

Another consideration is the compatibility of all of these different devices and platforms and mobile applications and your corporate applications. Will X always talk to Y? Does it cause the IT department to scramble to get your unique permutation working for you? Is it worth the effort for your personal productivity?

Good News

There is a lot to consider when deciding to embrace BYOD. On the upside, it can extend the productivity of employees as long as security and compatibility concerns are adequately addressed. The good news is that there are tools available to help you manage mobile devices. You can find solutions from IT service providers such as IBM and Dell or from security providers such as Symantec and others. These applications can help you reach the right level of availability, convenience, and security in order for your employees to maximize their productivity and help you sleep at night.

Do you have a comprehensive BYOD plan? Is it working? What keeps you up at night?

 

About Kelly Brown

Kelly Brown is an IT professional, adjunct faculty for the University of Oregon, and academic director of the UO Applied Information Management Master’s Degree Program. He writes about IT topics that keep him up at night.