Bring Your Own Device (BYOD) or Bring Your Own Technology (BYOT)

CIS336

Week 4 Discussion 1

Bring Your Own Device (BYOD) or Bring Your Own Technology (BYOT)” Please respond to the following:

With the proliferation of smart phones and intelligent computing tablets such as the iPad, enterprises are increasingly faced with employees who want to bring their own devices and connect to enterprise systems. Determine whether or not employers should allow this type of connectivity to enterprise systems. Support your reasoning with three examples. Predict the impact to an organization’s Total Cost of Ownership (TCO) when employees use BYOD.  Do some research on the topic and provide at least one substantive reference that supports this type connectivity to enterprise systems and one substantive reference that is not supportive.

Employers should embrace BYOD connectivity to business systems. In this progressive technology era, organizations must remain prepared for the proliferation of a new generation of connected devices and personal gadgets such as smartphones and tablets. According to reports, some companies have already embraced the practice of Bring Your Own Device (BYOD) where employees can bring the devices they use at home to the office. There are numerous advantages to embracing the BYOD practice. This practice adds a cutting edge to business operations ensuring that the organization maintains a competitive advantage. BYOD practice has created a motivated workforce, and better performance for companies that have embraced it mainly because bringing one`s device creates more flexible working conditions for the workers, (Ghosh, 2013). Besides, organizations can save on costs since the employees pay for data services and hardware. BYOD promotes worker satisfaction since employees can use the customized capabilities and features available in personal gadgets but which lack in company resources and devices thus leading to better work performance and goal achievement. Despite the numerous advantages to bringing one`s device to work, the practice is profoundly flawed with risks. BYOD creates and heightens security issues for companies. According to research, an organization faces the risk of potentially losing vital data when an employee browses in an unsafe website, network or if the person places company information on an unsecured system or device. However, even then, the benefits of BYOD far outweigh the disadvantages. BYOD decreases the total cost of ownership. When employees use their devices, the company cuts capital expenditure since the organization only purchases fewer devices. Apart from hardware, the company saves internet access plan costs and mobile device usage costs. Besides, since the employees are already familiar with their tools, technical support and training costs are consequently reduced, (Ghosh, 2013). On the other hand, BYOD has hidden costs such as asset management costs that can profoundly affect the company`s finances. Besides, BYOD has permanently changed the ways of working and calculating each phase of asset life costs for the organization.

From this week’s videos, determine whether Strayer University should allow students to use BYOD on campus. Explain why or why not.

From the e-Activity, Strayer University should allow students to bring their own devices. The advantages of allowing students to carry personal devices to school are worth it. By creating a BYOD environment, students can utilize the devices they are familiar with, (Bruder, 2014). Besides, the students can easily access information from other students’ gadgets and centralized networks thus increasing flexibility and performance. Instead of viewing the practice as an obstacle, Strayer University can use the method as an opportunity that effortlessly channels information between the teachers and the students. Besides, the practice can promote access to school resources such as administrative services and updates thus improving operations at the school, (Bruder, 2014).

Bruder, P. (2014). The risks and benefits of BYOD (bring your own device). Gadgets go to school, 80(3), 15.

Ghosh, A., Gajar, P. K., & Rai, S. (2013). Security risks and mitigating strategies to Bring your own device (BYOD), 4(4), 62-70.

Week 4 Discussion 2

Virtualization and Cloud Computing” Please respond to the following:

Suggest how an organization should choose between Software as a Service (SaaS), Platform as a Service (PaaS), and Infrastructure as a Service (IaaS). Support your recommendation with an explanation and at least one substantive reference that supports your position.

Organizations must consider the three models of cloud service before deciding to apply cloud services for infrastructure deployment. Infrastructure as a Service (IaaS) is the most flexible model as it provides the client with direct access to storage and servers. IaaS is beneficial for small companies and startup businesses as it allows resources to be purchased as needed, (Xing, 2016). It is also advantageous for organizations that seek to have complete control over operations, infrastructure, and programs while only purchasing only that which is needed. Rapidly growing agencies should use IaaS as it gives a wide range of flexibility regarding scaling up or down. For such companies, a highly scalable model is advantageous when the company is unsure of what infrastructure to commit to. When it comes to Software as a Service, small and startup companies should consider this model as it primarily reduces the money and time used upgrading, managing and installing software. It also allows the enterprise to launch its e-commerce quickly, (Xing, 2016). Platform as a Service should be considered by companies that have numerous developers working on the same development project as it allows customization of applications. It should be used when deploying and designing an app as it provides flexibility and speed.

Salesforce.com, Facebook, Gmail, Windows Azure, Apple iTunes, and LinkedIn are examples of applications in the cloud computing space. Examine the benefits and possible problems for these organizations when it comes to cloud computing.

Propose solutions to these problems. Predict the impact to an organization’s TCO and ROI.  Support your recommendation with at least one substantive reference that supports your position.

Cloud computing is beneficial for companies such as Google, LinkedIn, and Windows Azure. Cloud computing ensures that such organizations cut costs that would be used to maintain and run servers. It provides reduced support and higher levels of transparency thus improving the standards of collaboration and sharing, (Swathi, 2014). Cloud computing builds resilience by breaking down barriers such as costs, hardware needs and maintenance of infrastructure and software. It also reduces the need for in-office equipment thus ensuring companies optimize their data centers. However, these companies face several drawbacks by utilizing cloud computing. Cloud computing introduces numerous security issues such as breaches that may expose sensitive company data, (Swathi, 2014). Besides, it puts cloud providers and vendors out of business another drawback is that cloud computing increases the need for proper internet connection services and bandwidth. These challenges can be reduced by ensuring that organizations only move specific elements of their IT infrastructure to the cloud, (Swathi, 2014). Besides, more attention and research should be placed on finding cloud solutions to future vulnerabilities and risks. Cloud computing reduces the total cost of ownership for companies since they do not have to maintain, deploy or purchase application software and infrastructure instead, the vendor manages the processes such as backups, software upgrades, and infrastructure upgrades as well as manages the infrastructure such as network access, databases, and the servers.

Swathi, T., Srikanth, K., & Reddy, S. R. (2014). Computer Science and Mobile Computing: Virtualization in cloud computing, 3(5), 540-546.

Xing, Y., & Zhan, Y. (2016). V Future Wireless Networks and Information Systems: Virtualization and cloud computing, 305-312.

Bottom of Form

Bottom of Form

Place an Order

Plagiarism Free!

Scroll to Top