Articles Tagged with BYOD

VirtualizationManagementIcon

Dell KACE K1000 Takes the Lead on Chromebook Management

VirtualizationManagementIconDell has announced an upgrade to its KACE K1000 Systems Management Appliance, making it the first systems management vendor to address the rapidly growing Chromebook market. The KACE K1000 system, which is available as a physical or virtual appliance and as a cloud-hosted service, provides system management services for servers, PCs, and now Chromebooks. It also provides management tools for printers, network-attached projectors, and other non-computing devices. Along with agentless management of Windows systems, the version 6.3 software enables the Dell KACE K1000 to extend its hardware inventory, reporting, and service desk functions to cover all current Chromebooks and Chromebox desktop systems.

Read More

DataCenterVirtualization

Is BYOD Becoming BYOBS?

DataCenterVirtualizationIn the modern technical world, you don’t have to search far to find someone with a quote purporting to define the future. This month’s example came to me via the medium of Twitter, with an analyst offering the line, “by 2017, half of all employers will require employees to use their own device.”

Read More

VMware100x30

News: VMware’s Latest Acquisition, AirWatch

VMware100x30It appears that VMware has been on quite the acquisition kick lately, first with the $1.3 billion acquisition of its Palo Alto neighbor Nicira in 2012, and now with its largest acquisition in company history: the $1.54 billion purchase of mobile management and security firm AirWatch. The AirWatch acquisition is aimed at tightening companies’ security and peace of mind, particularly with regard to the growing use of mobile devices for work, referred to as “bring your own device” (BYOD).

Read More

VirtualizationSecurity

Passwords Are Dead or Dying

VirtualizationSecurityPasswords are dead or dying:  According to Google security executive Heather Adkins, Passwords are dead for Google and warned that any startups that will rely on passwords are going to be dead in the water. Heather Adkins did not offer any real specifics on how Google is going to innovate tomorrow’s security but did hint that Google is experimenting with hardware-based tokens as well as something that Motorola has created that authenticated users by having them touch a device to something embedded.

Read More