Feeds

BYOD turns sysadmins into heroes

Intel China's IT boss on consumerisation

Using blade systems to cut costs and sharpen efficiencies

Bring Your Own Device programmes can help to keep staff happy and turn IT bods into "heroes" but the hard RoI from spikes in productivity is unproven, according to Intel’s IT manager for China.

Liam Keating told media at Chipzilla’s Cloud Summit event in Bangkok this week that Intel has around 29,000 employee handsets to manage globally, 60 per cent of which are staff-owned.

However, although consumerisation is one of the chip giant’s four key internal focus areas for IT, he fell short of endorsing the classic mantra that BYOD equals productivity, which is used to justify most investments in such programs.

“People will publish productivity numbers saying you can be more productive on the road … but I don’t really know if you can correlate a hard dollar value to that,” he argued.

“There is an employee satisfaction piece to finishing an email on the train so you can spend more time with the wife and kids and dog at home though – it gives you an enhanced work/life balance, and it feels good to use a cool phone to get work done rather than carrying a large overweight [corporate] laptop.”

Intel deals with the complex and usually costly process of managing staff-owned devices by only allowing the use of operating systems and devices which meet a pre-defined list of basic criteria, Keating explained.

If a handset falls short then email, contacts and calendar may only be provisioned by a third party app, which acts as a “secure environment”, he added.

An extra layer of security is added because BYO devices are generally not allowed on the corporate network.

“You can download any app you want onto your phone but smartphones are a huge target for attacks – the phone doesn’t get onto our network,” he said.

“They can interact with the network, though. They can use the IM capabilities, interacting with an environment that looks like the network but isn’t.”

Keating admitted that a lot of work had gone into supporting IT consumerisation, especially co-ordinating with HR and legal teams to draw up agreements on what to do in the event of a device being compromised, for example.

“We have a lot of things on our plate so having to deal with these consumer devices was an irritant and many hoped initially they would just go away,” he added.

“But now we’ve proved we can do it and do it in a secure manner and the employees appreciated it.” ®

The Essential Guide to IT Transformation

More from The Register

next story
BBC goes offline in MASSIVE COCKUP: Stephen Fry partly muzzled
Auntie tight-lipped as major outage rolls on
iPad? More like iFAD: We reveal why Apple fell into IBM's arms
But never fear fanbois, you're still lapping up iPhones, Macs
White? Male? You work in tech? Let us guess ... Twitter? We KNEW it!
Grim diversity numbers dumped alongside Facebook earnings
HP, Microsoft prove it again: Big Business doesn't create jobs
SMEs get lip service - what they need is dinner at the Club
Bose says today IS F*** With Dre Day: Beats sued in patent battle
Music gear giant seeks some of that sweet, sweet Apple pie
Amazon Reveals One Weird Trick: A Loss On Almost $20bn In Sales
Investors really hate it: Share price plunge as growth SLOWS in key AWS division
Dude, you're getting a Dell – with BITCOIN: IT giant slurps cryptocash
1. Buy PC with Bitcoin. 2. Mine more coins. 3. Goto step 1
There's NOTHING on TV in Europe – American video DOMINATES
Even France's mega subsidies don't stop US content onslaught
prev story

Whitepapers

Top three mobile application threats
Prevent sensitive data leakage over insecure channels or stolen mobile devices.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.
Designing a Defense for Mobile Applications
Learn about the various considerations for defending mobile applications - from the application architecture itself to the myriad testing technologies.
Build a business case: developing custom apps
Learn how to maximize the value of custom applications by accelerating and simplifying their development.