Podcasts about byod bring your own device

  • 27PODCASTS
  • 29EPISODES
  • 25mAVG DURATION
  • 1MONTHLY NEW EPISODE
  • Jun 2, 2025LATEST

POPULARITY

20172018201920202021202220232024


Best podcasts about byod bring your own device

Latest podcast episodes about byod bring your own device

Brilliance Security Magazine Podcast
Rethinking BYOD: From Legacy Risks to Zero Trust Mobility

Brilliance Security Magazine Podcast

Play Episode Listen Later Jun 2, 2025 53:32


In this episode of the Brilliance Security Magazine Podcast, we sit down with Matt Stern, Chief Security Officer at Hypori, to discuss how organizations can move beyond outdated mobile device management strategies and adopt a zero-trust approach to the future. Stern shares compelling insights from his extensive experience in both military and federal cybersecurity, highlighting why traditional BYOD approaches—like MDM and MAM—are no longer adequate. If you're a CISO, IT leader, or just curious about secure mobile innovation, this is a conversation you don't want to miss.SummaryThe episode begins with Matt Stern's journey from Army Ranger to cybersecurity executive. He discusses how his experience leading large-scale cyber operations, including the U.S. Army CERT and the EINSTEIN national cybersecurity system, shaped his threat-centric approach to enterprise security.The conversation then turns to the evolving BYOD (Bring Your Own Device) landscape. Stern highlights the risks posed by traditional mobile device management (MDM) and mobile application management (MAM) solutions—such as increased attack surface, privacy concerns, and inadequate control over unmanaged personal devices. He also touches on regulatory challenges like the “No TikTok Law,” which bans certain apps on government-affiliated devices due to data exposure risks.Stern explains how Hypori addresses these issues with its Virtual Mobile Infrastructure (VMI), which keeps all data and compute operations off the user's device. Hypori streams pixels only—meaning no data is stored or processed locally—eliminating risks associated with compromised devices. He walks listeners through Hypori's layered authentication system and robust security architecture, which enables secure operation from any personal device without compromising user privacy.The show concludes with a discussion on cost savings and operational efficiency. Stern notes that the Department of Defense already uses over 70,000 Hypori licenses and highlights how organizations can achieve significant savings—up to 42%—by eliminating the need to purchase and manage government-furnished equipment (GFE). His advice to IT leaders: assess your current BYOD risks, examine the real-world behaviors of your workforce, and consider whether legacy models are hindering your security posture.

AV SuperFriends
AV SuperFriends: Perspectives from NWMET 2025 - Neat's Ricky Lane

AV SuperFriends

Play Episode Listen Later May 9, 2025 10:30 Transcription Available


Recorded May 01, 2025 The team is live from NWMET 2025, where they catch up with Ricky Lane from Neat to explore the innovative features of their latest products. The discussion dives into the exciting world of BYOD (Bring Your Own Device) capabilities and how Neat is making it easier for users to engage in meetings without the hassle of complicated setups. Ricky shares insights on Neat's approach to creating user-friendly AV solutions, including the automatic camera framing and advanced microphone technology that enhance meeting equity for all participants. The conversation highlights the seamless integration of Neat's devices with popular platforms like Zoom and Teams, allowing users to enjoy a rich feature set regardless of their setup. Join us for an engaging chat filled with practical information and expert perspectives on the future of collaborative technology in meeting spaces. If you find value in this episode, don't forget to share it with your colleagues and consider supporting the AV SuperFriends!   We stream live every Friday at about 300p Eastern/1200p Pacific and you can listen to everything we record over at AVSuperFriends.com    ▀▄▀▄▀ CONTACT LINKS ▀▄▀▄▀ ► Website: https://www.avsuperfriends.com ► Twitter: https://twitter.com/avsuperfriends ► LinkedIn: https://www.linkedin.com/company/avsuperfriends ► YouTube: https://www.youtube.com/@avsuperfriends ► Bluesky: https://bsky.app/profile/avsuperfriends.bsky.social ► Email: mailbag@avsuperfriends.com ► RSS: https://avsuperfriends.libsyn.com/rss   Donate to AVSF: https://www.avsuperfriends.com/support

YourTechReport
Cybersecurity Threats & Solutions: VPNs, AI Attacks, & Protecting Your Business | John Papadakis Interview

YourTechReport

Play Episode Listen Later Feb 10, 2025 33:44


Are you doing enough to protect your business and personal data from cyber threats? In this must-watch episode of Your Tech Report, we sit down with John Papadakis, CEO of Acronym Solutions, to explore the biggest cybersecurity threats in 2024 and beyond. John shares critical insights on how businesses can defend against data breaches, DDoS attacks, phishing scams, and insider threats. We also discuss the impact of remote work security risks, the role of AI in cybercrime, and why every business—big or small—must take cybersecurity seriously. ⏱ 00:00 - Intro: Why cybersecurity matters now more than ever ⏱ 02:30 - The evolution of Acronym Solutions & its mission ⏱ 05:40 - The biggest cybersecurity threats in 2024 ⏱ 08:20 - Why remote work is creating security nightmares ⏱ 11:50 - Should businesses use VPNs at all times? ⏱ 15:30 - AI-powered cyberattacks: The next big threat ⏱ 18:10 - The hidden dangers of BYOD (Bring Your Own Device) ⏱ 22:00 - How small businesses can protect themselves ⏱ 26:15 - The human factor: Why employee awareness is crucial ⏱ 30:40 - Why cybersecurity isn't just for big corporations ⏱ 33:10 - Common security mistakes businesses make ⏱ 37:00 - How AI is helping fight cybercrime ⏱ 40:30 - John's personal cybersecurity habits (What he does at home!) ⏱ 44:00 - Should every company have a cybersecurity playbook? ⏱ 47:20 - One cybersecurity myth you need to stop believing ⏱ 50:00 - Where to learn more about Acronym Solutions Key topics include: ✅ The evolving cybersecurity threat landscape

The Tech Blog Writer Podcast
3072: A CISO's Guide to Mobile Security: Key Strategies from Jamf

The Tech Blog Writer Podcast

Play Episode Listen Later Oct 30, 2024 24:28


In this episode, we tackle a fresh perspective on a common cybersecurity question: What keeps a CISO awake at night? According to Michael Covington, VP of Strategy at Jamf, the real issue isn't about external threats but rather a lack of robust security processes, especially in mobile device management. Covington shares insights on how a well-thought-out strategy can let CISOs rest easy, with their minds at ease knowing that key areas, from cyber hygiene to compliance, are under control. Our conversation dives into three primary areas that Covington believes are essential for keeping mobile device vulnerabilities at bay and ensuring secure integration within enterprise ecosystems. First, he highlights the often-overlooked importance of cyber hygiene. He notes that nearly 40% of mobile users operate devices with known vulnerabilities, a staggering figure that reveals the challenges organizations face in keeping devices up-to-date and correctly configured. Covington argues that regular updates, vigilant configuration management, and consistent patching practices are not just best practices—they're fundamental in building a secure foundation. Second, we explore the complexities of compliance, particularly when it comes to mobile devices. Covington points out that many organizations struggle to balance security regulations with the diverse landscape of personal and work devices. He suggests that the right tools can streamline compliance, ensuring that mobile devices align with broader corporate standards without creating unnecessary friction. Lastly, Covington addresses the evolving nature of BYOD (Bring Your Own Device) policies and the intricacies of managing shared devices. Despite their long-standing presence, these device policies often present challenges, with many organizations lacking effective management strategies. Covington emphasizes the need for layered solutions that integrate into existing security frameworks without overwhelming IT teams or sacrificing the user experience. Join us as we unpack Jamf's approach to these challenges and discuss the future of mobile security in industries from healthcare to aviation. How can organizations prepare for the next wave of AI-driven data on mobile devices? And what steps can they take now to ensure seamless, secure access for users? Listen in and share your thoughts on the balance between security, compliance, and user enablement in today's mobile-driven world.

ai strategy guide covington ciso key strategies cisos mobile security jamf security key byod bring your own device michael covington
The Six Five with Patrick Moorhead and Daniel Newman
Microsoft Teams Rooms Innovations with Albert Kooiman at Enterprise Connect

The Six Five with Patrick Moorhead and Daniel Newman

Play Episode Listen Later Mar 29, 2024 10:34


On this episode of The Six Five - In the Booth from Enterprise Connect, The Futurum Group's Craig Durr talks with Albert Kooiman, Senior Director at Microsoft, about the latest advancements in Microsoft Teams Rooms, highlighting the integration of AI to enhance meeting experiences and improve collaboration. Their discussion covers: The role of AI in transforming meeting room experiences, enabling features like speaker identification and content processing. The lifecycle of meetings, from preparation to post-meeting analysis, all enhanced by AI-driven suggestions and insights. Governance and privacy considerations in AI deployment, especially concerning voice recognition and data access. The evolution of BYOD (Bring Your Own Device) meeting rooms, leveraging Teams client to differentiate user experiences and provide valuable data for IT and business decision-making.  

Entre Maestros Podcast
BYOD en la Sala de Clases

Entre Maestros Podcast

Play Episode Listen Later Jan 31, 2024 26:17


En este episodio dialogamos con la Profa. Vanessa Santiago sobre las consideraciones a tomar para implementar la estrategia BYOD (Bring Your Own Device) en la sala de clases. Si deseas que tus alumnos utilicen sus dispositivos personales como herramienta de aprendizaje o ya lo utilizan en tu sala de clases, este episodio es para tí. --- Send in a voice message: https://podcasters.spotify.com/pod/show/entremaestrospodcast/message

clases la sala byod byod bring your own device
Play the King & Win the Day!
Episode 27- Joshua Behar CEO at Mobile2CRM

Play the King & Win the Day!

Play Episode Listen Later Aug 3, 2023 18:13


Episode 27- We speak with Joshua Behar Chief Executive Officer at Mobile2CRM Joshua Behar a 30-year business veteran in executive sales leadership roles shares his experience from the early years in the space to the creation and necessity of platforms like Mobile2CRM to manage and support remote working environments. Joshua walks through how Mobile2CRM works and how multiple business departments are benefiting including sales, compliance, customer service and training development. Organizations with remote workers and (BYOD) Bring Your Own Device policies, will fall in love with Mobile2CRM. Organizations investing in CRM Platforms like Salesforce, HubSpot, Microsoft Dynamics and others, leverage Mobile2CRM to enhance sales, lead, and opportunity management activities with direct link to Mobile2CRM conversations and activities.  About Mobile2CRM: Mobile2CRM established with the vision of empowering enterprises with the ability to utilize their mobile communication capabilities to increase their customer reach and revenues. With Mobile2CRM, corporate voice and text communication are managed on employees' cellular phones – even with BYOD. The corporate owns these mobile business numbers and their usage. The corporate manages them separately from the personal cellular number of the employee. The corporate benefits from mobile call recording are fully compliant with recording and monitoring regulations, even when users are roaming. Learn More:https://mobile2crm.com/#crm #BYOD #remotework

RBB TODAY 最新IT情報
MSIの最新2in1ノートPC「Summit E13 Flip Evo A12M シリーズ」は、上品な美しさを備えた万能選手だった!

RBB TODAY 最新IT情報

Play Episode Listen Later Jul 5, 2022 0:10


 テレワークが日常化する中で、仕事用のパソコンをBYOD(Bring Your Own Device=私物のデバイスを利用する)するケースが増えている。

summit flip byod bring your own device
Podcast Educativo
11 - byod

Podcast Educativo

Play Episode Listen Later Apr 1, 2022 13:17


Bajo las siglos BYOD (Bring Your Own Device) encontramos un modelo de actividad escolar enfocada a la tecnología, según la cual el propio estudiante lleva su dispositivo al Centro. En este episodio número 11, analizamos las luces y las sombras de este enfoque, que trae con él un sinfín de posibilidades además de acciones transversales en uso de tecnología. Suscríbete a nuestra lista de mail: http://eepurl.com/hG4Bz1 No te Olvides de visitar nuestra Web www.area44.es para más información y seguirnos en nuestras redes sociales: LINKEDIN: https://www.linkedin.com/company/%C3%A1rea-44-servicios-educativos YOUTUBE: https://www.youtube.com/area44cp?sub_confirmation=1 INSTRAGRAM: https://www.instagram.com/area44cp/ TWITTER: https://twitter.com/area44cp/ FACEBOOK: https://www.facebook.com/area44cp TWITCH: https://www.twitch.tv/area44cpConviértete en un seguidor de este podcast: https://www.spreaker.com/podcast/podcast-educativo--5978959/support.

twitch web centro bajo suscr byod byod bring your own device
Into the Cloud - Umbrellar Cloud Ltd
Mobile Mentor and Zero Trust: a modern workplace methodology

Into the Cloud - Umbrellar Cloud Ltd

Play Episode Listen Later Mar 14, 2022 28:21


In our complex world of hybrid work and BYO technology, how do organisations maintain security? Mobile Mentor's CEO Daniel McCarthy and Head of Sales, NZ Jared Pedersen discuss with Nadia Phillips (Umbrellar Head of Marketing and Operations) how the pandemic has accelerated the practice of BYOD (Bring Your Own Device) when onboarding new employees and how working from home has presented major challenges to keeping business data secure. They demystify the methodology of Zero Trust and outline how tools organisations may already have, such as Microsoft 365 E3 and E5 licences, can build a Zero Trust architecture that works. For a regular dose of Mobile Mentor thought leadership, sign up to their regular newsletter.

CTO Connection
Short Byte: Colin Earl - How and why CTOs should engage with no-code tools

CTO Connection

Play Episode Listen Later Sep 23, 2021 28:04 Transcription Available


They're coming. From bubble.io and webflow through UI Path and Blue Prism, the chances are that someone within your company is already building a departmental system using a "no code" tool. As with BYOD (Bring Your Own Device) for CIOs a decade ago, ignoring the problem isn't an option. In this episode, I chat with Colin Earl, Founder & CTO at Agiloft, about how CTOs can evaluate & leverage RPA tools to support "citizen developers" within their companies to reduce the pressure on the core dev team while still getting their departmental needs met.

Faq-Mac Chat Podcast
Final Cut Pro en la encrucijada

Faq-Mac Chat Podcast

Play Episode Listen Later Jul 7, 2021 57:00


En esta charla con el experto cineasta (o videógrafo) Jordi Extremera, autor del podcast El Corte Final, dedicado a la edición de vídeo en Final Cut Pro. Como todos los usuarios de software profesional de Apple, tiene varias objeciones (que llevamos décadas oyendo) a la manera que tiene Apple de comunicar (o no comunicar) sus planes para el software profesional. Son las mismas razones que han hecho que nunca se tome a Apple en serio en la empresa (hasta que llegó el BYOD -Bring Your Own Device). También hablamos de otros programas que están compitiendo por conquistar las pantallas de los profesionales del vídeo, las expectativas hacia el M1, la posibilidad de utilizar el iPad Pro para trabajar con Final Cut, copias de seguridad... ¡y muchas cosas más!

B2B Tech Talk with Ingram Micro
Ep. 70 4 Tips for Securing the Digital Workspace

B2B Tech Talk with Ingram Micro

Play Episode Listen Later Jul 1, 2020 24:15 Transcription Available


BYOD (Bring Your Own Device) has uncovered a lot of challenges for organizations—namely, security challenges. Murtaza Hafizji, a senior advisor at RSA Security, offers up 4 expert tips for securing your digital workspace when employees are operating on their own devices. Plus, Murtaza and Keri talk about: -The main motivators for leaders to implement BYOD -The security risks BYOD poses for organizations and how multi-factor authentication (MFA) can mitigate them -How RSA has successfully enabled essential workers and accelerated digital transformation journeys around the world Read Murtaza’s article, Protection & Peace of Mind During a Time of Business Disruption. Learn more about Identity Management from RSA. To join the discussion, follow us on Twitter @IngramTechSol #B2BTechTalk Sponsored by Ingram Micro Financial Solutions and Imagine Next Listen to this episode and more like it by subscribing to B2B Tech Talk on Spotify, Apple Podcasts, or Stitcher. Or, tune in on our website.

SegCast
SegCast 18 - Boas Práticas na Utilização do BYOD

SegCast

Play Episode Listen Later Apr 22, 2020 9:02


Neste episódio do SegCast, o Guilherme comenta sobre algumas das boas práticas que são utilizadas na aplicação do BYOD(Bring Your Own Device) nas organizações.

neste guilherme utiliza byod boas pr byod bring your own device
Lexing Switzerland
BYOD Bring Your Own Device - apportez vos propres appareils - bref aperçu des règles applicables

Lexing Switzerland

Play Episode Listen Later Jun 18, 2019 8:19


Bref aperçu des aspects légaux du BYOD (Bring Your Own Device). Il s’agit d’une pratique qui consiste à utiliser ses équipements personnels (téléphone, ordinateur portable, tablette électronique) dans un contexte professionnel. Le BYOD engendre par essence une intrusion réciproque dans les univers personnels et professionnels qui peut se définir ainsi : l’utilisation dûment autorisée et réglementée octroyée à certains utilisateurs du système d’information de l’entreprise liés à celle-ci par un contrat de travail de recourir à leurs matériels personnels à des fins professionnelles. Il en résulte évidemment des problèmes légaux en termes de protection des données, de droit du travail, de droit pénal et de droit de propriété intellectuelle. https://lexing.ch/wp-content/uploads/2017/10/22.pdf

CanInnovate
E71: Creating agile & active learning experiences with Top Hat CPO, Eran Ben-Ari

CanInnovate

Play Episode Listen Later Mar 6, 2019 38:33


Eran Ben-Ari is Top Hat’s Chief Product Officer, and oversees all product-related functions, including product management, development, design and analytics. 10 years ago our founders, while students at the University of Waterloo, felt there had to be a better way to drive engagement in the classroom. Today, Top Hat’s active learning technology helps professors easily engage students and build comprehension before, during and after class.   Episode Overview:   This episode has a lot of ‘AH HA’ moments that got me really excited. In this episode you’ll learn: How Top Hat is disrupting the educational industry at three different layers. Students, professors and textbook authors Even revisiting the publishing model of textbooks Their unique go to market & sales strategy Eran is pursuing Anthropology of Technology, which has me quite intrigued. Driving engagement in the classroom that really embraces active learning Embracing the BYOD (Bring Your Own Device) model in the classroom Creating an Agile teaching platform for instructors   This episode is great for those educators, human resources, learning professionals and anyone who wants to make learning really STICK!   Top Hat is disrupting three different components or facets of higher education or teaching today. How the courses are actually being delivered and for the first time, active learning can be used at scale to leverage technology. Active learning is the ability of students to learn a little bit of interaction or engagement. Professors and teachers today are not as tech savvy as their students so most of them are struggling on how they can shine, how they can bring to life or realize why they came to this profession in the first place which is to really make an impact to their learners. Top Hat created a community of instructors, teachers are no longer alone in teaching and that it infused on Top Hat’s content. The third disruption is about how they create content   “Students or learners nowadays have really short attention span”   Students are craving to study and learn in a more non-traditional way. Eran shared how students in this generation have shorter attention space and are often multi-tasking even when there is an instructor or a teacher speaking in front of them.   Classrooms are also getting larger and larger which also caused to the increase of students that a teacher can handle to be able to successfully make an interaction between the student and a teacher. Many of the more technology that we are introduced in the classrooms, they did not place the professors at the heart of what they are building because it was either for the students or the administrator. That created a lot of friction on how they use that technology in the classroom which created a disjointed experience when they are trying to learn in the classroom.   How Top Hat got into Universities: The founders thought that if they focus on the professor and making sure that there are real value for the professor and at the same time, bring in the students as the paying customer. This will create a very fast adoption.   Lessons Learned: Focus on the professors and not everyone at the same time There is a lot of really valuable impact on the real time feedback system If you build, almost as of a reward system to student to play along with these new mode of teaching they can really harness the lessons.   Resource Recommendation: Book Recommendation: The Interpretation Of Cultures Paperback by Clifford Geertz Favorite Hot Spot: Hey Brothers   About Top Hat: Top Hat is a higher education teaching app that makes active learning come to life. Their suite of easy-to-use tools address four teaching challenges: student engagement; textbook affordability and customizability; student comprehension; and secure test administration. More than 2 million students at 750 of the top 1,000 colleges and universities in North America have used Top Hat.   Connect with Eran: Website: TopHat.com Facebook: Top Hat LinkedIn: Top Hat LinkedIn Twitter: @tophat Instagram: @tophathq

Operate Intelligently Podcast
Tying IT & Facilities Together (Ep. 67)

Operate Intelligently Podcast

Play Episode Listen Later Mar 5, 2018 20:55


One of our Applications Engineers at Dude Solutions joins Bob and Tony to talk about new topics, trends and technology in the IT space, as well as how the department can connect more effectively with facilities. In Episode 67, you'll also learn: Aligning the challenges of IT departments and facilities How many IT departments saw an increase in their budget...and how many didn't How automation is impacting the technology world What we can do about the increase in technology How the technology landscape is changing in schools Why now IT professionals are having to show what they are using grant money and other resources for How new devices and technology impact the solutions we offer About handling BYOD (Bring Your Own Device) policies Better understanding the total cost of ownership with technology and devices Change in E-Rate funding Advice for avoiding scams online SHOW NOTES Automation Infographic Working Smarter, Not Harder Webinar with eSchool Media Other technology resources See acast.com/privacy for privacy and opt-out information.

advice change aligning facilities tying e rate byod bring your own device dude solutions
Swift Teacher
12: 'They Will Take Those Ideas Back and Improve Their Own Code.' with Kane Pittard

Swift Teacher

Play Episode Listen Later Aug 29, 2017 41:23


In this episode I had an insightful discussion with Kane Pittard. Kane is a Humanities and computer science teacher from Butler College in Butler, WA. He is responsible for the creation and ongoing development of the Butler College IT teaching program. Kane's passion is using digital learning across all learning areas. Previous to becoming a teacher in 2013, he worked as a systems administrator and owned computer consulting business. I would to thank Kane for taking time away from his family, work, and fighting the time difference to talk with me on the podcast. Kanes's school - https://www.butlercollege.wa.edu.au/ Twitter: @kanepittard - https://twitter.com/kanepittard Show links Swift - https://swift.org/ BYOD - Bring Your Own Device - https://en.wikipedia.org/wiki/Bring_your_own_device ICT - https://en.wikipedia.org/wiki/Information_and_communications_technology Digital Natives - https://en.wikipedia.org/wiki/Digital_native Swift Playgrounds - https://appsto.re/us/eHUj2.i Learn to Code 1 & 2 - https://itunes.apple.com/us/book/swift-playgrounds-learn-to/id1118578018?mt=11 Learn to Code 3 - https://itunes.apple.com/us/book/swift-playgrounds-learn-to/id1173709121?mt=11 Scratch - https://scratch.mit.edu/ Xcode - https://itunes.apple.com/us/app/xcode/id497799835?mt=12 Into to App Development with Swift curriculum [Teacher] - https://itunes.apple.com/us/book/app-development-with-swift/id1118577558?mt=11) & [Student] - https://itunes.apple.com/us/book/app-development-with-swift/id1118575552?mt=11) Fraser Speirs - Episode 8 - https://www.swiftteacher.org/podcast/2017/6/13/8-swift-makes-it-very-hard-to-get-it-right-by-accident-which-is-good-with-fraser-speirs Ada Programming Language - https://en.wikipedia.org/wiki/Ada_(programming_language) Python - https://www.python.org/ Daniel Budd - Episode 4 - https://www.swiftteacher.org/podcast/2017/4/18/4-create-engaging-content-in-swift-with-daniel-budd David Brown - Episode 9 - https://www.swiftteacher.org/podcast/2017/6/21/9-i-have-a-student-who-says-leave-me-alone-i-want-to-solve-it-with-david-brown Apple's Human Interface Guideline (aka HIG) - https://developer.apple.com/ios/human-interface-guidelines/overview/design-principles/ Keynote - https://itunes.apple.com/us/app/keynote/id361285480?mt=8 Douglas Kiang - Episode 2 - https://www.swiftteacher.org/podcast/2017/3/14/2-i-think-its-about-the-friendliest-language-ive-ever-coded-in-with-douglas-kiang iOS Read Screen Accessiblity Feature - https://www.howtogeek.com/258218/how-to-make-your-ios-device-read-articles-books-and-more-out-loud-to-you/ Popplet - https://popplet.com/ Sphero - http://www.sphero.com/ Lego Mindstorms - https://en.wikipedia.org/wiki/Lego_Mindstorms Parrot Drone - https://www.parrot.com/us/drones#fly-and-film-an-adventure-with-your-drone John Hattie - University of Melbourne - https://findanexpert.unimelb.edu.au/display/person428067 Favorite Podcasts or Media You Should Learn to Program: Christian Genco - https://www.youtube.com/watch?v=xfBWk4nw440 The History of Rome - https://itunes.apple.com/us/podcast/the-history-of-rome/id261654474?mt=2 Ancient Greek History - https://itunes.apple.com/us/itunes-u/ancient-greek-history-audio/id341651987?mt=10 Ask Swift Teacher Ask a question of the Swift Teacher community. Tweet your questions to @_SwiftTeacher - https://twitter.com/_SwiftTeacher using the #askSwiftTeacher hashtag or in the ask Swift Teacher channel in the Swift Teacher Slack Team (join using the link below). Join the Swift Teachers Slack Channel - http://swiftteacher.me You can find also find the show notes and other information on the Swift Teacher blog: [Swift Teacher Blog - http://www.swiftteacher.org/podcast

Mobile First
Ep. 6 - Neiman Marcus Group w/ Head of the Digital Innovation Lab, Scott Emmons and Jordan Bryant on the Mobile First Podcast powered by Emerge Interactive

Mobile First

Play Episode Listen Later Nov 17, 2016 44:44


Scott Emmons is the Head of Digital Innovation Lab for the Neiman Marcus Group. Scott built the Neiman Marcus Group Innovation Lab, also known as iLab, and is responsible for leading the organization in evaluating, designing, testing and piloting cutting-edge technologies and applications for luxury retail. Scott is working on BYOD (Bring Your Own Device) initiatives, as well as Wi-Fi/Local and Wide Area Network infrastructures, mobility, and digital signage initiatives. These innovation projects include the amazing MemoMi Memory Mirror, beautiful 4K touch table look-books, beacon enabled holiday passes, intelligent mobile phone charging stations and gorgeous digital directories for Bergdorf Goodman. Here are the highlights of my conversation with our guest: Getting to know Scott --- what usually consumes his day and how a Harley Davison and a pool fills the little free time he has left from time to time. From starting out as a contractor, to becoming an associate and then an Enterprise Architect, Scott shares the path that led him to head the Digital Innovation Lab at Neiman Marcus. Scott shares how exposure, being a nerd, his love of having a good problem and being an early adapter had inspired him to be in field of innovation. The biggest challenge he is seeing in the retail industry: understanding what the next generation of customer looks like and their preferences and trying to build something for them. Giving the sales associates iPhones and how this huge change of strategy impacted their business as communications improved between associate and customer transforming interactions. Scott also discusses why they opted for iOS rather than Android. Scott’s definition of an omni-channel approach which is basically, not thinking about individual channels but where the customer is at and where the customer wants to be, and then providing that channel. The channels where the biggest of their revenues come from and the pain points which Scott feels that the industry is having challenges catching up to. Innovation is important and Scott emphasizes how equally important it is to collaborate with his associates across the business and get out of the store to see what the customer is doing versus staying in the lab to provide the solution for the real customer problems. His advice for those who are thinking of moving to digital adoption and the initial actions that they should focus their early efforts on. Why Scott thinks that augment and virtual reality is the most realistic next hot thing and how it integrates and ties in the field of retail. The processes they go through, from funneling of idea to requesting funding for full roll out, in implementing innovative experiments and projects and the metrics associated for them to gauge ROI. Scott’s projected breakthroughs and the things he thinks have promising potentials. Rapid Fire Questions: Would you put more emphasis on the idea or the execution? How would you weigh each of them and why? I would not put more emphasis on either but the idea has to be good to be worth doing and the execution has to be flawless. It has to be a 50/50 weight for this to work in my world. What is your biggest learning lesson on your journey so far? What the customer wants is what’s the most important thing and the only way you are going to learn that is to get out in the stores and interact with the customers and associates. What is your favorite business book? Innovation Engine by Jatin Desai What is your favorite mobile app resource? Flipboard What is your favorite app and why? Quartz What is the coolest thing that you are working on right now that you want everyone to know about? You’ll know about it in six weeks or so.

Aussie Tech Security SD Video
Episode 008 - 19/02/2016

Aussie Tech Security SD Video

Play Episode Listen Later Feb 18, 2016 30:07


Why are hackers after your mobile device BYOD - Bring Your Own Device Security, the FBI and Apple

Seginfocast - Segurança da Informação - podcast

Nesta segunda edição nosso entrevistador, Paulo Sant´anna, recebe os profissionais Luiz Felipe Ferreira e Paulo Pagliusi. Os participantes conversaram sobre SIEM (Security Information and Event management), conceito ainda pouco conhecido e difundido aqui no país, desenvolvido de forma a fornecer uma inteligência maior na tarefa de coleta, correlação e análise de logs e alertas, fazendo com que a área de SI das empresas gerenciem mais efetivamente seus ativos e de uma maneira automatizada, se antecipando às ameaças e, deste modo, concentrando-se no que é mais estratégico ao negócio. Contudo, as principais soluções SIEM do mercado foram descritas como caras, lentas e complexas. Além disso, foi abordado outro tema bem pertinente, a Consumerização de TI, mais conhecida como BYOD (Bring Your Own Device), já uma realidade visto que os funcionários usam tablets e smartphones diariamente e querem trazê-los para seus ambientes de trabalho. A TI tem que se adequar e quebrar certos paradigmas para lidar com esse movimento. Os consumidores hoje estão atualizados, utilizam tecnologia de ponta e otimizam o trabalho com seus dispositivos.

event os contudo siem byod byod bring your own device
Customer-Vendor Alignment, IT Governance & Data Security
Embracing The Age of Mobility - Part 5 of 6

Customer-Vendor Alignment, IT Governance & Data Security

Play Episode Listen Later Mar 19, 2015 29:44


A Smarter Approach to Mobile Device ManagementMore people today use personal mobile devices like smartphones and tablets for business purposes. Such devices, coupled with greater Wi-Fi accessibility and cloud services, have empowered us with the ability to access data and do business from practically anywhere at anytime.Needless to say, many small-to-medium sized business owners have embraced the BYOD (Bring-Your-Own-Device) revolution. The benefits are obvious; increased employee productivity, enhanced services to customers/clients, and better overall customer and employee satisfaction.But what about the potential consequences associated with this mobility revolution? Are small business owners doing enough preemptive planning to address potential risks that could arise with the use of BYOD devices?

Customer-Vendor Alignment, IT Governance & Data Security
Embracing The Age of Mobility - Part 5 of 6

Customer-Vendor Alignment, IT Governance & Data Security

Play Episode Listen Later Mar 19, 2015 29:44


A Smarter Approach to Mobile Device ManagementMore people today use personal mobile devices like smartphones and tablets for business purposes. Such devices, coupled with greater Wi-Fi accessibility and cloud services, have empowered us with the ability to access data and do business from practically anywhere at anytime.Needless to say, many small-to-medium sized business owners have embraced the BYOD (Bring-Your-Own-Device) revolution. The benefits are obvious; increased employee productivity, enhanced services to customers/clients, and better overall customer and employee satisfaction.But what about the potential consequences associated with this mobility revolution? Are small business owners doing enough preemptive planning to address potential risks that could arise with the use of BYOD devices?

Customer-Vendor Alignment, IT Governance & Data Security
Embracing The Age of Mobility - Part 3 of 6

Customer-Vendor Alignment, IT Governance & Data Security

Play Episode Listen Later Mar 13, 2015 29:21


Remember… Always Practice Safe BYODNo matter what blog or magazine read these days, it seems like everyone is talking about today’s increasingly mobile workforce and the BYOD (Bring-Your-Own-Device) movement.We live in an exciting time when work can be done at any time from any place. Employees love the fact that they can get work done on their iPad as they sit poolside sipping a Pina Colada. Businesses love the cost savings along with the happier and more productive employees they’re noticing. Meanwhile, customers and clients take note that their emails are commonly answered outside traditional work hours with a “Sent from my iPhone” tagline at the bottom.Like anything related to business technology, there are naysayers who are quick to warn that a more mobile and dispersed workforce also means increased security risks.Do they have a point? I'll cover that today!

Customer-Vendor Alignment, IT Governance & Data Security
Embracing The Age of Mobility - Part 3 of 6

Customer-Vendor Alignment, IT Governance & Data Security

Play Episode Listen Later Mar 13, 2015 29:21


Remember… Always Practice Safe BYODNo matter what blog or magazine read these days, it seems like everyone is talking about today’s increasingly mobile workforce and the BYOD (Bring-Your-Own-Device) movement.We live in an exciting time when work can be done at any time from any place. Employees love the fact that they can get work done on their iPad as they sit poolside sipping a Pina Colada. Businesses love the cost savings along with the happier and more productive employees they’re noticing. Meanwhile, customers and clients take note that their emails are commonly answered outside traditional work hours with a “Sent from my iPhone” tagline at the bottom.Like anything related to business technology, there are naysayers who are quick to warn that a more mobile and dispersed workforce also means increased security risks.Do they have a point? I'll cover that today!

NMC Horizon Report > 2013 Museum Edition
NMC Horizon Report > 2013 Museum Edition

NMC Horizon Report > 2013 Museum Edition

Play Episode Listen Later Nov 15, 2013


The NMC Horizon Report > 2013 Museum Edition, is a co-production with the Marcus Institute for Digital Education in the Arts (MIDEA), and examines six emerging technologies for their potential impact on and use in education and interpretation within the museum environment: BYOD (Bring Your Own Device), crowdsourcing, electronic publishing, location-based services, natural user interfaces, and preservation and conservation technologies. Key trends and significant challenges in the museum sector are also identified.

digital education marcus institute nmc horizon report byod bring your own device museum edition arts midea
MobileBeyond
Mobile Device Security in a BYOD Workforce

MobileBeyond

Play Episode Listen Later Jun 6, 2013 2:08


Mobile device security and BYOD (Bring Your Own Device) are hot growth sectors in the mobile industry. Dozens of vendors now offer numerous solutions to enterprise companies and SMB’s that prevent sensitive data from dripping into mobile devices. It’s challenging as podcast guest Ken Khouri of IBM Global Technology will tell you. When Apple announced […]

apple mobile workforce dozens smb mobile devices byod mobile device security byod bring your own device
#EdChat Radio
BYOD: When Students Are As Smart As the Teacher

#EdChat Radio

Play Episode Listen Later Feb 13, 2013 19:11


One approach to integrating technology in classrooms is called BYOD- Bring Your Own Device. In this segment we talk about how BYOD fundamentally changes the classroom dynamic and what teachers need to be prepared to do when student have access to as much knowledge as they do. Follow:@blairteach,@web20classroom @tomwhitby @bamradionetwork Steve Anderson is an educator, #Edchat Co-Creator, ASCD Emerging Leader and one the Top 50 Innovators in Education. Tom Whitby is contributing Editor at SmartBrief, founder of #Edchat,Twitter-Using Educators, and NYSCATE Network. Nancy Blair is a school improvement consultant who frequently worked with the High Schools That Work and Making Middle Grades Work initiatives.

HIT Consultant Podcast
Episode 17:BYOD in Healthcare with Tom Murphy of Bradford Networks 1

HIT Consultant Podcast

Play Episode Listen Later Apr 30, 2012 15:37


In this interview/podcast, HIT Consultant speaks with Tom Murphy, Chief Marketing Officer at Bradford Networks about BYOD (Bring Your Own Device) in Healthcare. This is part 1 of a two part podcast series. In part 1, Tom discusses the following: - Background/Overview of Bradford Networks - What is BYOD? - Security implications of BYOD in healthcare - BYOD implementation best practices