CIS8000 Global System strategyACC1101 Accounting for decision making
Activity A Journal
Journal Entry
August
2, 2013
I
visited the link http://www.datacenterknowledge.com/archives/2013/07/23/deliver-unparalleled-business-advantage-with-bring-your-own-device/
so as to gain knowledge about the basic concept of BYOD along with primary
knowledge about other aspects such as advantages and security infrastructure
requirements (4:30 pm). Further I also visited www.fujitsu.com
and downloaded a document which does a thorough assessment of BYOD and informs
the user about the various finer aspects related to the same (5:15 pm).
August
4, 2013
I
visited the link http://www.untangle.com/inside-untangle/byod-risks-rewards to gain knowledge about the various
risks involved in the implementation of BYOD and the various associated rewards
that the company may expect to reap in case the risks are prudent mitigated (10
pm). To do some more research on the risks involved, I visited the link http://www.usatoday.com/story/cybertruth/2013/06/21/how-byod-brings-security-risks-into-corporate-networks/2443299/
which discusses the various security risks associated with BYOD in an elaborate
manner (10:30 pm).
August
8, 2013
I
visited the link http://gigaom.com/2012/05/21/ibm-stung-by-byod-pitfalls/
to gain knowledge about the various pitfalls encountered by IBM while implementing
the internal BYOD program and the various lessons that can be learnt from this
experience (1 am). Further to understand the IBM fiasco, I visited the link http://www.technologyreview.com/news/427790/ibm-faces-the-perils-of-bring-your-own-device/
which provided me with in-depth knowledge about the various mistakes conducted
by IBM and the steps the company took to manage those challenges (1:30 am).
August
13, 2013
Further
since Intel was amongst the first companies to implement BYOD, hence I visited http://www.bankinfosecurity.in/webinars/mobile-learn-from-intels-ciso-on-securing-employee-owned-devices-w-264
to know in detail about the mode of implementation of BYOD, the benefits
derived and the progress of the program in the near future (7 pm).
August
16, 2013
I
visited the link http://spectrum-coms.co.uk/byodgoodbadugly/
to gain in-depth knowledge about the potential advantages and disadvantages of
the adoption of BYOD program (10 pm). Further to research on the network and
security infrastructure required to deal with the various security risks posed
by BYOD and the associated security strategies, I downloaded a document from
the link http://h20195.www2.hp.com/V2/GetPDF.aspx/c03660924.pdf
(10:30 pm).
August
20, 2013
To
gain more clarity on the topic, I interacted with one of the cousin’s friend
who is currently working in an IT company regarding his practical experience of
the BYOD which helps me gain valuable insight especially about the practical
aspects not easily available on the internet (6 pm).
August
23, 2013
I
created a folder by downloading all the relevant information and starting
writing my report by referring to the relevant downloaded information (10 pm).
I completed three sections regarding utilization, risks, advantages and
disadvantages (1 am)
August
27, 2013
I
finally completed the report by completing all the requisite sections and
revised it once to rectify any grammatical errors (11 pm). For running the
financial model, I needed information on the XIRR function by accessing
relevant videos from www.youtube.com
(11:45 pm)
No comments:
Post a Comment