{"id":3564,"date":"2011-11-16T14:46:10","date_gmt":"2011-11-16T14:46:10","guid":{"rendered":"http:\/\/www.markwilson.co.uk\/blog\/?p=3564"},"modified":"2012-05-29T13:18:37","modified_gmt":"2012-05-29T12:18:37","slug":"bring-your-own-or-use-what-you-are-told","status":"publish","type":"post","link":"https:\/\/www.markwilson.co.uk\/blog\/2011\/11\/bring-your-own-or-use-what-you-are-told.htm","title":{"rendered":"Bring your own\u2026 or use what you are told?"},"content":{"rendered":"<p>A few days ago, I read <a href=\"http:\/\/www.computing.co.uk\/ctg\/feature\/2121552\/consumerisation-manage-risks\">an article about the risks presented by IT consumerisation<\/a>. It rang alarm bells with me because, whilst the premise is sound (there are risks, some serious ones, and they need to be mitigated), the focus seemed to be on controlling data leakage by restricting access to social media and locking down device functionality (restricting USB ports, etc.). Whilst that was once an accepted model, I have to question if\u00a0<a href=\"http:\/\/www.silicon.com\/management\/ceo-essentials\/2011\/10\/24\/byo-bring-your-own-device-cheat-sheet-39748120\/\">UWYT (use what you are told)<\/a>\u00a0is really the approach we should be taking in this day and age?<\/p>\n<p>One of the key topics within the overal consumerisation theme is concerned with &#8220;bring your own&#8221; (BYO) device models. <a href=\"http:\/\/www.fujitsu.com\/downloads\/EU\/uk\/pdf\/white-papers\/bring-your-own-computer-whitepaper.pdf\">I recently wrote a white paper on this topic<\/a>\u00a0(<a href=\"http:\/\/www.fujitsu.com\/uk\/insight-opinion\/insights\/bring-your-own-device.html\">a condensed &#8220;insight and opinion&#8221; view is also available<\/a>) but, in summary, BYO offers IT departments an opportunity to provide consumer-like services to their customers &#8211; i.e. business end users.<\/p>\n<p>In a recent dialogue on Twitter, one of my contacts was suggesting that Fortune 500 companies won&#8217;t go for BYO. \u00a0But the tide does seem to be turning and there are significant enterprises who are seriously considering it. I&#8217;ve been involved in several discussions over recent weeks and <a href=\"http:\/\/www.smh.com.au\/it-pro\/business-it\/coming-to-grips-with-the-bringyourown-gadget-generation-20111109-1n6ig.html\">I&#8217;ve even seen articles in mainstream press about BYO adoption<\/a> (for example,\u00a0<a href=\"http:\/\/www.theaustralian.com.au\/australian-it\/byo-device-qantas-staff-take-off-from-desk\/story-e6frgakx-1226135217144\">Qantas has publicly announced plans to allow up to 35,000 employees to connect their own devices to the corporate network<\/a>). Interestingly, both those links are to Australian publications &#8211; maybe we&#8217;re just a little more conservative over here?<\/p>\n<p>Of course, there are hurdles to cross (particularly around\u00a0manageability\u00a0and security) and it&#8217;s not about undoing the work put into managing &#8220;standard operating environments&#8221; but about recognising how to build flexibility into our infrastructure and open up access to what business end users really need &#8211; information!<\/p>\n<p>We need to think about device ownership too and, in particular, about whose data resides where. Indeed, one of the best articles I&#8217;ve read on the topic was <a href=\"http:\/\/www.informationweek.com\/news\/global-cio\/trends\/231902370\">Art Witmann&#8217;s suggestion that a BYO strategy should start with data-centric security<\/a>, including this memorable quote:<\/p>\n<blockquote cite=\"http:\/\/www.informationweek.com\/news\/global-cio\/trends\/231902370\"><p>&#8220;Understandable or not, if &#8216;your device is now our device&#8217; is the approach your team is taking, you need to rethink things&#8221;<\/p><\/blockquote>\n<p>Virtualisation can help with the transition, as can digital rights management. Ultimately we need to re-draw our boundaries and we may find ourselves in a place where the office network is considered &#8220;dirty&#8221; (just as the coffee shop Wi-Fi is today) and we access services (secured at the application or, better still, at the data layer) rather than concerning ourselves with device or technology-dependant offerings.<\/p>\n<p>Putting myself in a customer&#8217;s shoes for a moment, I expect that I&#8217;d be asking if Fujitsu is following a BYO model and the answer is both &#8220;yes&#8221;, and &#8220;no&#8221;. <a href=\"http:\/\/uk.ts.fujitsu.com\/products\/\">As a device manufacturer<\/a> it presents some image problems if our people are using other vendors&#8217; equipment so, here in the UK and Ireland, our PCs are still provided by a central IT function. Having said that, there are some choices with a catalogue to select from (based on defined\u00a0eligibility\u00a0criteria [- a choose your own device scheme]). We also operate a BYO scheme for mobile devices, based on <a href=\"http:\/\/www.fujitsu.com\/global\/services\/managed\/mobile\/\">[Fujitsu&#8217;s] Managed Mobile service<\/a>.<\/p>\n<p>So we can see that BYO is not an all-or-nothing solution. And, whilst I&#8217;ve only scraped the surface here, it does need to be supported with appropriate changes to policies (not just IT policies either &#8211; there are legal, financial and human resources issues to address too).<\/p>\n<p>To me it seems that ignoring consumerisation is a perilous path &#8211; it&#8217;s happening and if senior IT leaders are unable to support it, they may well find themselves bypassed. Of course, not every employee is a &#8220;knowledge worker&#8221; and there will be groups for whom access to social media (or even access to the Internet) or the ability to use their own device is not appropriate. For many others though, the advantages of &#8220;IT as a service&#8221; may be significant and far-reaching.<\/p>\n<p>[<a href=\"http:\/\/blogs.ts.fujitsu.com\/uk-ie\/cto\/2011\/11\/bring-you-own-or-use-what-you-are-told\">This post originally appeared on the Fujitsu UK and Ireland CTO Blog<\/a>.]<\/p>\n","protected":false},"excerpt":{"rendered":"<p>A few days ago, I read an article about the risks presented by IT consumerisation. It rang alarm bells with me because, whilst the premise is sound (there are risks, some serious ones, and they need to be mitigated), the focus seemed to be on controlling data leakage by restricting access to social media and &hellip; <a href=\"https:\/\/www.markwilson.co.uk\/blog\/2011\/11\/bring-your-own-or-use-what-you-are-told.htm\" class=\"more-link\">Continue reading <span class=\"screen-reader-text\">Bring your own\u2026 or use what you are told?<\/span><\/a><\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_exactmetrics_skip_tracking":false,"_exactmetrics_sitenote_active":false,"_exactmetrics_sitenote_note":"","_exactmetrics_sitenote_category":0,"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[218],"tags":[457,212,43,157],"class_list":["post-3564","post","type-post","status-publish","format-standard","hentry","category-technology","tag-fujitsu-uk-and-ireland-cto-blog","tag-it-consumerisation","tag-security","tag-social-networking"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Bring your own\u2026 or use what you are told? - markwilson.it<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.markwilson.co.uk\/blog\/2011\/11\/bring-your-own-or-use-what-you-are-told.htm\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Bring your own\u2026 or use what you are told? - markwilson.it\" \/>\n<meta property=\"og:description\" content=\"A few days ago, I read an article about the risks presented by IT consumerisation. It rang alarm bells with me because, whilst the premise is sound (there are risks, some serious ones, and they need to be mitigated), the focus seemed to be on controlling data leakage by restricting access to social media and &hellip; Continue reading Bring your own\u2026 or use what you are told?\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.markwilson.co.uk\/blog\/2011\/11\/bring-your-own-or-use-what-you-are-told.htm\" \/>\n<meta property=\"og:site_name\" content=\"markwilson.it\" \/>\n<meta property=\"article:published_time\" content=\"2011-11-16T14:46:10+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2012-05-29T12:18:37+00:00\" \/>\n<meta name=\"author\" content=\"Mark Wilson\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@markwilsonit\" \/>\n<meta name=\"twitter:site\" content=\"@markwilsonit\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Mark Wilson\" \/>\n\t<meta name=\"twitter:label2\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.markwilson.co.uk\\\/blog\\\/2011\\\/11\\\/bring-your-own-or-use-what-you-are-told.htm#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.markwilson.co.uk\\\/blog\\\/2011\\\/11\\\/bring-your-own-or-use-what-you-are-told.htm\"},\"author\":{\"name\":\"Mark Wilson\",\"@id\":\"https:\\\/\\\/www.markwilson.co.uk\\\/blog\\\/#\\\/schema\\\/person\\\/98f61365e7c39d6be942174b8c4de468\"},\"headline\":\"Bring your own\u2026 or use what you are told?\",\"datePublished\":\"2011-11-16T14:46:10+00:00\",\"dateModified\":\"2012-05-29T12:18:37+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.markwilson.co.uk\\\/blog\\\/2011\\\/11\\\/bring-your-own-or-use-what-you-are-told.htm\"},\"wordCount\":695,\"commentCount\":1,\"publisher\":{\"@id\":\"https:\\\/\\\/www.markwilson.co.uk\\\/blog\\\/#\\\/schema\\\/person\\\/98f61365e7c39d6be942174b8c4de468\"},\"keywords\":[\"Fujitsu UK and Ireland CTO Blog\",\"IT Consumerisation\",\"Security\",\"Social Networking\"],\"articleSection\":[\"Technology\"],\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.markwilson.co.uk\\\/blog\\\/2011\\\/11\\\/bring-your-own-or-use-what-you-are-told.htm#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.markwilson.co.uk\\\/blog\\\/2011\\\/11\\\/bring-your-own-or-use-what-you-are-told.htm\",\"url\":\"https:\\\/\\\/www.markwilson.co.uk\\\/blog\\\/2011\\\/11\\\/bring-your-own-or-use-what-you-are-told.htm\",\"name\":\"Bring your own\u2026 or use what you are told? - markwilson.it\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.markwilson.co.uk\\\/blog\\\/#website\"},\"datePublished\":\"2011-11-16T14:46:10+00:00\",\"dateModified\":\"2012-05-29T12:18:37+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.markwilson.co.uk\\\/blog\\\/2011\\\/11\\\/bring-your-own-or-use-what-you-are-told.htm#breadcrumb\"},\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.markwilson.co.uk\\\/blog\\\/2011\\\/11\\\/bring-your-own-or-use-what-you-are-told.htm\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.markwilson.co.uk\\\/blog\\\/2011\\\/11\\\/bring-your-own-or-use-what-you-are-told.htm#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.markwilson.co.uk\\\/blog\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Bring your own\u2026 or use what you are told?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.markwilson.co.uk\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.markwilson.co.uk\\\/blog\\\/\",\"name\":\"markwilson.it\",\"description\":\"get-info -class technology | write-output &gt; \\\/dev\\\/web\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.markwilson.co.uk\\\/blog\\\/#\\\/schema\\\/person\\\/98f61365e7c39d6be942174b8c4de468\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.markwilson.co.uk\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-GB\"},{\"@type\":[\"Person\",\"Organization\"],\"@id\":\"https:\\\/\\\/www.markwilson.co.uk\\\/blog\\\/#\\\/schema\\\/person\\\/98f61365e7c39d6be942174b8c4de468\",\"name\":\"Mark Wilson\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\\\/\\\/i0.wp.com\\\/www.markwilson.co.uk\\\/blog\\\/uploads\\\/image-4.png?fit=800%2C800&ssl=1\",\"url\":\"https:\\\/\\\/i0.wp.com\\\/www.markwilson.co.uk\\\/blog\\\/uploads\\\/image-4.png?fit=800%2C800&ssl=1\",\"contentUrl\":\"https:\\\/\\\/i0.wp.com\\\/www.markwilson.co.uk\\\/blog\\\/uploads\\\/image-4.png?fit=800%2C800&ssl=1\",\"width\":800,\"height\":800,\"caption\":\"Mark Wilson\"},\"logo\":{\"@id\":\"https:\\\/\\\/i0.wp.com\\\/www.markwilson.co.uk\\\/blog\\\/uploads\\\/image-4.png?fit=800%2C800&ssl=1\"},\"description\":\"A Chartered IT Professional, with recent experience in technology leadership, IT strategy and practice management roles, Mark Wilson is an Enterprise Architect in the Advisory and Management Group at risual. During a career spanning more than two decades, Mark has gained widespread recognition as an expert in his field including both industry and national press exposure. In addition to certifications from Microsoft, VMware, Red Hat, The Open Group and Axelos, Mark held a Microsoft Most Valuable Professional (MVP) award for three years and is now part of the MVP Reconnect programme. Mark is also well-known on social media and maintains an award-winning blog.\",\"sameAs\":[\"http:\\\/\\\/www.markwilson.co.uk\\\/\",\"https:\\\/\\\/www.instagram.com\\\/markwilsonuk\\\/\",\"https:\\\/\\\/www.linkedin.com\\\/in\\\/markawilson\\\/\",\"https:\\\/\\\/x.com\\\/markwilsonit\",\"https:\\\/\\\/www.youtube.com\\\/channel\\\/UCWHlZCoHRTocdvtrOJ2IL4A\"],\"url\":\"https:\\\/\\\/www.markwilson.co.uk\\\/blog\\\/author\\\/mark-wilson\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Bring your own\u2026 or use what you are told? - markwilson.it","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.markwilson.co.uk\/blog\/2011\/11\/bring-your-own-or-use-what-you-are-told.htm","og_locale":"en_GB","og_type":"article","og_title":"Bring your own\u2026 or use what you are told? - markwilson.it","og_description":"A few days ago, I read an article about the risks presented by IT consumerisation. It rang alarm bells with me because, whilst the premise is sound (there are risks, some serious ones, and they need to be mitigated), the focus seemed to be on controlling data leakage by restricting access to social media and &hellip; Continue reading Bring your own\u2026 or use what you are told?","og_url":"https:\/\/www.markwilson.co.uk\/blog\/2011\/11\/bring-your-own-or-use-what-you-are-told.htm","og_site_name":"markwilson.it","article_published_time":"2011-11-16T14:46:10+00:00","article_modified_time":"2012-05-29T12:18:37+00:00","author":"Mark Wilson","twitter_card":"summary_large_image","twitter_creator":"@markwilsonit","twitter_site":"@markwilsonit","twitter_misc":{"Written by":"Mark Wilson","Estimated reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.markwilson.co.uk\/blog\/2011\/11\/bring-your-own-or-use-what-you-are-told.htm#article","isPartOf":{"@id":"https:\/\/www.markwilson.co.uk\/blog\/2011\/11\/bring-your-own-or-use-what-you-are-told.htm"},"author":{"name":"Mark Wilson","@id":"https:\/\/www.markwilson.co.uk\/blog\/#\/schema\/person\/98f61365e7c39d6be942174b8c4de468"},"headline":"Bring your own\u2026 or use what you are told?","datePublished":"2011-11-16T14:46:10+00:00","dateModified":"2012-05-29T12:18:37+00:00","mainEntityOfPage":{"@id":"https:\/\/www.markwilson.co.uk\/blog\/2011\/11\/bring-your-own-or-use-what-you-are-told.htm"},"wordCount":695,"commentCount":1,"publisher":{"@id":"https:\/\/www.markwilson.co.uk\/blog\/#\/schema\/person\/98f61365e7c39d6be942174b8c4de468"},"keywords":["Fujitsu UK and Ireland CTO Blog","IT Consumerisation","Security","Social Networking"],"articleSection":["Technology"],"inLanguage":"en-GB","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.markwilson.co.uk\/blog\/2011\/11\/bring-your-own-or-use-what-you-are-told.htm#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.markwilson.co.uk\/blog\/2011\/11\/bring-your-own-or-use-what-you-are-told.htm","url":"https:\/\/www.markwilson.co.uk\/blog\/2011\/11\/bring-your-own-or-use-what-you-are-told.htm","name":"Bring your own\u2026 or use what you are told? - markwilson.it","isPartOf":{"@id":"https:\/\/www.markwilson.co.uk\/blog\/#website"},"datePublished":"2011-11-16T14:46:10+00:00","dateModified":"2012-05-29T12:18:37+00:00","breadcrumb":{"@id":"https:\/\/www.markwilson.co.uk\/blog\/2011\/11\/bring-your-own-or-use-what-you-are-told.htm#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.markwilson.co.uk\/blog\/2011\/11\/bring-your-own-or-use-what-you-are-told.htm"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.markwilson.co.uk\/blog\/2011\/11\/bring-your-own-or-use-what-you-are-told.htm#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.markwilson.co.uk\/blog"},{"@type":"ListItem","position":2,"name":"Bring your own\u2026 or use what you are told?"}]},{"@type":"WebSite","@id":"https:\/\/www.markwilson.co.uk\/blog\/#website","url":"https:\/\/www.markwilson.co.uk\/blog\/","name":"markwilson.it","description":"get-info -class technology | write-output &gt; \/dev\/web","publisher":{"@id":"https:\/\/www.markwilson.co.uk\/blog\/#\/schema\/person\/98f61365e7c39d6be942174b8c4de468"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.markwilson.co.uk\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"},{"@type":["Person","Organization"],"@id":"https:\/\/www.markwilson.co.uk\/blog\/#\/schema\/person\/98f61365e7c39d6be942174b8c4de468","name":"Mark Wilson","image":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/i0.wp.com\/www.markwilson.co.uk\/blog\/uploads\/image-4.png?fit=800%2C800&ssl=1","url":"https:\/\/i0.wp.com\/www.markwilson.co.uk\/blog\/uploads\/image-4.png?fit=800%2C800&ssl=1","contentUrl":"https:\/\/i0.wp.com\/www.markwilson.co.uk\/blog\/uploads\/image-4.png?fit=800%2C800&ssl=1","width":800,"height":800,"caption":"Mark Wilson"},"logo":{"@id":"https:\/\/i0.wp.com\/www.markwilson.co.uk\/blog\/uploads\/image-4.png?fit=800%2C800&ssl=1"},"description":"A Chartered IT Professional, with recent experience in technology leadership, IT strategy and practice management roles, Mark Wilson is an Enterprise Architect in the Advisory and Management Group at risual. During a career spanning more than two decades, Mark has gained widespread recognition as an expert in his field including both industry and national press exposure. In addition to certifications from Microsoft, VMware, Red Hat, The Open Group and Axelos, Mark held a Microsoft Most Valuable Professional (MVP) award for three years and is now part of the MVP Reconnect programme. Mark is also well-known on social media and maintains an award-winning blog.","sameAs":["http:\/\/www.markwilson.co.uk\/","https:\/\/www.instagram.com\/markwilsonuk\/","https:\/\/www.linkedin.com\/in\/markawilson\/","https:\/\/x.com\/markwilsonit","https:\/\/www.youtube.com\/channel\/UCWHlZCoHRTocdvtrOJ2IL4A"],"url":"https:\/\/www.markwilson.co.uk\/blog\/author\/mark-wilson"}]}},"jetpack_featured_media_url":"","jetpack-related-posts":[{"id":2395,"url":"https:\/\/www.markwilson.co.uk\/blog\/2011\/03\/why-the-consumerisation-of-it-is-nothing-to-do-with-ipads.htm","url_meta":{"origin":3564,"position":0},"title":"Why the consumerisation of IT is nothing to do with iPads","author":"Mark Wilson","date":"Tuesday 22 March 2011","format":false,"excerpt":"Last week, I wrote a post on the Fujitsu UK and Ireland CTO Blog about the need to adapt and evolve, or face extinction\u00a0(in an IT context).\u00a0 IT consumerisation was a key theme of that post and, the next evening, at my first London Cloud Camp, I found myself watching\u2026","rel":"","context":"In &quot;Technology&quot;","block_context":{"text":"Technology","link":"https:\/\/www.markwilson.co.uk\/blog\/topic\/technology"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":3546,"url":"https:\/\/www.markwilson.co.uk\/blog\/2011\/08\/rumours-of-the-death-of-it-consumerisation-have-been-greatly-exaggerated.htm","url_meta":{"origin":3564,"position":1},"title":"Rumours of the death of IT consumerisation have been greatly exaggerated","author":"Mark Wilson","date":"Friday 19 August 2011","format":false,"excerpt":"If you follow anyone IT-related on Twitter, or even the mainstream media, it's difficult to have missed Hewlett-Packard (HP)'s news that it is planning to discontinue the production of WebOS devices and is considering a full or\u00a0partial\u00a0separation of its personal systems group. I'm not entirely comfortable with\u00a0commenting on a competitor's\u2026","rel":"","context":"In &quot;Technology&quot;","block_context":{"text":"Technology","link":"https:\/\/www.markwilson.co.uk\/blog\/topic\/technology"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":4030,"url":"https:\/\/www.markwilson.co.uk\/blog\/2012\/05\/it-consumerisation-adapting-to-meet-the-demands-of-an-evolving-workforce.htm","url_meta":{"origin":3564,"position":2},"title":"IT consumerisation: adapting to meet the demands of an evolving workforce","author":"Mark Wilson","date":"Wednesday 30 May 2012","format":false,"excerpt":"I've written (and tweeted) quite a bit about IT consumerisation over the last year or two and tomorrow I'll be joining a \"think tank\" on the Evolving Workforce as a part of Dell's 2012 Technology Camp in London. \u00a0Being one of a panel will be a new experience for me\u2026","rel":"","context":"In &quot;Technology&quot;","block_context":{"text":"Technology","link":"https:\/\/www.markwilson.co.uk\/blog\/topic\/technology"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/www.markwilson.co.uk\/blog\/images\/delltechcamp2012.jpg?resize=350%2C200&ssl=1","width":350,"height":200},"classes":[]},{"id":3788,"url":"https:\/\/www.markwilson.co.uk\/blog\/2012\/03\/short-takes-from-the-consumerisation-of-it-to-open-data.htm","url_meta":{"origin":3564,"position":3},"title":"Short takes: from the consumerisation of IT to open data","author":"Mark Wilson","date":"Saturday 31 March 2012","format":false,"excerpt":"This week has been a crazy one - and things don't look like getting much easier over the next few weeks as we enter a new financial year and my job shifts its focus to be less externally-focused and more about technical strategy and governance. This blog has always been\u2026","rel":"","context":"In &quot;Technology&quot;","block_context":{"text":"Technology","link":"https:\/\/www.markwilson.co.uk\/blog\/topic\/technology"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":4082,"url":"https:\/\/www.markwilson.co.uk\/blog\/2012\/06\/consumerisation-think-tank-panel-at-dell-technology-camp-2012-delltechcamp.htm","url_meta":{"origin":3564,"position":4},"title":"Consumerisation think tank panel at Dell Technology Camp 2012 (#DellTechCamp)","author":"Mark Wilson","date":"Friday 1 June 2012","format":false,"excerpt":"Yesterday afternoon, I took part in a panel discussion on the evolution of consumerisation\u00a0as part of a Dell Technology Camp and in advance of the publication of the third part of Dell\/TNS Global's\u00a0Evolving Workforce research. \u00a0It was the first time I've taken part in an event like this and I\u2026","rel":"","context":"In &quot;Technology&quot;","block_context":{"text":"Technology","link":"https:\/\/www.markwilson.co.uk\/blog\/topic\/technology"},"img":{"alt_text":"Evolving Workforce Think Tank @ #DellTechCamp","src":"https:\/\/i0.wp.com\/farm8.staticflickr.com\/7072\/7309402394_c2ee184358_n.jpg?resize=350%2C200","width":350,"height":200},"classes":[]},{"id":3939,"url":"https:\/\/www.markwilson.co.uk\/blog\/2012\/05\/a-microsoft-view-on-the-consumerisation-of-it-ukitcamp.htm","url_meta":{"origin":3564,"position":5},"title":"A Microsoft view on the consumerisation of IT (#ukitcamp)","author":"Mark Wilson","date":"Friday 11 May 2012","format":false,"excerpt":"I never realised that my blog posts were feared. At least not until Microsoft's Andrew Fryer\u00a0(@deepfat) said he was less concerned about my event feedback on yesterday's IT Pro Camp event than on my blog post! Well, all I can promise is to try and be objective, fair and balanced\u2026","rel":"","context":"In &quot;Technology&quot;","block_context":{"text":"Technology","link":"https:\/\/www.markwilson.co.uk\/blog\/topic\/technology"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]}],"jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/www.markwilson.co.uk\/blog\/wp-json\/wp\/v2\/posts\/3564","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.markwilson.co.uk\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.markwilson.co.uk\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.markwilson.co.uk\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.markwilson.co.uk\/blog\/wp-json\/wp\/v2\/comments?post=3564"}],"version-history":[{"count":4,"href":"https:\/\/www.markwilson.co.uk\/blog\/wp-json\/wp\/v2\/posts\/3564\/revisions"}],"predecessor-version":[{"id":4027,"href":"https:\/\/www.markwilson.co.uk\/blog\/wp-json\/wp\/v2\/posts\/3564\/revisions\/4027"}],"wp:attachment":[{"href":"https:\/\/www.markwilson.co.uk\/blog\/wp-json\/wp\/v2\/media?parent=3564"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.markwilson.co.uk\/blog\/wp-json\/wp\/v2\/categories?post=3564"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.markwilson.co.uk\/blog\/wp-json\/wp\/v2\/tags?post=3564"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}