The rise of BYOD is making an impact on a variety of IT positions, from help desk to mobile app development to security and compliance. In fact, according to one research firm, it's one of the only bright spots on the IT jobs landscape.\nBYOD Became the 'New Normal' in 2013\nCIOs have had eventful year when it comes to BYOD. Concerns over hidden costs, employee privacy and corporate data security gave way to convenience. However, mobile device management vendors stepped in to help IT sell the concept of compliance and lawyers and the National Labor Relations Board jumped in to the aid of employees smacked with draconian BYOD policies.\n12 BYOD Disaster Scenarios\nEveryone seems to be jumping on the Bring Your Own Device bandwagon, but it's a bumpy ride. There are many ways to fall off and get a bloody nose (or worse). As the BYOD reality catches up to the hype, here are 12 very real disaster scenarios.\nPros and Cons of BYOD (Bring Your Own Device)\nThe concept of bring your own device BYOD is a growing trend for business IT. There are a variety of benefits to allowing users to supply their own PC and mobile devices, but there are also some concerns. Make sure you understand both in order to embrace BYOD with confidence.\nCIO's Digital Spotlight on BYOD\nLearn how to take control of and benefit from the bring-your-own-devices (BYOD) phenomenon--without losing corporate data. This free, downloadable special edition describes what your BYOD policy should cover and outlines the risks you need to manage.\nWhich Workers Are the Best Fit for BYOD?\nFrom the always-on salesperson to the clock-punching hourly worker, companies will need to weigh the pros and cons of including each worker type in a BYOD program. Are BYOD Workers More Productive?\nMost people prefer using their personal smartphone or tablet for work than a company-issued one. Does this mean their productivity will increase? Probably, says Aberdeen Group.\nWhen BYOD Is a Productivity Killer\nBYOD programs are designed to increase productivity, but that's not the case when employees take BYOD phones on international vacations and never check in on work because the company won't pay roaming charges on a non-corporate phone.\nCartoon: Consumerization of IT Gets Comical\nHey IT, don't let vendors pass you by.\nInfographic: BYOD's Meteoric Rise\nThe BYOD (bring your own device) movement hit a full sprint in 2012 and the following infographic puts BYOD data in colorful perspective. But is a BYOD reality check coming in 2013?\nConsumerization of IT: The Next E- Commerce?\nEventually the consumerization of IT movement will go the way of e-commerce and just be something everybody has.\nBYOD Empowers the Free Agent\nConsumer tech frees employees from the old lie of corporate loyalty rewarded.\nWhy the Midmarket Is Overlooking Benefits of BYOD\nBYOD has the potential in the midmarket to empower smaller workforces. If mishandled with loose rules and complex legalese, though, BYOD can lead to increased feelings of isolation. Here's how the midmarket can make BYOD work for them.\nBYOD Policy & Legal\nBYOD Stirs Up Legal Problems\nDoes BYOD put your company in murky legal water? You bet. Employees need protections, too. Secret Video and Audio Recordings a Legal Minefield for Employers\nThanks to smartphones and wearable technology such as Google Glass recording illegal or inappropriate conversations and behavior in the office couldn't be easier. If your company has a BYOD policy this could spell disaster.\nHow Forensic Tools Unearth Deleted Text Messages\nA mobile security guru offers a quick rundown of forensic tools and how they retrieve deleted SMS. How to Craft the Best BYOD Policy\nWhat is a good BYOD policy? Step one is to clarify the rights of both company and employee and state upfront what's business and what's personal. But there's a lot more to it. In this interview with a technology transactions lawyer, CIO.com explores the do's and don'ts of BYOD policies.\nThree BYOD Approaches -- and the Budget Impact\nLove it or hate it, BYOD is likely already affecting security, network performance and your budget (it can drive up costs by more than a third, according to some researchers). Here are three approaches to address these challenges.\nBYOD Lawsuits Loom as Work Gets Personal\nWill BYOD lead to a rash of lawsuits from employees who feel violated? Or maybe a headline-grabbing, class-action lawsuit? Your company better make sure it has an explicit terms-of-use BYOD agreement. Here are ways companies can protect themselves. Mandatory BYOD Heading Your Way\nTo land or keep a job people may soon be forced to buy a personal smartphone, sign away some of their privacy rights and use the phone for work. It's called a BYOD mandate and, according to research firm Gartner, you better get ready for it.\nBYOD in Bloom, According to Survey\nA Cisco survey of mobile users reveals strong desire for BYOD programs and clear productivity gains. But hold off on those BYOD mandates because the love for corporate devices hasn't burned out yet.\n5 BYOD Pitfalls and How You Can Avoid Them\nVague policies, rogue apps, zombie phones can doom even the best 'Bring Your Own Device' intentions. But the good news is it's not too late to make game-changing adjustments.\nBYOD Gets Messy with AT&T Class Action Lawsuit\nWith a BYOD twist, AT&T agreed to settle a class action lawsuit for overcharging corporate customers for almost seven years. But like most things involving BYOD, this gets complicated.\n7 Tips for Establishing a Successful BYOD Policy\nIf you haven't developed a corporate Bring Your Own Device policy, or if the one you have is out of date, these tips will help you address device security, IT service, application use and other key components of an effective BYOD policy.\nEmbrace Consumerization of IT and Stop Saying No\nAt CITE Forum, Noah Broadwater, CTO of Sesame Workshop, explains how his IT organization learned to stop being gatekeepers and instead be partners and advocates for the business. BYOD and Smartphones: Ingram Micro Goes Global\nAfter crafting a voluntary global BYOD smartphone policy, Ingram Micro sees a spike in adoption, including a new U.S. mandate.\nBYOD Security & Privacy\nTablets, Mobile Malware Heighten BYOD Security Concerns\nWith the increased popularity of powerful tablets and the rise in mobile malware, it's no surprise that Forrester research released today shows that IT managers feel uneasy about BYOD.\nAre Businesses Rushing to BYOD Too Quickly?\nA survey of IT executives and IT pros paints a disturbing picture of BYOD. That picture includes a lack of confidence in compliance with federally mandated regulations, a fear that sensitive data is at risk and uncertainty about the overall effectiveness of BYOD. CIO Takes Action to Solve BYOD's Privacy Problem\nThe BYOD policy at a California law firm earned the CIO the nickname of Big Brother. However, the sarcasm stopped when he sprang into action and saved the day when an attorney's smartphone was swiped. The case represents the love-hate relationship workers and IT management have with BYOD.\nThe BYOD Mobile Security Threat Is Real\nCloud storage, text messaging, poor accountability and the "Bad Leaver" open the doors to data breaches in a BYOD environment, says a cyber- crime expert in this CIO.com interview.\nHow IT Can Scare Off BYOD Monsters in the Closet\nWhen it comes to security risks, BYOD is the gift that keeps on giving. But what about the devices that your employees used to use, gave up on and, months later, finally dug out of the closet to sell? That's another issue to wrestle with. Here are seven ways to beat the monsters.\nBYOD Security Concerns: Does IT Protest Too Much?\nMobile security concerns about bring-your-own devices are overblown, says an IT security expert in this CIO.com Q&A.\nFor BYOD Best Practices, Secure Data, Not Devices\nIT organizations are justifiably concerned about the security risks inherent in bringing your own device (BYOD). Many are turning to mobile device management (MDM) products and services to address the problem. But a number of mobile security vendors believe organizations are focusing the device when they should be focusing on the data.\nBYOD Policy: Employee Right to Social Media Privacy Is Paramount\nBYOD guidelines are just being defined, but one warning must rise above the din: never, ever, try to gain unauthorized access to an employee's private social networking site.\nAre BYOD Employees Decommissioning Mobile Devices Properly?\nAn information security officer recommends adding procedures for decommissioning devices to your BYOD policy before your BYOD employees upgrade to the latest smartphones and tablets this holiday season.\nBYOD Privacy: Are You Being Watched?\nMobile technology and BYOD give companies Orwellian power, testing the relationship between employers and employees. So far, there's a severe lack of trust that is impeding BYOD progress, says a new survey. BYOD Security Demands Mobile Data Protection Strategy\nAs federal agencies develop strategies for an increasingly mobile workforce, the traditional methods of securing a desktop environment have to evolve to account for the growing crop of wireless devices in use. Symantec vice president of public sector urges federal CIOs to embrace BYOD, but to update their security posture to also focus on files and applications.\nBYOD: Big Security, Small Devices\nWith the popularity of smartphones and tablets among workers, IT departments are trying to accommodate the influx of consumer tech -- and manufacturers are trying to help. Here are some consumer devices that have been tweaked for the enterprise -- and the software that's being used. BYOD: Time to Adjust Your Privacy Expectations\nEmployees who want to use their smartphones and tablets for work better be prepared to sign on IT's dotted line and essentially give away their privacy rights.\nThe BYOD Troubleshoot: Security and Cost-Savings\nBring-your-own-device, or BYOD, programs in the enterprise can liberate employees and trim the bottom line. But it also brings hidden costs and security risks to a corporate network. Here's what enterprise IT is doing to secure personal devices and maximize the ROI potential of the BYOD movement.\nBYOD: What Can We Learn from China?\nU.S. employees may never be as accepting as the Chinese about BYOD's potential privacy violations, but American companies can still learn a lot about effective BYOD from China, namely, better educating workers about security.\nBYOD Costs\nBYOD Planning and Costs: Everything You Need to Know\nBring Your Own Device programs promise to remove the cost of smartphones from a company's balance sheet. But most companies transitioning from company-issued smartphones to BYOD aren't even breaking even. Here's a breakdown on BYOD's hidden costs and some tips from those in the trenches on how to make BYOD work for your business.\nZombie Phones Are Attacking Your Mobile Budget\nIn the brave new world of BYOD, zombie phones are most likely lurking in your enterprise. As company-owned mobile phones are replaced by employee-owned devices, corporate billing from carriers sometimes lives on. Are these undead phones eating away at your tech budget?\nA Visual Guide to Identifying the Hidden Costs of BYOD\nWhen it comes to mobile devices, hidden costs are everywhere. There's a good chance your company is paying for something it shouldn't be, and this infographic will help you spot the unintended financial consequences of employee mobility. Where's the BYOD Payoff?\nCompanies may be bleeding corporate dollars in the name of BYOD productivity gains that don't really exist, says Nucleus Research.\nDoes BYOD Cost Too Much?\nIt's a good bet you don't know how much your company is spending on all those "Bring Your Own Device" smartphones and tablets. Even worse, it's probably too much, says a mobility management expert. Infographic: BYOD's Dirty Little Secret\nAre your employees taking liberties with their BYOD expense reporting?\nBYOD Myths: Cost Savings, Productivity Gains, Less Headaches\nMobi Wireless Management's Brandon Hampton advises Fortune 100 companies transitioning from corporate-owned devices to bring-your-own devices, or BYOD and in this Q&A with CIO.com you'll be surprised at what he tells them.\nBYOD: If You Think You're Saving Money, Think Again\nMobile BYOD will cost you about 33 percent more than a company-owned mobile device approach, says Aberdeen Group. Here are five hidden costs. The BYOD Troubleshoot: Security and Cost-Savings\nBring-your-own-device, or BYOD, programs in the enterprise can liberate employees and trim the bottom line. But it also brings hidden costs and security risks to a corporate network. Here's what enterprise IT is doing to secure personal devices and maximize the ROI potential of the BYOD movement.\nCIOs, IT Decision-Makers, IT Organization and BYOD\nWhy One CIO Is Saying 'No' to BYOD\nA growing backlash threatens to thwart the BYOD movement. To illustrate the trend, the CIO of a large electrical contractor explains why his company will 'never have a BYOD environment.'\nWhat Is Going Wrong With BYOD?\nThe Bring Your Own Device movement was supposed to make employees more productive while saving companies money. But a funny thing is happening on the way to mobile nirvana: Companies aren't doing it, according to a new study by CompTIA.\nShould CIOs Use a Carrot or a Stick to Rein In BYOD Workers?\nMany workers who bring their mobile devices to the office don't care about security, which is forcing IT leaders to take action. Some CIOs offer stipends to help cover mobile expenses in return for BYOD compliance. Others are choosing to throw the kill switch on lost or stolen smartphones.\nBYOD Brings Fear, Uncertainty and Doubt to the Enterprise\nYou lost your smartphone, which you also used for work. Think that's bad news? It gets worse. You wait a few days to tell IT. These days that can get you fired. So now you're thinking, 'I really wish I read that BYOD policy.' Five years after BYOD first caught fire, IT is still trying to figure out how to handle it.\nIT Learns to COPE With Mobile Devices\nMore than 60 percent of employees say it is OK to transfer work documents to personal devices or online file-sharing apps. Given that statistic, it's no surprise that companies want to rein in BYOD. However, there may be alternative: A move to company-owned-personally-enabled devices promises to give employers greater control of mobile devices without trampling on privacy.\nBYOD's Battle Royale Pits IT vs. Employee\nIT departments want to control the devices employees bring into the workplace. Employees say, 'my device, my rules.' It's an epic battle that promises to rage on, but who's winning right now? Check out this infographic for a BYOD scorecard.\nHow CIOs Can Navigate Treacherous BYOD Waters\nCIO.com's Tom Kaneshige writes that implementing a BYOD program is like setting sail on uncharted seas where danger lurks like pirates. However, if you navigate the waters carefully and batten down the hatches, you can enjoy a smooth journey.\nIT Pros and BYOD Users See Support Much Differently\nWhen it comes to providing mobile support to BYOD employees, IT and end users have drastically different perspectives. More than half of tech pros recently surveyed would give themselves a grade of A or B. However, most users would give IT a C or worse. Why the disconnect? Mobility Brings Changing Roles for CIOs, Workers and Businesses\nMobility in the enterprise is on the move. What's the future look like? BYODers might have to fork out more cash, businesses must turn into mobile tech experts, and CIOs will take on a new role.\nDoes Mavericks Burst Open the Door to BYOD for OS X?\nBy offering a free Mac OS X upgrade that's (quietly) enterprise-friendly, Apple may have found a way to appeal to both the consumer and business sides of Mac users' persona. And once they have a chance to test it, it may even make CIOs happy.\nWhat Does iOS 7 Bring to the BYOD Party?\nApple's first rule about enterprise features: 'You don't talk about enterprise features.' While you may not hear it from Cupertino, BYOD features abound in iOS 7 and, according to AirWatch's Blake Brannon, they are 'as innovative as we've seen from Apple.'\nCIOs Need to Push BYOD Policies to Lure Millennials\nIn less than two years, millennials will make up the largest segment of the workforce. If you hope to attract GenY technology professionals, your IT strategy better include a bring-your-own-device plan that plays to the strengths of this tech-dependent generation. BYOD Creates Trust Gap Between Workers and Employers\nInfographic: If you're a CIO (or other IT leader) and you have a BYOD policy in place, you also have some trust issues to overcome: Your users aren't confident their personal data is remaining private.\nWhat Can Employers Really See on a BYOD Smartphone or Tablet?\nThe move to a BYOD workplace means an employee's work life and personal life coexist on a single device. As employees are asked to sign strict user policies, are they also signing away their right to privacy? Here's a look at what a company can and cannot see on personal devices.\nCIOs Look Ahead: Millennials, Consumer Tech and the Future\nThe newest wave of workers, known as Millennials, are demanding technology freedom and a blurring of the work-life line through social media and personal mobile devices. Here's how CIOs can give Millennials what they want without relinquishing control. Federal CIOs Grapple With BYOD, Mobile Workforce\nSecurity and cultural issues are among many challenges government CIOs face in implementing mobile device management and BYOD strategies.\nCIO Challenge with BYOD: Don't Fall Down the Rabbit Hole\nA recent slew of surveys about the bring your own device trend portray a topsy-turvy computing world shaping up in the enterprise. The CIO's ultimate challenge is to prevent the very real world of BYOD from becoming surreal.\nThe BYOD Sea Change Has Already Started\nEnterprises may see cost savings as employees pay for their own devices in the brave new BYOD world, but that doesn't mean a free lunch for IT. This emerging trend only increases the pressure on IT to manage and secure devices and data. IT Decision-Makers Say Embrace BYOD or Be Left Behind\nIn a global survey of technology leaders, Dell Quest Software reports that companies that adopt a user-centric approach to BYOD tend to reap the most benefits and suffer the fewest setbacks and challenges.\n5 Reasons Why CIOs Can't Ignore Consumerization of IT\nSocial media's emergence as a key business app is just one of the trends that have led to a point of no return on consumer IT. Dell's Paul D'Arcy explains -- and shares how CIOs can plan for and benefit from the consumerization of IT.\nThree Ways BYOD Changes Company Architecture\nThe Bring Your Own Device (BYOD) trend is really taking root among companies everywhere. It's a trend that has challenged IT departments to change the way they think about enterprise IT. I spoke to three companies that have found unique solutions in managing the BYOD trend without compromising the user experience.\nHow BYOD Will Affect Your Staffing\nConsumerization of IT has rocked the usual mode of operation for many IT departments. Because technical knowledge doesn't reside solely with the IT department, processes are being developed to connect IT and other departments. New job positions are being created to handle the opportunities and challenges that this trend brings. Following are three new titles we're seeing pop up in companies everywhere due to the consumerization of IT movement.\nBYOD to Change the Face of IT in 2013\nThe influx of younger workers and BYOD programs in 2013 will continue to shake up IT departments, according to new research reports. Should CIOs shift to a device-neutral service model?\nIn a BYOD World, Is IT Redundant?\nReports of the death of IT departments in the Bring Your Own Device era have been exaggerated. However, if IT doesn't accept its new role one that's focused less on individual user support and more on setting policies then it might be time to write the obituary.\nCan BYOD Bury the Hatchet Between IT and Business?\nBYOD can wreak havoc on the tenuous relationship between IT and the business. But networking giant Cisco, which has a sophisticated BYOD plan for employees, is hoping more reasonable BYOD policies that permit personal cloud services will help bridge the gap.\nIBM CIO Discusses Big Blue's BYOD Strategy\nIBM CIO Jeanette Horan has plenty of IT projects and systems to worry about, but perhaps one of the most pressing and timely is Big Blue's ongoing BYOD (bring your own device) rollout, which is aimed at including all of the company's 440,000 employees over time.\nBYOD's Phone Number Problem\nA simple smartphone number can be an incredibly important corporate asset, but companies will have to give it up in a BYOD scenario. How a Big Financial Services Firm Faced BYOD iPads\nWith BYOD iPad security under control, financial services firm Blackstone looks toward tough challenges ahead, including the possibility of company-owned iPads and opening up its BYOD program to Android and Windows 8 devices.\nDell Software CIO Says BYOD Is Not About Devices\nFor Dell Software CIO Carol Fawcett, "BYOD" is not about being an expert on every mobile device in the world; it's about giving workers secure access to the apps and data they need on whatever device they are using. Fawcett reveals more BYOD tips in this CIO.com Q&A.\nHow BYOD Saved VMware $2 Million\nAs more companies adopt a bring-your-own-device (BYOD) approach to mobile, many are getting caught by hidden costs. But virtualization titan VMware has bucked that trend. VMware CIO Mark Egan explains how his company accomplished its feat.\nWill BYOD Give Rise to the Enterprise Genius Bar?\nAs the evasion of consumer tech changes IT, it makes sense that support for consumer devices would start to reflect the retail experience. Think Apple's Genius Bar. Mike Burgio of Inergex, an IT services firm, talks about why IT leaders need to think about hitting the bar.\nBlackBerry CIO on Mobile Security, BYOD and the Modern CIO Role\nCIO.com Senior Editor Al Sacco sat down with Research In Motion (RIM) CIO Robin Bienfait at CTIA's MobileCon 2012 conference to talk about RIM's future, business continuity, mobile security, BYOD, the modern CIO role and what it means to be a woman in a role dominated by men.\nWhy CIOs Should Reconsider BYOD\nCIO magazine publisher emeritus Gary Beach sees reasons that a popular BYOD policy will be unsustainable for companies. Some IT execs are already switching to providing company-provided consumer devices. Will you be next? Electronic Arts Embraces BYOD, Consumerization of IT and Cloud\nFaced with a market edging away from console games and toward casual, interrupt-driven games, Electronic Arts believes it's adapt-or-die time. EA CIO Mark Tonnesen came on board six months ago to enable the video game giant's digital transformation. He sits down for a chat about IT transformation, BYOD and consumerization of IT with CIO.com's Thor Olavsrud.\nDell, EMC, Cisco Tackle BYOD With Desktop Virtualization\nAs the Bring Your Own Device trend gains traction, Dell and EMC\/Cisco are taking different approaches to desktop virtualization. Generally, Dell aims for PC users in the midmarket, while the EMC\/Cisco partnership may work better for enterprises that have to consider the iPad. Both tacks are worth a look, though.\nVMware Going 'All In' with BYOD\nFrom social networks to seven-digit savings to employee angst, VMware's internal BYOD program for smartphones has it all. Now the company is looking to expand BYOD to laptops and tablets.\nBYOD Drives Communism Out of IT\nFreedom of choice when it comes to technology decisions has traditionally ended at the doors of the enterprise, where IT tells you what hardware and software you can use. But BYOD and consumerization of IT may be the new Glasnost.\nBYOD Devices, Device Management & Apps\nAttack of the BYOD-Killing MDM Software\nBYOD has been an enterprise hit because it allows employees the convenience of combining their work and personal lives on a single mobile device while offering companies a sense of security thanks to mobile device management software. However, a breed of monstrous new MDM software threatens to send users away screaming.\n10 Coolest Tech Devices to Bring to Work\nWhile smartphones and tablets have stirred the bring-your-own-device crowd to action lately, employees have been bringing their own tech gadgets to work for years. Here's a look at some of the coolest BYOD tech, past and present.\nThe Enterprise App Store: 10 Must-Have Features\nEnterprise app stores are an emerging trend following on the heels of the BYOD movement. But there's a method to the madness. Here are expert tips for building the perfect app distribution store for your business. BYOD: Making Sense of the Work-Personal Device Blur\nThe bring-your-own-device trend intersects the lines of personal and work lives, stirring up a mess of problems for enterprise IT leaders, from dealing with lost devices to keeping corporate data out of consumer cloud services.\nMobile Device Management: Getting Started\nThe rapid-fire spread of mobile devices being used by enterprise employees can be a huge boon for businesses in productivity and customer service gains, but those advantages don't come without a price.\n10 Mobile Device Management Apps to Take Charge of BYOD\nManaging devices in a BYOD environment is no mean feat, and the right mobile device management (MDM) product can be a key component in making it work. Here are 10 leading MDM products on the market today. Dual-Persona Smartphones Not a BYOD Panacea\nMobile vendors are pushing technologies that split a smartphone into two separate platforms for business and personal data. Problem solved, right? Not so fast. It's still easy for employees to circumvent the two worlds.\nVMware and Verizon Tackle BYOD with Dual Persona Phones\nVMware has partnered with Verizon to offer dual persona smartphones for Verizon enterprise customers. It's currently available on two Android- based phones, but more Android devices and iOS support are expected soon.\n10 Popular iPhone Apps - Blacklisted!\nBYOD programs may come with the restriction of apps that consume too much data, risk malware or distract workers. Here are 10 iPhone apps that you're likely to find on a blacklist.\nCisco Cius Death Another Affirmation of BYOD\nBYOD has killed the Cisco's Cius tablet, putting the final nails in the coffin of the "enterprise-only" mobile device.\nMicrosoft and BYOD\nWill Windows 8 Be the Client OS That IT Loves Best?\nSpeakers at Microsoft TechEd touted the virtues of the upcoming Windows 8. No surprise there except the speakers were using Windows 8 on tablets, with nary a desktop in sight. Will the strength of Windows 8 on tablets finally get IT and end users on the same BYOD page?\nIs Windows 8 the Answer to Consumerization of IT Woes?\nWhen it comes to post-PC computing, Apple's iPad has taken a commanding lead in the enterprise. However, will the security, networking and management features of Microsoft's Windows 8, slated for release next month, help Microsoft tablets take a bite out of Apple in the enterprise? Windows RT May Be Microsoft's Answer to Apple and Google in the BYOD Game\nCIO.com columnist Rob Enderle says enterprises won't rush to roll out Windows 8. However, they may see the new OS in the form of Windows RT, the ARM version that combines the snazzy UI that users like with management and security controls that IT likes. In other words, Microsoft may finally make a foray into BYOD endeavors.\nWindows 7, iOS, BYOD Redefine Enterprise OS Landscape\nLed by Windows 7, Microsoft's operating systems still control the enterprise, but the software giant's days of dominance are waning. As a recent Forrester report highlights, mobile devices and BYOD have made the state of enterprise operating systems far more complex.\nCloud & Virtualization and BYOD\nBYOD: Making Sense of the Work-Personal Device Blur\nThe bring-your-own-device trend intersects the lines of personal and work lives, stirring up a mess of problems for enterprise IT leaders, from dealing with lost devices to keeping corporate data out of consumer cloud services.\nCan BYOD Bury the Hatchet Between IT and Business?\nBYOD can wreak havoc on the tenuous relationship between IT and the business. But networking giant Cisco, which has a sophisticated BYOD plan for employees, is hoping more reasonable BYOD policies that permit personal cloud services will help bridge the gap.\nCan BYOD Breathe New Life Into the Virtual Desktop?\nSeattle Children's Hospital isn't your typical BYOD story. Its mobile device strategy isn't bound by onerous user policies and monitoring software. Rather, the hospital's CIO reports an interesting twist: BYOD is resuscitating ill-fated virtual desktop infrastructure technology.\nCloud, BYOD Increases Need for Automated IAM Systems\nAs traditional security concepts of perimeter and end-point defense break down as a result of the proliferation of cloud services and the BYOD phenomenon, enterprises are increasingly feeling the need for greater control over access to applications. That's where automated identity and access management comes in.\nVMware Envisions Virtualization in Post-PC, BYOD Era\nVMware wasn't just looking to save money when it launched a BYOD plan with the mandate that all of its U.S. employees use their personal mobile phones for work. It was taking a crash-course that would help shape its vision of post-PC era computing.\nCan Nvidia's Kepler Processor Revolutionize Virtual Desktop Hosting?\nNvidia recently demoed its long-awaited Kepler graphics processor with no less than a simulation of two galaxies colliding. On a practical level, though, the technology could answer many questions about virtual desktop hosting and, in the process, fill glaring holes in BYOD policies.