Consumer Driven IT in Review – 10th Edition

Last Thursday we hosted an interactive panel discussion Consumer Driven IT: Thriving in the New Normal (click to watch the recording).

Last Thursday we hosted an interactive panel discussion Consumer Driven IT: Thriving in the New Normal (click to watch the recording). Ad-283-by-155The event was broadcast in 25 cities across North America and attended by more than 500 IT executives.   We’d like to thank everyone who attended as well as our great set of panelists:

We captured great information from the event, so keep your eye on this space as we’ll be rolling out recaps and fresh insights gained.

Here’s what else was in the IT consumerization news in the last two weeks:

February 15:  Consumerization of IT and the CIO Role by Harvey Koeppel via SearchCIO.  The founder of the Center for CIO leadership discusses how CIOs can leverage social media, cloud services and more to drive business value.

Consumerization of IT: preventing a security nightmare by Steve Durbin via WirelessWeek.  Advice based on research on COIT from Information Security Forum

Mobile apps take data without permission by Nicole Perlroth and Nick Bilton via the NYTimes. This is more widespread than thought, particularly apps that take user contact information.

February 14:  Does your enterprise need its own apps store? by Tim Kridel via Intelligence in Software.  More discussion on the benefits of enterprise app stores to employees and IT.

February 13:  Blackberry Season by James Surowiecki via the New Yorker. Consumerization of IT turns the world upside down – instead of corporate innovations spilling into the consumer world it is now the reverse, and RIM is the big loser.

February 10:  Relax, IT – endpoint diversity is nothing to fear by Galen Gruman via InfoWorld Consumerization.  More devices, tools, and platforms mean complexity for IT, but they can bring advantages and less IT work too.

February 9:  Mobile developers ride “app economy” gravy train by Paul Krill via InfoWorld.  466,000 new jobs created in the US since 1997, leading city is New York.

Google near launch of cloud storage services by Amir Efrati via Wall Street Journal.  There’s a new competitor to Dropbox in the works, to be called “Drive”.

February 8: Now mobile phones have viruses and malware too by Brian Madden via ConsumerizeIT.  More challenges for IT coping with BYOD.

February 7:  Enterprise cloud file-sharing apps gives IT more control over data by James Furbush via SearchConsumerization.  More corporate file-sharing versions of consumer products that provide data protection, security, and uptime guarantees.

February 6:  How to prep for Apple iOS device flood in the enterprise by Colin Neagle via NetworkWorld.  Some compromises will be needed by end users, too.

NEW from CA Technologies This Week:


Written by

Jackie Kahle

CA Community

Jackie is a 30-year IT industry veteran, holding senior management positions in marketing, business development…

Published in

View this topic
  • James Holland

    This is great. Hooray for Disney’s imagineers!


    become a new brand in the share market research with its accurate research. Proven
    itself always right whether market is bull or bear. Last week all paid clients
    booked handsome profit in NIFTY, BANKINIFTY & STOCKS. Now for the coming
    week we expect more correction can come in NIFTY as the IRAQ issue is getting
    more tense, If it happens more then you will see a sharp fall in all world marketNSE BSE, STOCK TIPSbecause as we know all world run on
    crude & most of the crude comes from IRAQ. So be ready for a sharp fall so
    sell will be the best strategy for next week also. Traders can make a sell
    position in NIFTY around 7600-7650 with stoploss 7750 for the target of
    7300-7200.One can also make a sell call NIFTY 50 stocks as per NIFTY levels. You
    can also take our two days free trial to check our accuracy. For further updates
    you can visit our website.



  • king lear

    testing comment functionality, please do not publish this

  • Rachel Macik

    Love the personal pic :)

    • CAHighlight

      Thank you!

  • Plutora Inc

    This is a good case study. 2.3 sec’s off a login transaction is big.

  • Michele Hudnall

    While the analysts were hyping DevOps, I posted the oversight of not including security as part of that discussion as you are highlighting here. Instead of just talking DevOps, it should be DOS (what’s old is new again :-) – DevOpsSec. As a previous AppDev person, it’s the app, who’s using it, why and where rather than the device and having the service available.

    As you rightly point, out Security should be baked into the solution.

    Nice Post and Timely!


    • CAHighlight

      Thank you for your feedback Michele. Agreed – security cannot be overlooked. Appreciate your input!

  • Mitesh

    I would love a printed copy

  • Lars Johansson

    I love the idea of BYOID! This makes me choose if I am almost anonymous (with my Hotmail Nicname) or official with identity from an official organisation. My Identity Provider will attach identity with right level of LoA according to the need of the Service provider.

    • CAHighlight

      Thank you for your comment. BYOID has tangible benefits for end users and relying parties but it also has to be weighed in the balance with potential risks and liability concerns. It will be interesting to see how BYOID plays out in the enterprise.