Tuesday, October 14, 2014

CIS8000 Global System strategy

CIS8000 Global System strategyACC1101 Accounting for decision making

Activity A Journal 

Journal Entry
August 2, 2013
I visited the link http://www.datacenterknowledge.com/archives/2013/07/23/deliver-unparalleled-business-advantage-with-bring-your-own-device/ so as to gain knowledge about the basic concept of BYOD along with primary knowledge about other aspects such as advantages and security infrastructure requirements (4:30 pm). Further I also visited www.fujitsu.com and downloaded a document which does a thorough assessment of BYOD and informs the user about the various finer aspects related to the same (5:15 pm).

August 4, 2013
I visited the link http://www.untangle.com/inside-untangle/byod-risks-rewards to gain knowledge about the various risks involved in the implementation of BYOD and the various associated rewards that the company may expect to reap in case the risks are prudent mitigated (10 pm). To do some more research on the risks involved, I visited the link http://www.usatoday.com/story/cybertruth/2013/06/21/how-byod-brings-security-risks-into-corporate-networks/2443299/ which discusses the various security risks associated with BYOD in an elaborate manner (10:30 pm).

August 8, 2013
I visited the link http://gigaom.com/2012/05/21/ibm-stung-by-byod-pitfalls/ to gain knowledge about the various pitfalls encountered by IBM while implementing the internal BYOD program and the various lessons that can be learnt from this experience (1 am). Further to understand the IBM fiasco, I visited the link  http://www.technologyreview.com/news/427790/ibm-faces-the-perils-of-bring-your-own-device/ which provided me with in-depth knowledge about the various mistakes conducted by IBM and the steps the company took to manage those challenges (1:30 am).

August 13, 2013
Further since Intel was amongst the first companies to implement BYOD, hence I visited http://www.bankinfosecurity.in/webinars/mobile-learn-from-intels-ciso-on-securing-employee-owned-devices-w-264 to know in detail about the mode of implementation of BYOD, the benefits derived and the progress of the program in the near future (7 pm).

August 16, 2013
I visited the link http://spectrum-coms.co.uk/byodgoodbadugly/ to gain in-depth knowledge about the potential advantages and disadvantages of the adoption of BYOD program (10 pm). Further to research on the network and security infrastructure required to deal with the various security risks posed by BYOD and the associated security strategies, I downloaded a document from the link http://h20195.www2.hp.com/V2/GetPDF.aspx/c03660924.pdf (10:30 pm).

August 20, 2013
To gain more clarity on the topic, I interacted with one of the cousin’s friend who is currently working in an IT company regarding his practical experience of the BYOD which helps me gain valuable insight especially about the practical aspects not easily available on the internet (6 pm).

August 23, 2013
I created a folder by downloading all the relevant information and starting writing my report by referring to the relevant downloaded information (10 pm). I completed three sections regarding utilization, risks, advantages and disadvantages (1 am)

August 27, 2013
I finally completed the report by completing all the requisite sections and revised it once to rectify any grammatical errors (11 pm). For running the financial model, I needed information on the XIRR function by accessing relevant videos from www.youtube.com (11:45 pm)








No comments:

Post a Comment