As we wade into Day 2 of VMworld 2014, the conversation will likely leave Software Defined Data Centers and move onto the more exciting (for us at least) conversation regarding securing remote clients in a highly distributed and unpredictable work … Continued
John Whaley reports back from BriForum I returned to BriForum last week and as usual, it was a lot of fun catching up with the usual suspects who typically frequent this August event as well as meeting some fresh new … Continued
Desktop virtualization holds the promise of easier desktop management, better security, reduced costs, and the ability to move to new ownership models like BYOD. Or at least that is what the vendors tell you. What can you really expect from … Continued
BYOD isn’t going away any time soon, however Gartner estimates that within the two years, 20% of enterprise BYOD programs will fail as the result of overly restrictive mobile device management measures. Although that statistic shouldn’t stop you from … Continued
BYOD has been a hot topic in 2013 and for good reason: How this trend is handled influences everything from user satiation to the security of data. These recent articles from WIRED, TabTimes, and TechTarget’s SearchITChannel discuss changes in technology—especially … Continued
With many still maintaining the assumption that if you manage and protect the physical computer, you’re managing and protecting the data, it should come as little surprise that trends like consumerization of IT and BYOD have made keeping data secure … Continued
REDWOOD CITY, Calif. (Oct. 17, 2013) – Moka5, the leader in next generation end-user computing, today announced that John Whaley, founder and CTO, will be speaking at MobileCON™ 2013, held Oct. 16 - 18, 2013 in San Jose. In a … Continued
No doubt, offshoring saves costs. But when companies deploy VDI to enable their offshore developers, what is the experience like? Is it really as fruitful as it could be? Host and Moka5 CTO John Whaley invites guest speaker Dr. Watson … Continued
Whether rolling out a BYO program for employees or setting the parameters of how contractors access sensitive data and apps, following established best practices increases the likelihood your program will be successful. Here’s a collection of BYO best practice information … Continued
Technology is changing all the time—and mobile technology is no exception. Although it seems obvious, it is too often disregarded when making business decisions. Every time we dismiss the idea of BYOD as a fad, question the trend of the … Continued
BriForum Chicago might be over, but the insights gleaned from this event lives on that massive repository we sometimes refer to as the Internet. Weren’t able to attend the event, or feel like the whole thing was just … Continued