BYOD: Lessons On Negotiating Limits
1/7/2014You can say no to BYOD, but be prepared to enforce your decision -- and find alternatives to meet your users’ needs.
Post a Comment
InformationWeek is part of the Informa Tech Division of Informa PLC
This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.
Julian Y. Koh has been at Northwestern University in one way, shape, or form for the past 25+ years, first attending summer camps during middle school. He was introduced to IT as a student worker at the NU computer center in 1995 and joined the NUIT Telecommunications and Network Services team as a full-time network engineer after earning his BS in biomedical engineering in 1997. Over the years, he has participated in or overseen the installation of multiple generations of network backbone technology (LocalTalk to FDDI to ATM to 1G/10G/100G Ethernet) as well as numerous network-based services such as IPTV, VPN, and information security incident response. Julian also earned an MS in information technology from Northwestern in 2001. He is currently responsible for the voice, video, and data network engineering teams for all of Northwestern's US-based locations.