Blog categories

My blog posts and tweets are my own, and do not necessarily represent the views of my current employer (ESG), my previous employers or any other party.

I do not do paid endorsements, so if I am appear to be a fan of something, it is based on my personal experience with it.

If I am not talking about your stuff, it is either because I haven't worked with it enough or because my mom taught me "if you can't say something nice ... "

Why Doesn’t IT back up BYOD!?

ESG recently started offering TechTruths … single nuggets of data and the analyst perspectives of why they matter. Check out all of them via the link above, but here is my favorite so far on BYOD data protection:

So, why doesn’t IT back up BYOD endpoints?! It isn’t a rhetorical question.

I have always […]

You have one less way to recover your data – and you probably didn’t realize it

BE AWARE that today’s laptop and mobile devices have one less recovery option than they used to. 

This particular customer service announcement is targeted mostly at business executives and the IT professionals who support them.

  -  Those folks presume that device theft never happens and that they are too responsible to ever leave […]

Mobile Device Backup may be Impossible

Doing a selective mobile device backup that separates work data and personal data can’t be done, says analyst Jason Buffington, but perhaps not for the reasons you think.

Before I get started, let me define the two basic types of endpoint devices: consumption devices and creation devices.

Consumption devices are like e-readers that fetch data […]

Discussing Data Protection with IBM

Last week, I had the opportunity to sit down with Tom Hughes and Todd Watson from IBM. We talked about three IT trends that are disrupting traditional data protection strategies and legacy approaches:

Highly Virtualized / Private Cloud Infrastructures Cloud-based Solutions for backup & storage Bring Your Own Device (BYOD) for endpoint protection

Here is […]

JBuff’s BYOD Experiment (part 3 of 4) Corporate Expectations

A while back, I decided to do an experiment on BYOD — here are my results: JBuff’s BYOD experiment – part 1, Acquisition Challenges JBuff’s BYOD experiment – part 2, Getting Started with Data JBuff’s BYOD experiment – part 3, Corporate Expectations JBuff’s BYOD experiment – part 4, video excerpt from BYOD seminar JBuff’s BYOD […]

JBuff’s BYOD Experiment (part 2 of 4) Getting Started

A while back, I decided to do an experiment on BYOD — here are my results:

JBuff’s BYOD experiment – part 1, Acquisition Challenges JBuff’s BYOD experiment – part 2, Getting Started with Data JBuff’s BYOD experiment – part 3, Corporate Expectations JBuff’s BYOD experiment – part 4, video excerpt from BYOD seminar JBuff’s BYOD […]

JBuff’s BYOD Experiment (part 1 of 4) Acquisition Challenges

One of the more intersecting discussions in data protection is BYOD. When its not a corporately owned device, and therefore the IT department has far less influence (including perhaps the inability to install agent technologies on it) — who is responsible for backing up the data, and where should corporate data be backed up to […]

@JBuff on Twitter