Nearly three-quarters of the 141 information workers (iWorkers) responding to a recent Unisys Corporation (NYSE: UIS) online poll indicated that they would be willing to pay at least part of the cost for productivity-enhancing technology for work if they could choose it themselves.
The respondents were answering the question, "What percentage of the cost of your job’s IT tools would you be willing to fund if you had freedom to choose what you could use?"
Nearly one-third (32 percent) of the iWorkers said that they would be willing to pick up the full cost. Twenty-one percent said that they would pay up to half of the cost, and another 21 percent said that they would fund up to 30 percent of the cost.
“By clinging to old ways in today’s hyper-competitive marketplace, employers could miss a golden opportunity to mobilize and unleash the innovation of an army of tech-savvy employees who want to use the technologies they rely on in their personal lives for work,” said Sam Gross, vice president, Global IT Outsourcing Solutions, Unisys.
But how do companies make the transition to a Bring Your Own Technology (BYOT) structure? This slideshow highlights 12 steps identified by Unisys that businesses should follow when creating a BYOT program.
10 Ways to Keep Hackers in Check and Ensure Safe Web Resources Safeguard your Web resources with these security guidelines.
Movers and Shakers: Where Some of IT's Top Executives Are Going September 2010 was a tumultuous month for CEOs as the turnover rate surged to a four-month high.
Seven Types of Presentations to Avoid Avoid these presentation duds with proper planning and practice.
It's easy to forget about the ghosts of servers past that are hiding in the background, continuing to consume electricity and potentially exposing organizations to malicious attacks. ... More >>
Cloud SaaS adoption allows organizations to gain the flexibility and scalability necessary for creating a high-velocity business. ... More >>
IT executives need the right tools to monitor and control their cloud infrastructure to maximize the positive impacts and mitigate security threats. ... More >>