Integration with Personal Devices

Explore top LinkedIn content from expert professionals.

Summary

Integration with personal devices refers to connecting and syncing everyday items like smartphones, wearables, and laptops with workplace systems or healthcare platforms. This trend allows seamless access to data and services but also raises important questions about privacy, data security, and user experience.

  • Prioritize privacy controls: Make sure employees and users understand what data is being shared and have the power to manage their own privacy settings.
  • Strengthen security protocols: Use measures like device enrollment, encryption, and multi-factor authentication to keep sensitive information safe when accessed from personal devices.
  • Promote user education: Regularly train users on company policies, safe device practices, and how to recognize security threats to reduce risks associated with integration.
Summarized by AI based on LinkedIn member posts
  • View profile for João Bocas
    João Bocas João Bocas is an Influencer

    Founder & CEO at B | Helping executives become industry authorities on LinkedIn | Global Speaker 🎤

    42,612 followers

    🚀 **𝗪𝗲𝗮𝗿𝗮𝗯𝗹𝗲𝘀 𝗶𝗻 𝗛𝗲𝗮𝗹𝘁𝗵𝗰𝗮𝗿𝗲: 𝗧𝗵𝗲 𝗣𝗿𝗼𝗺𝗶𝘀𝗲 𝘃𝘀. 𝗧𝗵𝗲 𝗛𝘂𝗿𝗱𝗹𝗲𝘀** 🏥 Just wrapped up an insightful video deep-dive into one of the most exciting—and challenging—frontiers in digital health: integrating wearables into Healthcare. While devices like smartwatches and continuous glucose monitors are revolutionizing how we track health, bringing that data into healthcare systems isn’t as simple as it seems. Here are some of the key challenges we explored: 🔹 Data Accuracy & Reliability : Not all wearables are created equal. How do we ensure clinical-grade data that providers can trust? 🔹 Interoperability :Seamlessly integrating wearable data with Electronic Health Records (EHRs) remains a major technical and regulatory hurdle. 🔹 Privacy & Security :Protecting sensitive patient data in an era of constant connectivity is non-negotiable. 🔹 Clinical Workflow Integration : How can wearables reduce, not increase, the burden on healthcare professionals? 🔹 Regulatory Compliance :Navigating FDA approvals and HIPAA requirements is complex but essential for scalability. The video doesn’t just highlight problems—it also discusses real-world solutions and collaborative efforts between tech companies, healthcare providers, and regulators to make wearables a sustainable part of patient care. Curious to learn more? Watch the full VIDEO I’d love to hear your thoughts: 👉 What do you think is the BIGGEST barrier to wearable integration in healthcare? 👉 Have you seen successful use cases in your organization or practice? #DigitalHealth #Wearables #HealthTech #Innovation #HealthcareIT #MedTech #FutureOfHealthcare #PatientCare #Interoperability #TheWearablesExpert

  • View profile for Leonard Rinser 🤘🏼

    The future of health is AI-based | Global Health Executive @Sigma Squared | Health Futurist | Managing Partner Venture Institute | Building AI-powered health & longevity companies for long and healthy lives

    16,273 followers

    Google just turned Fitbit into an AI health platform. Your wearable now wants your medical records. At The Check Up, Google's annual health event, Fitbit announced the biggest update to its Personal Health Coach since launch. Medical records integration, advanced sleep science, metabolic research, and continuous glucose monitoring, all feeding into a Gemini-powered AI coach. From a fitness tracker to a personal health operating system on your wrist. Here is what is new: → Starting next month, U.S. Public Preview users can link their medical records to the Fitbit app, lab results, medications, visit history, all in one place → Identity verification through CLEAR and IAL2-certified standards, a selfie and a valid ID to automatically locate and sync records across providers → The AI coach can now contextualize your health questions using your actual medical history, not generic answers, but personalized guidance based on YOUR data → Continuous glucose monitor (CGM) integration via Health Connect, ask the coach how a workout or a slice of pizza impacts your glucose levels → 15% improvement in sleep staging accuracy, trained on diverse clinical datasets aligned with gold-standard measurements → A reimagined Sleep Score that evaluates specific aspects of rest, not just duration, but how long it took you to fall asleep and where to focus for better recovery → A new "Get care now" Fitbit Lab study in partnership with Included Health to assess how conversational AI can help navigate virtual care visits The research backing is serious. Google's pioneering study on predicting insulin resistance using wearable data was just published in Nature. The model combines wearable signals with routine blood biomarkers to predict insulin resistance with 80% auROC, and 93% sensitivity in the most at-risk populations. This is foundational work for early type 2 diabetes screening at scale. The privacy architecture: → Medical records securely stored with Fitbit, under your control → You decide how data is used, shared, or deleted → Medical records are not used for ads → Secure sharing with family or providers via Smart Health Link URL or QR code Now zoom out. Google is not just adding features. Google is building the full stack: → Wearable hardware (Fitbit + Pixel Watch) → Real-time biometric data (heart rate, sleep, activity, SpO2) → Clinical validation (Nature-published metabolic research) → Medical records integration (lab results, medications, visit history) → CGM data (continuous glucose monitoring via Health Connect) → AI reasoning layer (Gemini-powered Personal Health Coach) → Care navigation (Included Health partnership for virtual visits) From sensor to insight to action to care, in one ecosystem. Now Google turns its 30+ million Fitbit users into a health data platform. The difference: Google already has the wearable on your wrist. The research is already published. The clinical foundation is already built. Source & picture: google

  • View profile for Jon Hyman

    Outside Employment Counsel to Ohio Businesses | Stay Compliant. Avoid Lawsuits. Win When They Happen. | Trusted Advisor to Craft Breweries | Wickens Herzer Panza

    27,916 followers

    A recent lawsuit filed by an Apple employee against the company highlights the risks of mishandling Bring Your Own Device (BYOD) policies. The employee claims the tech giant monitored personal devices and iCloud accounts, sparking privacy and legal concerns. It's a stark reminder that allowing personal devices at work requires a carefully crafted policy that balances company needs with employee rights. Here's how to do it right: 1. Respect Employee Privacy: Employees deserve to feel secure about their personal information. Clearly define what data the company can access and avoid overly invasive monitoring or wiping personal data unless absolutely necessary. 2. Prioritize Data Security: Ensure all devices accessing company data are equipped with encryption, strong passwords, and regular updates. Outline clear steps for reporting lost or stolen devices to minimize the risk of breaches. 3. Define Ownership: Specify what happens to company data when an employee leaves. A "remote wipe" provision can protect proprietary information while ensuring personal data is untouched. 4. Foster Awareness: Policies only work when people understand them. Train employees on the importance of safeguarding company data and their responsibilities under the policy. 5. Comply with the Law: Legal compliance is non-negotiable. Make sure your BYOD policy aligns with state and federal privacy laws and is reviewed by an employment lawyer to avoid potential lawsuits. BYOD is a win-win when done right. A well thought out policy protects your business and fosters trust—but only if you're clear up front about boundaries.

  • View profile for Mohammed Iqbal

    CSO @ ABC Fitness | Founder and Chairman @ SweatWorks | Podcast Co-Host @ LIFTS | Product focused digital agency founder | Investor | Advisor

    16,589 followers

    ⌚️ Wearables lead to healthier people. For a few years, there has been a movement (by some) in the wellness community to downplay wearables and their effectiveness. New research might be a reason to rethink that view point. I was first introduced to the role that wearables can play in creating healthy lives in 2007 from the landmark research conducted by Ghent university on the effectiveness of the physical activity promotion project “10,000 Steps Ghent.” Ultimately, what the study found was that 3 factors, when done together, had a significant role in achieving healthy wellness goals - 1. Established a goal (in this case, 10,000 steps) 2. Monitoring or Tracking progress (the study utilized a pedometer) 3. Community intervention (achieve the goal together) Since then, wearables have become ubiquitous around the world and not just in western nations. The two fastest growing markets for wearables are India and China, respectively. Furthermore, the growth of the category (11% YOY) has not been led by industry leaders, such as Apple and Fitbit, but rather new players including Huawei in China and low-cost startups in India - Noise and Fireboltt - where wearables are under $50 USD. . . Last week, I had an opportunity to review an insightful paper on the impact of wearables published on the The Lancet - an international weekly general medical journal that has been in active publication since 1823. The paper was a systematic review of 39 studies that covered nearly 165,000 people over a period of several years. The meta-analysis drew to the conclusion that wearables led to positive changes several areas including: - Physical Activity - Body Composition - 1800 more steps per day - Improved physiological benefits including blood pressure, cholesterol, and glycosylated hemoglobin - Improved psychosocial benefits (quality of life and pain) With nearly two decades of data, there is no question that wearables will lead to improved health outcomes.   . . 💡 How can brands integrate wearables into their user journey? Here are some quick wins that we have incorporated into several of our brands and partners: - If you have a mobile app, integrate with Apple Health or Google Fit - Enhance the experience with data collected from wearables - Built a community that is either digital or physical - Implement gamification and rewards to help drive positive behavior - Personalize the journey - Do an assessment: Think of this as the GPS for your user’s health. You cannot create a pathway for achieving their goals if you do not know where they are starting from. Wearables alone are impactful. However, when integrated with a brand that serves as the “front-end” for the user - they can supercharge progress. Let me know how you have incorporated wearables into your life or brand below. 👇 #wearables #health #wellness #activity #tracking #research #innovation #india #china #growth #apple #fitbit #brands 

  • View profile for Wael Aldhafeeri

    Lead IT Infrastructure Senior Specialist l Data Center | VMware | HP servers | Dell Servers | CCNP ENCOR | CCNA | SCVMM l Linux | RedHat | Microsoft | Veeam | 3PAR | Cybersecurity | Azure | GCP | Nutanix

    12,380 followers

    Let the Personal Devices Join the Party Sure, BYOD improves flexibility. But it also means your corporate network is now sharing a subnet with someone’s gaming laptop, pirated Adobe software, and a browser loaded with 38 extensions of unknown origin. So if you must allow BYOD, here’s what real security should look like: 1. Enforce Device Enrollment via MDM/UEM No management agent? No access. You don’t trust strangers with keys to your house, don’t trust unmanaged devices with access to SharePoint. 2. Require Full-Disk Encryption (BitLocker, FileVault, etc.) Because “it’s just my personal laptop” shouldn’t be an excuse for an unencrypted device storing corporate data. 3. Strong Authentication Only (MFA/FIDO2) No passwords alone. Ever. And no, SMS doesn’t count … that’s just a hacker waiting on hold with your telco. 4. Block Rooted/Jailbroken Devices If someone’s phone has a custom bootloader and sideloaded TikTok++ … Don’t let it touch your corporate apps. 5. Enforce Network Segmentation for BYOD Isolate these devices like they’re contagious. Because they are. 6. Use Containerization or App Sandboxing (e.g., Intune App Protection Policies) Corporate apps and data live in a separate, controlled space. When the user rage-deletes Candy Crush, your company data doesn’t go with it. 7. Apply DLP Policies to Mobile and Desktop Control copy/paste, screenshots, uploads, and downloads. Because data doesn’t care if the leak came from an iPhone or a ThinkPad. 8. Conditional Access Everywhere Access is granted based on device health, location, user risk score, time, moon phase, and caffeine level. (Okay, maybe not the last two. But close.) Don’t allow access from 3AM in Russia when the user lives in Riyadh! 9. Auto-Wipe on Violation or Exit The moment a device is non-compliant, stolen, or the employee rage-quits: Corporate data evaporates like it was never there. 10. User Awareness + BYOD Policy Enforcement Train them. Then remind them. Then test them. Because someone will still think installing a free PDF converter from “totallylegitdownloads.ru” is fine. These are the minimum controls for BYOD to be taken seriously in 2025. Because in BYOD … the “D” sometimes stands for “Disaster.” How are you keeping your BYOD from turning into BYOB (Bring Your Own Breach) ? #CyberSecurity #BYOD #EndpointSecurity #DataProtection #MDM #ZeroTrust #Intune #DLP #ConditionalAccess #SecureWorkplace #SecurityBestPractices #CISBenchmarks #InforSec

  • View profile for Kanwaljit (Kenny) Kamal

    Global Chief Information Officer at Open Society Foundations | IT Strategist | Cyber security Leader | DEI Lead | Advocate for Tech-Driven Social Impact | Non Exec Director | Trustee

    7,618 followers

    𝐓𝐫𝐚𝐯𝐞𝐥𝐥𝐢𝐧𝐠 𝐰𝐢𝐭𝐡 𝐜𝐥𝐞𝐚𝐧 𝐭𝐞𝐜𝐡: 𝐦𝐨𝐝𝐞𝐫𝐧 𝐬𝐞𝐜𝐮𝐫𝐢𝐭𝐲 𝐢𝐧 𝐚 𝐬𝐡𝐫𝐢𝐧𝐤𝐢𝐧𝐠 𝐜𝐢𝐯𝐢𝐜 𝐬𝐩𝐚𝐜𝐞. Over the past few weeks, I’ve had several conversations with peers across the INGO space, and one topic keeps coming up: how to keep our devices and data secure. It’s a real concern for any global organisation, but especially for those of us in humanitarian and development space. We often have staff travelling or working in high-risk environments, and the stakes are high. At Oxfam, we operate at scale across many disparate and often volatile locations. That reach is part of our strength, but it also means we have to deal with a wide range of security realities—some of which are becoming increasingly hostile and shrinking civic spaces. The challenge of bring your own device (BYOD) adds another layer. Personal devices are now a staple of modern working life, and we don’t pretend otherwise. But when a personal phone or laptop is used to access organisational data, it carries the same level of risk as any corporate device—often without the same protections in place. We’ve shifted our approach. It’s no longer just about locking down hardware. It’s about minimising what’s on it in the first place. Our evolving guidance includes: • Travelling with “clean” devices – no cached email, no local files, and no unnecessary data stored. Access what’s needed via secure cloud platforms and leave no trace behind. • Remote wipe and conditional access – all devices that touch our environment should be protected, manageable, and revocable. • Limiting local storage on personal devices – BYOD needs guardrails. If it’s used for work, it must meet minimum standards. • Context-aware controls – we apply extra scrutiny to devices accessing systems from high-risk geographies, with geofencing and layered authentication in place. We’re not in the business of creating complexity for its own sake. But in a world of shrinking civic spaces, growing digital surveillance, and targeted harassment of INGOs, this isn’t optional. It’s responsible. It's protective. And it’s necessary. Security isn’t something you apply at the edge—it’s something you build in from the start. Our duty is to protect not just our systems, but our people, their data, and the communities we serve. This is how we do that.

  • View profile for Sujeet Katiyar

    Healthcare Data Governance Strategist | Data Privacy & AI Regulations Expert (DPDP Act, GDPR, HIPAA, ICMR) | Digital Health, Telehealth, Rural Health | Director, Founder, CEO & DPO | 27+ yrs in Web, Mobile, Emerging Tech

    37,986 followers

    In almost every hospital today, doctors review reports on personal phones, technicians share images through messaging apps, and administrators access hospital systems from personal laptops. Bring Your Own Device (BYOD) has become operational reality in healthcare. But under the DPDP Act, 2023, BYOD can quietly turn into one of the most serious compliance and data security risks if it is not governed properly. When patient data leaves institutional systems and moves to personal devices, control weakens. And under the law, accountability does not move with the device. It remains with the hospital. In this article, I explain: * Why BYOD is rapidly increasing across hospitals, labs, and healthcare organisations * How personal devices create shadow datasets outside institutional governance * Real risks involving WhatsApp report sharing, screenshots, and personal cloud backups * Why loss or theft of personal devices can trigger a reportable data breach * The legal exposure hospitals face under DPDP if security safeguards fail * Lessons from GDPR and HIPAA enforcement related to portable device security * How regulators in the EU, USA, Brazil and UAE approach BYOD governance * Practical scenarios involving radiology image sharing and report forwarding * The Dos and Don'ts hospitals must implement immediately * Why BYOD is not just an IT issue but a governance and compliance issue BYOD improves convenience in clinical workflows. But without governance, it can become the fastest route for patient data to escape institutional control. In the DPDP era, hospitals must rethink how personal devices interact with patient data. Prashant Shedge Surisolis Ventures Pvt Ltd #DPDPAct #HealthcareCompliance #HospitalGovernance #HealthTechIndia #PatientDataProtection #DigitalHealth #HealthcareCybersecurity #PrivacyLaw #HealthDataSecurity #RegulatoryCompliance

  • View profile for Gigi Magan MD MPH

    Family Physician | AI in Primary Care | Digital Health Equity | Writing MedTechxHeart on Substack

    2,855 followers

    More of my patients are coming in with #data from their #wearables—and the questions they raise are getting more complex. In recent weeks, I’ve had patients share sleep metrics from their Oura Rings and Apple Watches—tracking not just sleep duration, but REM vs. deep sleep, snoring patterns, and bedtime routines. Others are using these tools to track episodes of atrial fibrillation. They’re paying attention. They’re engaged. And they want to know: “Does this matter, doctor?” Sometimes it does. Sometimes it leads to a formal sleep study or rhythm monitor. But often, there’s a disconnect between what they’re tracking and what we can act on. This brings me back to something I worked on years ago—as a premed. I was part of a research study where we gave Fitbits to hospitalized older adults to encourage early mobility. We measured their steps, aiming to reduce rehospitalizations and support safer discharges. I didn’t get to finish the study (off to med school!), but the concept stayed with me: #Wearables could be part of clinical care—not just personal wellness. Fast forward to today, and while consumer tech has evolved, our care models haven’t fully caught up. We still don’t routinely integrate wearable data into: • Annual physicals • Chronic disease management • Preventive screening workflows Should we? I’m curious how others are handling this. Are you: • Incorporating wearable sleep or AFib data into visits? • Using it to guide referrals, order diagnostics, or support behavioral change? • Finding ways to integrate it into EHRs or remote monitoring programs? What’s working—and what’s just noise? Would love to hear how others are bridging the gap between consumer tech and clinical care. #Wearables #DigitalHealth #PreventiveCare #HealthcareInnovation #PrimaryCare #RemoteMonitoring #RPM João Bocas Umbereen S. Nehal, MD, MPH, MBA Tom Cassels Luis Belen Ryan Greysen

  • View profile for Travis Hayes

    CISSP, CISM, MS CIA, MBA ITM

    1,614 followers

    I've been spending a decent amount of time working on/updating a BYOD (Bring Your Own Device) policy. Many companies seem to embrace BYOD as they are able to see cost savings on equipment and increase employee morale by letting them use their own equipment. However, BYOD comes at a cost. A BYOD policy is crucial for cybersecurity for several reasons: 1. 𝗜𝗻𝗰𝗿𝗲𝗮𝘀𝗲𝗱 𝗧𝗵𝗿𝗲𝗮𝘁 𝗦𝘂𝗿𝗳𝗮𝗰e: Unmanaged personal devices can introduce a whole host of security risks:    𝗨𝗻𝗸𝗻𝗼𝘄𝗻 𝗩𝘂𝗹𝗻𝗲𝗿𝗮𝗯𝗶𝗹𝗶𝘁𝗶𝗲𝘀: Personal devices might have outdated software, unpatched vulnerabilities, or inadequate security settings compared to company-managed assets.    𝗘𝘅𝗽𝗼𝘀𝘂𝗿𝗲 𝘁𝗼 𝗠𝗮𝗹𝘄𝗮𝗿𝗲: Devices used for personal browsing and app downloads can become infected, compromising data when connected to the corporate network.    𝗗𝗮𝘁𝗮 𝗠𝗶𝘀𝗵𝗮𝗻𝗱𝗹𝗶𝗻𝗴: Employees might store sensitive company data on devices without proper protection measures, creating risks of loss or theft. 2. 𝗟𝗮𝗰𝗸 𝗼𝗳 𝗖𝗲𝗻𝘁𝗿𝗮𝗹𝗶𝘇𝗲𝗱 𝗖𝗼𝗻𝘁𝗿𝗼𝗹: IT lacks direct control over the security of personal devices, making it harder to:    𝗘𝗻𝗳𝗼𝗿𝗰𝗲 𝗦𝗲𝗰𝘂𝗿𝗶𝘁𝘆 𝗦𝘁𝗮𝗻𝗱𝗮𝗿𝗱𝘀: Can't guarantee devices meet the company's encryption, password, and software patch policies.    𝗥𝗲𝗺𝗼𝘁𝗲 𝗪𝗶𝗽𝗲: If a device is lost or stolen, IT won't be able to remotely wipe sensitive company data.    𝗠𝗼𝗻𝗶𝘁𝗼𝗿 𝗳𝗼𝗿 𝗧𝗵𝗿𝗲𝗮𝘁𝘀: Difficult to detect unusual activity or malware infections on non-company-managed devices. 3. 𝗥𝗲𝗴𝘂𝗹𝗮𝘁𝗼𝗿𝘆 𝗖𝗼𝗺𝗽𝗹𝗶𝗮𝗻𝗰𝗲 𝗜𝘀𝘀𝘂𝗲𝘀: Many regulations like HIPAA, PCI DSS, and GDPR mandate data protection measures that BYOD can make difficult to enforce:    𝗗𝗮𝘁𝗮 𝗛𝗮𝗻𝗱𝗹𝗶𝗻𝗴: BYOD blurs the lines of where company and personal data reside, complicating regulations around appropriate handling.    𝗕𝗿𝗲𝗮𝗰𝗵 𝗡𝗼𝘁𝗶𝗳𝗶𝗰𝗮𝘁𝗶𝗼𝗻𝘀: If a personal device containing company data is involved in a breach, the reporting requirements become more complicated. 𝗪𝗵𝗮𝘁 𝗮 𝗚𝗼𝗼𝗱 𝗕𝗬𝗢𝗗 𝗣𝗼𝗹𝗶𝗰𝘆 𝗗𝗼𝗲𝘀 𝗦𝗲𝘁𝘀 𝗖𝗹𝗲𝗮𝗿 𝗘𝘅𝗽𝗲𝗰𝘁𝗮𝘁𝗶𝗼𝗻𝘀: Outlines permitted devices, security requirements (password complexity, encryption), and acceptable use. 𝗔𝗱𝗱𝗿𝗲𝘀𝘀𝗲𝘀 𝗣𝗿𝗶𝘃𝗮𝗰𝘆: Balances security needs with employee privacy, establishing which data IT can monitor and/or wipe. 𝗗𝗲𝗳𝗶𝗻𝗲𝘀 𝗔𝗰𝗰𝗲𝗽𝘁𝗮𝗯𝗹𝗲 𝗦𝗲𝗰𝘂𝗿𝗶𝘁𝘆 𝗠𝗲𝗮𝘀𝘂𝗿𝗲𝘀: Might require mobile device management (MDM) software, app restrictions, VPN use, and more. 𝗜𝗻𝗰𝗹𝘂𝗱𝗲𝘀 𝗜𝗻𝗰𝗶𝗱𝗲𝗻𝘁 𝗥𝗲𝘀𝗽𝗼𝗻𝘀𝗲: Outlines procedures for reporting malware infections, lost/stolen devices, and data breaches. 𝗞𝗲𝘆 𝗣𝗼𝗶𝗻𝘁: A BYOD policy is not about outright banning or fully controlling personal devices. It's about establishing a framework to balance employee flexibility with corporate data security and legal obligations. What am I missing? What else should be in a good BYOD policy?

  • View profile for Greg Jeffreys

    Thought leader in display design, AV strategy & standards | Specialist in projection-based systems, 3D display systems, meeting & teaching space design | Founder – Visual Displays & GJC | AVIXA leadership

    12,660 followers

    BYOD is winning in Microsoft Teams Rooms. Nice for users - a headache for designers. Why? How to solve the problems? The trend is for users to use personal devices regardless of official policies. The trend is accelerating. But the challenge for system designers is that it can create major problems. Here are some examples: Mac connectivity nightmares - MacBooks need USB-C to HDMI adapters, Teams Rooms doesn't support HDCP input which can cause HDMI functionality issues. These connection failures highlight the broader BYOD challenge: expensive room systems undermined by device compatibility issues. (Solutions like programmable EDID devices can sidestep connectivity issues by accepting any EDID and providing seamless switching. The GeoBox G901 connects to the display with a continuous [fully programmable] EDID. At the front end it has HDMI and DisplayPort inputs and accepts absolutely any EDID. So you de-risk any random video connection and get seamless and instantaneous video switching.) Network security. BYOD devices require complete network segregation from corporate systems. VLANs give a false sense of security by appearing to segment assets when in reality they aren't properly configured for segmentation and are often full of holes. True isolation means separate physical networks or microsegmentation that goes far beyond basic VLANs. The irony: Over 81% of employers are considering a return to company-issued phones for privacy and security reasons, yet 78% of IT leaders say employees still use personal devices without approval, even in firms with BYOD restrictions. Your carefully designed Teams Room becomes a very expensive cable management system when everyone's working off their MacBook anyway! The question isn't whether to allow BYOD - 95% of organisations allow some form of personal device usage. The question is: how do we design meeting spaces that work WITH this reality, not against it? What's your experience? Are users embracing your carefully designed meeting rooms, or working around them? #microsoftteamsrooms #avtweeps #EASEmethodology #hybridmeetings #avusergroup #ltsmg #schoms  #avixa

Explore categories