Where the device hits the network – a mobile device management update

Enterprises have become much more mobile over the past decade. In fact, mobility has fast become a major priority, both in terms of customer and stakeholder engagement and also worker mobility.

According to a report by the Radicati Group, global revenues for the enterprise mobility management (EMM) market will total over $ 1.8bn by year-end 2017. This figure will grow to over $ 3.3bn by year-end 2021. This represents an average annual growth rate of 18% in the next four years.

The EMEA market for EMM software will grow from $ 565.8m in 2017 to $ 839.9m in 2021 at a CAGR of 8.2% according to analyst firm IDC (Enterprise mobility management software forecast, 2017–2021).

On the bring your own device (BYOD) front, Forrester Research reports that 70% of information workers use a smartphone at least weekly at work, with 49% choosing the device themselves as opposed to following a company-approved list or using a company-issued phone (Best practices for securing and empowering a mobile workforce).

To stay on top of your mobile strategy, organisations should be aware of a number of trends.

One of the most impactful trends in enterprise mobility management is the concept of device trust, which means providing a certificate of trust for the devices used, says Mike Paiko, director of enterprise mobility at Okta.

When a cloud app, such as Box or Google Suite, contains highly sensitive information, IT leaders need to ensure the device used to access that app is managed and meets the company’s security standards. These devices may include desktops, laptops, or mobile phones.  

Mobility management tool

Users have the opportunity to enrol their device into their mobility management tool, and once the device becomes “trusted”, the user will have access to the application. “This is a great security process to ensure users only use managed devices to access sensitive corporate apps,” he says.

Trust also plays a part in BYOD. The workforce is increasingly being their own devices, more so among third party contractors or other temporary workers. 

“Workers would probably prefer not to carry two phones; however, they still do because they are reluctant to have their employer access personal info,” says Mark Lorion, president and general manager at Apperian. Mobile device management (MDM) suppliers are responding to this with reversed enrolment flows, where a user can download the initial mobile portal without enrolling their device for control by their employer. “However, if the user wants access to corporate data, they will need to enrol their device in management,” he says.

Mobiles on the edge

One trend which is already showing signs of exerting real influence when it comes to mobile device management is edge computing, according to Neil Bramley, B2B client solutions business unit director of Northern Europe at Toshiba. This is especially so as mobiles generate evermore data.

“In an increasingly mobile professional landscape, the ability to process data at the edge of the network and close to its originating source is invaluable. By minimising the strain on cloud storage services, organisations can ensure faster operations through reduced latency, only sending the most relevant data to the cloud,” he says.

By spreading the load in this way, bottlenecks are greatly reduced, if not eliminated, while at the same time businesses can benefit from the additional advantages of improving their quality of service and reducing costs, adds Bramley.

The rise of IoT

One of the most important, yet least talked-about developments, in MDM is what is meant when talking about “devices”.

The rise of connected devices and the internet of things (IoT) might not, at first, seem relevant to IT managers for whom MDM means struggling to bring Shadow IT into the corporate fold. But connected devices present greater risks to organisations, not least because they are generally so poorly-secured, as seen with the Mirai attacks from last year onwards, says James Plouffe, lead solutions architect, at MobileIron.

“The challenge for MDM/EMM providers is twofold: first, to educate users about the risks of unsecured connected devices; and second, to integrate these devices into their existing MDM platforms and tools, so that IT managers have complete visibility of every machine that’s connecting to their corporate network,” he says

This is echoed by Suneil Sastri, director of product marketing at Soti. He says the reason device management has taken such a sharp evolution is that it is no longer just about obtaining information from a mobile device.

“Everything that can be connected will be connected. That’s the somewhat dog-eared maxim for the future of tech,” he says. “Currently, around 23 billion ‘things’ are currently connected to the world’s various communication networks and more are joining at breakneck speed. Mobile device management has advanced to encompass this innovation and companies must take advantage of this.”

Sastri says IoT brings new business challenges around scale, interoperability, security and the management of devices and endpoints.

“The adoption of IoT is set to continue, especially with industrial IoT devices. Businesses need to ensure they have a solid central platform to ensure they don’t become lost in a web of connected devices,” he says.

MDM and GDPR

In the near future, privacy and sensitivity around personal data and personally identifiable information (PII) will only continue to increase, as new regulations, such as GDPR, are passed and as consumers and the general public become more aware of how vulnerable their information is.

Lorian says an example of this would be the fallout from the September 2017 Equifax breach. “Organisations will need to take measures to only control what needs to be managed – just corporate data and just corporate assets. Typically, this will be achieved with approaches that do not require enrolling in device management, especially for personally owned devices.”

Organisations may also need to deploy tools that assist with data protection but also minimise data transferred to and held on the device. There will be a greater emphasis on mandating MDM to remove corporate data on a device if it is lost or stolen as well as using encryption to protect confidential data.

Rich Campagna, CEO at cloud and mobile security company Bitglass, says the mobile security space is ripe for innovation and we’ll likely see tools evolve to meet the needs and changes in IT. “One example is the ability to selectively wipe corporate information from a BYOD. From an employee privacy perspective, this means their phone is never at risk of having personal data removed without consent.”

Adapting to new trends

The latest trends in MDM are going to have an impact on enterprises and having a coherent security strategy is the single most important factor, says Plouffe. But, he adds, this is missing in so many user organisations.

“An effective security policy starts with organisations classifying their assets, identifying the risks to those assets, and defining their risk tolerance,” he says. “This will allow them to determine what risks they need to mitigate and which they may choose to accept. For example, part of this exercise may include detailing which devices are corporately owned and loaned to employees and what level of access each employee in the organisation is afforded.”

Paiko says there needs to be a balance between security and experience because if a user encounters too much friction accessing their apps, they’ll go around the security control, and ultimately will not realise the productivity benefits. He points to a recent Google report that highlights that 90% of smartphone users have used their phone to make progress toward a long-term goal or a multi-step process while “out and about”.

“Each of these ‘micro-moments’ lasts an average of 70 seconds, and these micro-moments are repeated dozens and dozens of times per day,” he says. “Without a great user experience, these highly productive micro-moments would not be possible.”

Broadening the scope of MDM

Today an employee can buy a smartphone, enrol it in MDM management, and be up and running with email and their corporate apps within 10 to 15 minutes – yet, they cannot get the same experience with a laptop, says Paiko. He adds that in the next 12-18 months, with Apple and Microsoft enhancing the MDM support in Mac OS X and Windows 10 respectively, more organisations will turn to MDM to manage third-party workers, such as contractors and business partners, and employee PCs.

“That said, with the current desktop OS MDM limitations and the existing need for group policies, it may take longer than 18 to 24 months for MDM to successfully manage the bulk of traditional PCs,” he says.

It is also important to note the consumerisation of IT is now driving what devices are being used in the enterprise. Perhaps the best way to keep ahead of the trends in MDM in the enterprise is to keep an eye one what consumers are buying today; they may well be bringing it into the enterprise tomorrow.

Tech

IDG Contributor Network: Challenges in realizing the promises of the holistic edge

Cloud providers such as Amazon, Google, Facebook and Microsoft are already rolling out distributed cloud infrastructure. Whilst the central cloud is established as an integral part of current and future networks, there are key issues that make the central cloud simply not the solution to several use cases.

  • Latency, also known as the Laws of Physics: The longer the distance is between two communicating entities, the longer the time it takes to move content there. Whilst the delay of reaching out to the cloud today might be tolerable for some applications, it will not be the case for emerging applications that will require nearly instantaneous responses (e.g. in industrial IoT control, robots, machines, autonomous cars, drones, etc.).
  • Data volume: The capacity of communication networks will simply not scale with the insane amount of raw data that is anticipated will need ferrying to and from a remote cloud center.
  • Running costs: The cost of a truly massive computational and storage load in the cloud will simply not be economically sustainable over the longer term.
  • Regulatory: There are and will very likely be new constraints (privacy, security, sovereignty, etc.) which will impose restrictions on what data may or may not be transferred and processed in the cloud.

So it certainly does make sense to distribute the cloud and interconnect this distributed infrastructure together with the central cloud. This process has already begun. One good tangible example is Amazon’s launch of the AWS GreenGrass (AWS for the Edge) product and their declared intentions to use their Whole Foods Stores (in addition to the small matter of selling groceries) as locations for future edge clouds/data centers. In general, cloud providers, perhaps driven by their real estate choices, have a relatively conservative view of the edge, restricting it to a point of presence typically 10 to 50 km from the consumer.

To read this article in full or to leave a comment, please click here

Computerworld Cloud Computing

IDG Contributor Network: The future is not the cloud or the fog: it is actually the SEA!

A casual reflection on the last few years in the evolution of the wireless network provides us all the insights necessary to reason that there is at least one final frontier coming down the road. Who can deny that the last few years have been owned by the cloud, virtualization and softwarization (if that is even a word!). Edge Computing too, which is really nothing more than the pushing of all of these concepts deep into places in the network where they have never been before. Fog computing is another term (created by Cisco) for something similar but driven in its genesis more bottom up from the many Internet of Things use cases. The bigger trend is obvious; network intelligence is distributing but where will it, can it go, beyond this?

To read this article in full or to leave a comment, please click here

Computerworld Cloud Computing

IDG Contributor Network: The future is not the cloud or the fog: it is actually the SEA!

A casual reflection on the last few years in the evolution of the wireless network provides us all the insights necessary to reason that there is at least one final frontier coming down the road. Who can deny that the last few years have been owned by the cloud, virtualization and softwarization (if that is even a word!). Edge Computing too, which is really nothing more than the pushing of all of these concepts deep into places in the network where they have never been before. Fog computing is another term (created by Cisco) for something similar but driven in its genesis more bottom up from the many Internet of Things use cases. The bigger trend is obvious; network intelligence is distributing but where will it, can it go, beyond this?

To read this article in full or to leave a comment, please click here

Computerworld Cloud Computing

IDG Contributor Network: The future is not the cloud or the fog: it is actually the SEA!

A casual reflection on the last few years in the evolution of the wireless network provides us all the insights necessary to reason that there is at least one final frontier coming down the road. Who can deny that the last few years have been owned by the cloud, virtualization and softwarization (if that is even a word!). Edge Computing too, which is really nothing more than the pushing of all of these concepts deep into places in the network where they have never been before. Fog computing is another term (created by Cisco) for something similar but driven in its genesis more bottom up from the many Internet of Things use cases. The bigger trend is obvious; network intelligence is distributing but where will it, can it go, beyond this?

To read this article in full or to leave a comment, please click here

Computerworld Cloud Computing

IDG Contributor Network: Driving operational excellence with your cloud vendors

Once, there was a pin factory. It employed ten workers – each of whom performed a different task. This organizational structure allowed them to generate 48,000 pins every day. If the people working at the plant were working independently, the output of each would have been limited to 20 pins at most – totaling 200 pins. This story describing division of labor was used in Adam Smith’s 1776 book The Wealth of Nations, as an example of operational excellence (OE).

If your company is to survive in a competitive market, OE must be sought, explained Faisal Hoque in Fast Company. In other words, the enterprise must “identify, understand and create the capabilities, behaviors and focuses necessary for repeatable, continuous and measurable operational improvement,” said Hoque.

To read this article in full or to leave a comment, please click here

Network World Cloud Computing

IDG Contributor Network: Driving operational excellence with your cloud vendors

Once, there was a pin factory. It employed ten workers – each of whom performed a different task. This organizational structure allowed them to generate 48,000 pins every day. If the people working at the plant were working independently, the output of each would have been limited to 20 pins at most – totaling 200 pins. This story describing division of labor was used in Adam Smith’s 1776 book The Wealth of Nations, as an example of operational excellence (OE).

If your company is to survive in a competitive market, OE must be sought, explained Faisal Hoque in Fast Company. In other words, the enterprise must “identify, understand and create the capabilities, behaviors and focuses necessary for repeatable, continuous and measurable operational improvement,” said Hoque.

To read this article in full or to leave a comment, please click here

Network World Cloud Computing

IDG Contributor Network: SIP trunks are more reliable than a PRI T1

Are SIP trunks as reliable as an ISDN PRI T1?

I’m asked this question a lot, so I thought it’d be a great blog topic.

I don’t think you are as concerned with this as the amber lights in the server room… But if you are making any changes to your company’s phone system, I’m assuming this question is on your mind.

The simple answer is… no. SIP trunks are not as reliable. They are more reliable than a Primary Rate Interface (PRI). But it has nothing to do with the public Internet.

To read this article in full or to leave a comment, please click here

Computerworld Cloud Computing

IDG Contributor Network: The promise and payoff of NoSQL, Part 1

The current database landscape can be confusing, even for experienced technology professionals.  There was a time when a one-size-fits-all database system was an adequate answer to any database question, but that’s no longer true.  Decisions about database systems now involve a dizzying array of application requirements, products, features, buying-criteria, and vendor claims.   

This confusing environment has left application architects and strategists with a mess of confusion as they consider database technology going forward. Meanwhile, the recent explosion in database choices has fragmented the market and made it more challenging to weed through the different options. The question for many is: Is this a permanent state of affairs or a transition phase? What can we expect next, and how can application architects plan for it?

To read this article in full or to leave a comment, please click here

CIO Cloud Computing

IDG Contributor Network: Cloud security: Trends and strategy

Cloud computing can generate mixed feelings. Corporate leaders generally welcome technologies that produce efficiency, agility and speed. Cloud services deliver those benefits, yet many are concerned about security, even while being often uninformed about how widely the cloud is used within their own businesses.

Executives of large companies, for instance, tell us that they are holding back on the cloud because of security concerns. But when our professional services teams engage with them, we generate log files and find evidence of large numbers of cloud services the company’s employees are using every day.

It is easy to understand the disconnect. Consider a simple example: a director of HR, tasked with filling several critical positions as quickly and confidentially as possible, turns to a low-cost SaaS recruiting tool. Job descriptions, resumes, cover letters, job offers and other documents are shared and possibly uploaded to a third-party server. Soon enough, candidates arrive for interviews. Mission accomplished, thanks to an efficient cloud-based business tool, with the C-suite never needing to know all the details.

To read this article in full or to leave a comment, please click here

CIO Cloud Computing

IDG Contributor Network: Must-have features for enterprise VoIP

If your company has 100+ users and is in the market for a hosted VoIP phone system, be careful.

Remember the scene in the movie Tommy Boy, “Fat Guy in a Little Coat”? You don’t want your company’s new phone system to feel like this.

You won’t hear it from the salespeople [collective gasp] but most hosted VoIP solutions are designed for micro-size companies. If you want an “enterprise” system, you will have to dig a little to find a provider catering to larger companies.

To read this article in full or to leave a comment, please click here

Computerworld Cloud Computing

IDG Contributor Network: Fix poor VoIP call quality with a dedicated circuit

This is a bummer but I’m going to say it.

Getting a huge fiber Internet connection may not do anything to help your company’s VoIP call quality.

Assuming everything is squared away on your LAN, the most common causes of poor call quality are latency, packet loss and jitter; None of which can be controlled over the public Internet, no matter how much bandwidth you throw at it.

“But what if we have a 1G dedicated Internet connection?” Sorry, it’s not immune.

“But what if it’s fiber from a Tier 1 provider?” Your call quality is still high-risk.

To read this article in full or to leave a comment, please click here

Computerworld Cloud Computing

IDG Contributor Network: How to plan your successful cloud migration

Recent Accenture Strategy research found that four out of five companies run up to half of their business functions in the cloud. Moreover, that figure is likely to increase significantly over the next few years. The research reveals that a clear majority of business leaders see the cloud platform as a critical enabler of greater innovation and competitive edge.

Yet, companies still struggle when it comes to structuring the cloud transformation, beginning with the fundamental first step — planning a successful migration. What’s lacking is a solid comprehension of what value the cloud brings, its potential and its elasticity.

To read this article in full or to leave a comment, please click here

Network World Cloud Computing

IDG Contributor Network: How to plan your successful cloud migration

Recent Accenture Strategy research found that four out of five companies run up to half of their business functions in the cloud. Moreover, that figure is likely to increase significantly over the next few years. The research reveals that a clear majority of business leaders see the cloud platform as a critical enabler of greater innovation and competitive edge.

Yet, companies still struggle when it comes to structuring the cloud transformation, beginning with the fundamental first step — planning a successful migration. What’s lacking is a solid comprehension of what value the cloud brings, its potential and its elasticity.

To read this article in full or to leave a comment, please click here

Network World Cloud Computing

IDG Contributor Network: Future-proof your business with cloud ERP

Today you face a choice. Be a disruptor or be disrupted. Beat or be beaten by the opposition. And while you’re weighing the options, every new digital development is making your margin for error smaller.

What you could have dealt with 10 years ago, before the availability of real-time data and digital channels, is now enough to be fatal. Company size, market share and market cap aren’t the only metrics that matter to a company. Digital value and innovation are increasingly important and with good reason. It’s about being able to create digital value and innovate – and that’s no longer just a nice-to-have.

If you’re like me, and billions of others, you expect customization and personalization. You’re unique. Your needs are unique. Why should your car or your Nikes be just like all the others?

To read this article in full or to leave a comment, please click here

CIO Cloud Computing

IDG Contributor Network: Future-proof your business with cloud ERP

Today you face a choice. Be a disruptor or be disrupted. Beat or be beaten by the opposition. And while you’re weighing the options, every new digital development is making your margin for error smaller.

What you could have dealt with 10 years ago, before the availability of real-time data and digital channels, is now enough to be fatal. Company size, market share and market cap aren’t the only metrics that matter to a company. Digital value and innovation are increasingly important and with good reason. It’s about being able to create digital value and innovate – and that’s no longer just a nice-to-have.

If you’re like me, and billions of others, you expect customization and personalization. You’re unique. Your needs are unique. Why should your car or your Nikes be just like all the others?

To read this article in full or to leave a comment, please click here

CIO Cloud Computing

Juniper’s Cloud-Grade networking aims to deliver network agility

There should be no question in anyone’s mind that the cloud era has arrived. Businesses are adopting the cloud at an unprecedented rate and by 2020, the number of cloud workloads will be on par with the number of on-premises ones.

Businesses of all sizes are turning to the cloud to help them become digital by increasing the level of agility. To be an agile business, though, the entire network stack—from the network through applications must be agile.

+ Also on Network World: Juniper heads to the clouds with Unite +

However, organizations are also more cost conscious than ever, so whatever solution is deployed must save money in addition to making the network more dynamic. 

To read this article in full or to leave a comment, please click here

Network World Cloud Computing

IDG Contributor Network: Future-proof your business with cloud ERP

Today you face a choice. Be a disruptor or be disrupted. Beat or be beaten by the opposition. And while you’re weighing the options, every new digital development is making your margin for error smaller.

What you could have dealt with 10 years ago, before the availability of real-time data and digital channels, is now enough to be fatal. Company size, market share and market cap aren’t the only metrics that matter to a company. Digital value and innovation are increasingly important and with good reason. It’s about being able to create digital value and innovate – and that’s no longer just a nice-to-have.

If you’re like me, and billions of others, you expect customization and personalization. You’re unique. Your needs are unique. Why should your car or your Nikes be just like all the others?

To read this article in full or to leave a comment, please click here

CIO Cloud Computing

IDG Contributor Network: Future-proof your business with cloud ERP

Today you face a choice. Be a disruptor or be disrupted. Beat or be beaten by the opposition. And while you’re weighing the options, every new digital development is making your margin for error smaller.

What you could have dealt with 10 years ago, before the availability of real-time data and digital channels, is now enough to be fatal. Company size, market share and market cap aren’t the only metrics that matter to a company. Digital value and innovation are increasingly important and with good reason. It’s about being able to create digital value and innovate – and that’s no longer just a nice-to-have.

If you’re like me, and billions of others, you expect customization and personalization. You’re unique. Your needs are unique. Why should your car or your Nikes be just like all the others?

To read this article in full or to leave a comment, please click here

CIO Cloud Computing

IDG Contributor Network: The future is not the cloud or the fog: it is actually the SEA!

A casual reflection on the last few years in the evolution of the wireless network provides us all the insights necessary to reason that there is at least one final frontier coming down the road. Who can deny that the last few years have been owned by the cloud, virtualization and softwarization (if that is even a word!). Edge Computing too, which is really nothing more than the pushing of all of these concepts deep into places in the network where they have never been before. Fog computing is another term (created by Cisco) for something similar but driven in its genesis more bottom up from the many Internet of Things use cases. The bigger trend is obvious; network intelligence is distributing but where will it, can it go, beyond this?

To read this article in full or to leave a comment, please click here

Network World Cloud Computing

IDG Contributor Network: What does ‘open’ mean to IT in the cloud era?

The term “open” when used in the IT context is an old and heavily used word. In an industry where new terms are introduced with incredible frequency, then age, and are discarded like napkins at a BBQ restaurant, the term “open” has surprising longevity. But what does “open” mean in the IT context? And why is it important to IT decision makers?

Dictionary.com offers a robust set of definitions for “open” as a verb, adjective and noun. For IT, I like number 5 under adjective – “relatively free of obstructions to sight, movement, or internal arrangement.” This fits with the most common uses in IT associated with open standards and open source software (OSS) – visibility and access to the creation, enhancement and maintenance of standards and software.

To read this article in full or to leave a comment, please click here

CIO Cloud Computing

IDG Contributor Network: What does ‘open’ mean to IT in the cloud era?

The term “open” when used in the IT context is an old and heavily used word. In an industry where new terms are introduced with incredible frequency, then age, and are discarded like napkins at a BBQ restaurant, the term “open” has surprising longevity. But what does “open” mean in the IT context? And why is it important to IT decision makers?

Dictionary.com offers a robust set of definitions for “open” as a verb, adjective and noun. For IT, I like number 5 under adjective – “relatively free of obstructions to sight, movement, or internal arrangement.” This fits with the most common uses in IT associated with open standards and open source software (OSS) – visibility and access to the creation, enhancement and maintenance of standards and software.

To read this article in full or to leave a comment, please click here

CIO Cloud Computing

IDG Contributor Network: Accelerating Organizational Velocity through a Data Center Autopilot

Understanding the impact of the data center autopilot

Current state of the art and my disappointment with traditional databases aside, I mentioned in my comments last week that the data center autopilot will have big consequences. It seems to me that there is not enough recognition of the likely impact. The tactical observations are that automation will reduce people costs, at least on a per-workload basis, and that automation will:

  • Minimize over-provisioning,
  • Help reduce downtime,
  • Help to manage SLAs, and
  • Improve transparency, governance, auditing and accounting.

That is all true, but it’s not the big story: The overall strategic impact is to significantly accelerate organizational velocity. The acceleration is partly as a result of the above efficiencies, but much more importantly as a consequence of automated decisions being made and implemented orders-of-magnitude faster than manual decisions can be. Aviation autopilots do things that human pilots are not fast enough to do. They are used to stabilize deliberately unstable aircraft such as the Lockheed F-117 Nighthawk at millisecond timescales, and deliver shorter flight times by constantly monitoring hundreds of sensors in real time and optimally exploiting jetstreams.

To read this article in full or to leave a comment, please click here

CIO Cloud Computing

IDG Contributor Network: Digital Ecosystems: Do Not Do It Alone!

As software becomes an increasingly large part of an enterprise’s external expression, traditional physical ecosystems—such as suppliers, resellers, and retailers—need to be supplemented, and in some cases supplanted, by new software ecosystems.

Consider Walgreens, a customer of my employer, Google. To interact with customers, Walgreens doesn’t merely operate physical stores and provide first-party apps and websites. On the contrary, it also expresses core services—such as filling prescriptions or ordering photo prints—as APIs. This enables developers and partners to easily integrate Walgreens services into their own products, which in turn enables Walgreens to extend its brand presence into ecosystems it neither owns nor had to build.

To read this article in full or to leave a comment, please click here

CIO Cloud Computing

IDG Contributor Network: Cloud API integration platforms make the digital economy work

In the digital economy, integration and collaboration involving platforms and applications is essential for success. Whether with a startup or a mature enterprise, one of the most important strategic initiatives a business puts forth is the design and implementation of a clean and efficient SaaS-based application programming interface (API) integration system.

“APIs are important because no man is an island,” says Matthew Woodget, CEO of Go Narrative, a Seattle-based marketing consultancy specializing in storytelling for business. “We are interconnected and our technology needs to be too.”

To read this article in full or to leave a comment, please click here

CIO Cloud Computing

IDG Contributor Network: When it comes to cloud, one size does not fit all

While the cloud market is very competitive, enterprises are making it clear that when it comes to cloud, one size does not fit all. They can’t build their businesses by just relying on infrastructure-as-a-serve (IaaS) and committing to one vendor.

These sentiments were echoed by Mary Meeker’s annual internet trends report, which found that companies are increasingly concerned about being locked-in with one cloud vendor. Citing data from Bain and Morgan Stanley, it was found that in 2015, 22 percent of organizations surveyed said they had concerns about using only one cloud vendor, compared with only seven percent in 2012.

To read this article in full or to leave a comment, please click here

Network World Cloud

IDG Contributor Network: Is shadow IT something CIOs should worry about?

Pervasiveness of shadow IT

I talked to several CIOs in the #CIOChat recently about shadow IT.Their collective wisdom is shared in this post. The first thing that impressed me in this chat is that the CIOs know the numbers. CIOs shared what they had learned from Cisco, Gartner, and Brocade. Cisco found that shadow cloud use was greater than 15 times higher than estimated by CIOs. CIOs said that Gartner’s research found that more than 40 percent of IT spend is in fact shadow IT. And Brocade, which did a global survey of 200 CIOs, found that more than 80 percent had seen some form of unauthorized cloud/SaaS usage.

Does the presence of shadow IT make a statement?

I asked the CIOs whether the presence of shadow IT makes a statement about business/IT alignment. CIOs had a wide range of answers to this question. CIOs said that often the real problem is not shadow IT but why and how shadow IT emerged. CIOs suggest that in many cases, shadow IT is in fact a symptom of unmet needs. It can as well imply a perceived lack of speed for IT versus the needs of the business.

To read this article in full or to leave a comment, please click here

CIO Cloud Computing

IDG Contributor Network: VDI deserves another look based on Dell EMC VDI Complete

Virtual Desktop Infrastructure (VDI) is well known to be a vastly underutilized technology in enterprise. A large majority of the market has long been aware of the potential benefits but has been waiting on the technology to mature. The new Dell EMC VDI Complete offering announced recently at Dell EMC World 2017 was a big reminder of how far this technology has most recently progressed and why it is time for a revisit.

Dell EMC’s VDI Complete offering takes a unique step beyond past VDI solution bundles by combining all of the hardware infrastructure and the software stack into a fully validated offering that is priced, delivered, and supported by a single vendor. This consolidated offer structure also enables them to offer a monthly cost per user consumption model in addition to an upfront prepay model. With this introduction, they have tackled each of the top remaining complexities to delivering VDI solutions, namely cost predictability, deployment, and support.

To read this article in full or to leave a comment, please click here

CIO Cloud Computing

IDG Contributor Network: Cloud helps Elon Musk further his audacious goals

There are some people whose vision of the future simply defy words. I would put Elon Musk firmly in the category – changing the world through a single initiative isn’t Musk’s style, rather, he wants to deliver his vision of the future across multiple areas. Space travel? Check. Hyper-efficient terrestrial transportation? Also check. Personal automobiles that challenge both existing business and technology models? Check. Solar power with new economics and scale? Also check. While many would question his political leanings, there is no denying that Musk is a genius.

I’ve never met Musk, but watching him speak it is obvious that this is one visionary who not only sees a “bigger picture” for the future of humanity, but he also deeply understands the technology constraints and opportunities that will deliver the future. Which is an inspiring thing to watch, but which also places huge challenges upon the individuals who need to deliver that work. By extension, it also pushes the boundaries of what existing technologies can do.

To read this article in full or to leave a comment, please click here

Network World Cloud

IDG Contributor Network: Cloud helps Elon Musk further his audacious goals

There are some people whose vision of the future simply defy words. I would put Elon Musk firmly in the category – changing the world through a single initiative isn’t Musk’s style, rather, he wants to deliver his vision of the future across multiple areas. Space travel? Check. Hyper-efficient terrestrial transportation? Also check. Personal automobiles that challenge both existing business and technology models? Check. Solar power with new economics and scale? Also check. While many would question his political leanings, there is no denying that Musk is a genius.

I’ve never met Musk, but watching him speak it is obvious that this is one visionary who not only sees a “bigger picture” for the future of humanity, but he also deeply understands the technology constraints and opportunities that will deliver the future. Which is an inspiring thing to watch, but which also places huge challenges upon the individuals who need to deliver that work. By extension, it also pushes the boundaries of what existing technologies can do.

To read this article in full or to leave a comment, please click here

Network World Cloud