SlideShare ist ein Scribd-Unternehmen logo
1 von 42
Consider BYOC as Part of a  Desktop-as-a-Service Strategy
Introduction Info-Tech Research Group Info-Tech finds that  Bring Your Own Computer (BYOC) policies and programs should only be considered  by organizations that have developed specific capabilities in  infrastructure, support, security architecture   and   end-user policies   that support a strategic shift from desktop asset management to service management. For those who have made progress on this path, BYOC offers the potential to improve service and reduce cost. For others, understanding the BYOC end state allows necessary capability enhancements to be prioritized  based on the incremental benefits each delivers. This research is designed for: This research will help you: ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],The growing popularity and use of personal devices, from smartphones and iPods through tablets to laptops, is challenging IT to take a position on allowing – and even encouraging  –  the use of such devices in the workplace.
Executive Summary ,[object Object],[object Object],[object Object],[object Object],[object Object],Info-Tech Research Group
Strategize Execute Understand ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],1
BYOC is seen by many to be complex, expensive, and dangerous – especially for software support & security of business assets ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Info-Tech Research Group 19% 23%
However, there is interest & real benefits available for those who want to take advantage of the opportunity IT Benefits Dealing with less break/fix and more infrastructure, security, and strategic initiatives – issues with a higher priority. Lowering costs through elimination of the function of acquiring, configuring, deploying, and maintaining end-user IT assets. Improved efficiency in application management and delivery through centralization means not having to manage applications across distributed assets. Business Benefits Incentive for recruiting and retention. Hire remote employees to reduce office real estate costs and maximize the available talent pool. In business continuity situations, employees can have their work with them outside the office in case of emergency. End-User Benefits Sense of ownership and greater end-user satisfaction. Employees can set their own preferences for their devices.  Work flexibility and agility. Ability to use the tools that fit their needs and work style. 100% Laptops 12% 19% 17% Tablets 17% 13% 16% Smartphones 11% 16% 25% Very Interested Implementing Somewhat Interested Not at All Interested Interested Source: Info-Tech Research Group N=75
Interest in BYO has escalated because of advancements on both the IT and the consumer side Info-Tech Research Group Generation Y Millennials started entering the workforce in larger numbers and are often associated with the consumerization of IT. Many of the next generation employees don’t remember a world without the Internet and are used to having the latest PC or Mac at their fingertips. Some companies are using BYOC as an incentive program to attract new talent; however,  most companies are not likely to look at this as a top driver  for business decision-making. Tablets Bring Your Own Computer might more aptly be called BYO Device (BYOD), as much of the recent interest has been driven by iPad users and the proliferation of tablets and smartphones in the workplace. The pressure on IT began as a result of end users and C-level executives wanting to take advantage of their latest toy. As the number and capabilities of tablets on the market continue to grow, so too does pressure for BYOC programs. The Cloud Available SaaS options are almost unlimited – covering, for example, Payroll, Accounting, CRM, Project Management, and HR Management Systems. Online productivity suites are also maturing  year over year:  Google Apps ,  Zoho , and now  Microsoft Office 365  all offer the potential to reduce application maintenance costs by placing responsibility for patching and upgrading in the hands of a third-party cloud vendor. Virtualization Desktop virtualization is continuing to take hold in organizations of all sizes. Desktop virtualization can range from the virtualization of individual applications to full desktops. Organizations that are farther along the virtualization path are looking for new ways to leverage this desktop-as-a-service delivery model to reduce hardware and support costs. IT Consumer
BYOC can be a hot topic for IT – both for and against it; a conversation is potentially confrontational but necessary Info-Tech Research Group In Info-Tech’s survey of trends to watch in 2011, BYOC came dead last.  BYOC has established itself as a polarizing topic among IT professionals.  Some are very optimistic while others are vehemently opposed to the idea. Interestingly, while BYOC is last, interest in and adoption of desktop virtualization (DV) is very high.  DV is seen as a significant enabler of BYOC, and this may predict the future state of BYOC on this chart. I’d love to be the Dr. No, but that’s not a culture that I’ve ever promoted in my organization. We can’t say no to people. They’ll just work around you. These things will come in whether you like it or not. So you better figure out how you want to manage it.” - CISO, Government “ Bring Your Own Computer might more accurately be called BYO Device (BYOD), as it includes a full range of devices from smartphones to tablets to laptops, and whatever the future brings. “ I was talking to a major ISV that employs probably 10,000 people or something like that. And they ran a scan to see how many unmanaged devices they had. They called them cockroaches. And they had 3,000 unmanaged devices that were connected to the network, and they have no idea who owns them. And they definitely didn’t buy them. So whether you like it or not, it’s happening, and IT needs to get on top of it.” - From conversation with virtualization vendor The more IT resists, the more end users are going to push. It’s an age old problem that will only get worse with time:  shadow devices on the network .  High Low Adoption Interest Source: Info-Tech Research Group N = 254
Where this solution set fits: BYOC is enabled by  desktop virtualization capabilities Those considering or already implementing BYOC can do so because they are developing capabilities that enable multi-device access and alternatives to traditional desktop PCs. Info-Tech Research Group Question BYOC is fraught with difficulties in a traditional distributed client PC environment. As organizations begin exploring alternative delivery methods, when is the best time to consider BYOC? Answer BYOC can be, and is being, considered by those who are moving away from the traditional distributed fat client model.  Who would that be?  Organizations that are exploring alternatives to desktop PCs for workers (laptops, thin clients, tablets, and smartphones) as well as alternative application delivery methods such as application presentation, cloud-based SaaS, and Web-enabled applications.  Organizations that are invested in or interested in investing in desktop virtualization are better prepared for BYOC and willing to extend their capabilities to this service. Those who are not leveraging virtualization technologies to replace traditional desktops are less likely to be interested in BYOC.  Related sets that address aspects of desktop virtualization: Develop a Desktop Virtualization Strategy Select a Desktop Virtualization Solution Build Steps to VDI Implementation
Take a device-agnostic approach, but recognize that different devices are used for different purposes Info-Tech Research Group Smartphones, tablets, and laptops are on a  usage continuum  which is characterized at one end by consumption of small chunks of information with little creation or manipulation; at the other end is broad data consumption and significant creation and manipulation.  Tablets are somewhere in the middle and have attributes overlapping both ends of the spectrum. They can be used, for example, to access iPad apps but also full virtual desktops.  It is no surprise that executives, who want ready access to small chunks of content in a highly mobile environment while being less likely to create or manipulate content, are more likely to pressure IT for smartphone BYOC policies. Data Consumption, Creation, and Manipulation Implementing 29% Interest 39% 61% 38% 62% 71% No Interest No Executive Pressure Executive Pressure Bring Your Own Smartphones Source: Info-Tech Research Group N = 71 % of Organizations
Critical Planning Principle: minimize the corporate presence on end-user devices, whether employee or company-owned Installation of company-owned or licensed data and applications on a device creates challenges for support, management, and protection of these assets. To meet the objective of reducing the complexity and cost of end-point device management, the company footprint must be minimized. Info-Tech Research Group We won’t give you wide open access to the network. We’ll just give you presentation layer access, browser-based access to the resources. So that’s the approach we’re starting to take more and more because it’s a recognition that we have absolutely no control over and governance over an employee-owned machine, be it an iPad or, frankly, a smartphone. It’s not going to matter.” - CISO, Government “ ,[object Object],[object Object],[object Object],[object Object],[object Object],“ You can no longer look at this as an iPad issue or as the Chrome 3 or Android 3 devices start to come out.  You’re going to choke on trying to keep up with any kind of platform.”
Lower costs and improve service using alternatives to  traditional fat client PC deployment & management BYOC is the cart, not the horse. BYOC should not drive efforts such as replacement of traditional PCs with virtual desktops. Rather, those efforts make it possible to consider a BYOC policy.  Info-Tech Research Group So if not BYOC exclusively, what is the overall goal? Why do it? Imagine a world where IT could focus on the delivery of the information services and applications that workers need to perform their jobs, while not having to spend time on the devices that workers use to access those services and applications.  This world would be device agnostic; the type of device used to access applications and services wouldn’t matter.  Access to applications and services on the devices would require  the most basic, simple to use, and easy to support access clients possible .  ,[object Object],[object Object],[object Object],[object Object],Is this a return to dumb terminals? In a sense, yes. But these access terminals will provide a window to applications that are as feature-rich and powerful as anything that runs on a PC desktop. In fact, in certain cases, they will be  the same applications  as the desktop. For cases employing virtual desktop infrastructure, the PC desktop itself will be an accessible service from a range of devices. Info-Tech Insight:
Reduce business costs & IT complexity by minimizing desktop management requirements The Three Objectives of a Desktop-as-a-Service Strategy Info-Tech Research Group ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],1. Reduce Cost and Complexity
Move away from asset management toward service management to enable a more flexible work environment Info-Tech Research Group ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],The Three Objectives of a Desktop-as-a-Service Strategy ,[object Object],[object Object],[object Object],2. Improve Agility and Access
Strike a balance between reduced complexity, increased agility, and security concerns Info-Tech Research Group 3. Ensure Security and Integrity ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],37.5% Very Challenging 9.7% 44.4% Not at all Challenging 0.0% 4.2% 4.2% 81.9%  of survey respondents said that security was challenging or very challenging. Source: Info-Tech Research Group N=72 ,[object Object],[object Object],[object Object],[object Object],The Three Objectives of a Desktop-as-a-Service Strategy
To meet the three objectives of a DaaS strategy, capabilities must be developed in infrastructure, ops, policy, and security Info-Tech Research Group ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Infrastructure Security Operations Policy
Without proper capabilities, there is simply too much cost & effort required for a successful BYO program No-Go State BYOC would be difficult without a significant cost/effort investment. Currently, users are coming in to work with their iPads despite being discouraged to do so. Infrastructure Traditional, distributed PC environment with some server virtualization, but no desktop virtualization (DV). There are current budget restrictions that prohibit moving forward on DV. Security Early stages of determining what security controls are required to mitigate the risk of employee-owned devices. They use SSL VPN and are investigating ways to leverage this further. Operations/Support Haven’t been able to build a compelling business case to support consumer devices  and do not see cost savings in outsourcing. Policies Current policy for contractors connecting to the business network is for IT to ensure the controls on the contractor machine meet or exceed those of the business. There is a user acceptance form in place. They would like to extend this policy to users, but unsure how to police it. Capability Maturity Policy Infrastructure Operations/Support Security Case Study
Organizations that have developed capabilities in desktop virtualization are better prepared for BYOC Info-Tech Research Group Can-Go State BYOC may not be desired but can be conceived. Currently, executives are coming to IT asking to bring their iPads into work as they see other businesses are enabling this. Infrastructure Have used presentation virtualization extensively for some users, but not all. Are exploring further virtualization of the desktop. Security Use multi-factor authentication to access the network, have fully encrypted hard drives on their assets, and have developed a plan to move towards a full, authenticated network in the near future. Operations/Support The CIO fully expects BYO to become par for the course and wants to leverage the internal skills achieved through their DV experience. There is some reluctance and concern about rolling out a new support model. Policy Have “secret sauce criteria” in place for dealing with different devices on the network, particularly with contractors. Can limit access for untrusted devices. Capability Maturity Policy Infrastructure Operations/Support Security Case Study
Development of capabilities in the four pillars will provide answers to these questions Info-Tech Research Group
Understand Strategize Execute ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],2
As devices move from light data consumption to heavy data creation, new capabilities must develop Tablets occupy a middle ground where consumption and creation of data has a wide range. BYOC needs to be a consideration once interest enters this zone. There are two potential paths that can be followed at this point. Info-Tech Research Group - Light data consumption - Minimal data creation ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],For more information on managing personal mobile devices, such as the iPhone, refer to the Info-Tech solution set,  Manage the Invasion of Consumer Technology . ,[object Object],[object Object],[object Object],Full BYOC BYOC Light Past this line, infrastructure, security, and operations pillars must be considered in order to support advanced data creation. Integration Virtualization Data Consumption and Creation Continuum
At one end of the BYO spectrum, there is emphasis on consuming small chunks of data with little to no data creation ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Info-Tech Research Group Least Effort Most Effort Least Effort Most Effort Least Effort Most Effort Infrastructure Operations/Support Policy Security Endpoint Central
Info-Tech recommends a virtualized model for  increased security & ease of management ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Info-Tech Research Group Least Effort Most Effort Least Effort Most Effort Least Effort Most Effort Infrastructure Operations/Support Policy Security Endpoint Central
Integrated models rely heavily on strong policies and require significantly more time & effort spent on support ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Info-Tech Research Group Least Effort Most Effort Least Effort Most Effort Least Effort Most Effort Infrastructure Operations/Support Policy Security Endpoint Central
Organizations may look to hybridization to take advantage of the best of all worlds ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Info-Tech Research Group Least Effort Most Effort Least Effort Most Effort Least Effort Most Effort Infrastructure Operations/Support Policy Security Endpoint Central
Required infrastructure capabilities are much the same as those for virtual desktop environments Info-Tech Research Group ,[object Object],[object Object],[object Object],[object Object],[object Object],Criticality of capacity planning, monitoring, and infrastructure support  are magnified with desktop virtualization relative to traditional desktop PC setups. For more details on infrastructure requirements, refer to Info-Tech’s  Develop a Desktop Virtualization Strategy . Focus on the following infrastructure enablers to minimize implementation pain
Truly mobile workers pose a challenge, but a virtualized infrastructure can help mitigate some pain points Info-Tech Research Group There may be some users that need a full functioning Windows desktop with all the applications, and these users may also be mobile and unable to connect to the network all the time. The challenge is how IT can provide flexibility and service to users who are not connected to the network.  Below is a list of product solutions that can address these four technologies. It is for example only, and  is not exhaustive . ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Draw a line in the sand: tell end users what they can and can’t do to decrease the effect on support costs Info-Tech Research Group The Question What are the obligations of IT in supporting the end user –  not  the PC?  52%  of respondents strongly agreed with the following statement:  Help desk support requirements have  increased  [since allowing personal devices on the network]. In short, when it comes to personal device support, focus on mitigating connectivity issues with corporate infrastructure. Leave end users to manage their own devices when it comes to hardware and support issues.  n = 113 In Info-Tech’s survey on personal mobile devices, the majority of survey respondents interviewed saw an  increase  in support costs after permitting personal devices on the network. Those that did not focused heavily on developing a policy that outlined resolution options for common issues. ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Consider alternatives to help ease the adjustment of new support arrangements: both for IT and the end user % Info-Tech Research Group Third-party support contracts . As part of a stipend, the business can ask employees to secure support contracts for their devices in case of hardware failure. If employees buy their laptop from a franchise/box store, service contracts are often not suitable for business requirements. In this case, the business may want to contract a suitable service provider and direct employees where to take their devices. A key element of this is having emergency reserves on hand to maintain productivity while the device is being repaired – this could range from previously retired hardware to thin clients. Self-support . The business can also encourage self-service and peer support for some problems. The success of this depends greatly on how comfortable the employee population feels about technology. IT may consider developing a knowledge base or internal wiki that employees can use to self-diagnose and self-help. The changing role of IT  from asset manager to service manager. This is a real paradigm shift for IT. The administrative side of desktop management doesn’t really change – managing access and privileges – but IT is no longer managing patching and upgrading on individual machines.
The discussion to move towards BYOC is not just about IT  policy  alone; involve all parts of the business Info-Tech Research Group IT  will determine the capability of both the infrastructure and IT staff skills to support the program. It may be necessary to create a skills inventory to determine capability and support guidelines. IT will also outline minimum requirements for devices purchased by employees. HR  will define policies that are already available to be leveraged as well as new policies that must be developed. They will also determine how best to handle new employee onboarding, probation periods, and stipend proration if necessary.  Finance  can crunch the numbers and outline tax implications of the program for the business in order to determine an appropriate stipend amount. Legal  will advise as to any compliance or regulatory restrictions that may interfere in widespread deployment of the program. Restrictions may be placed on a department by department basis. See Info-Tech’s  BYOC Acceptable Use Policy .
Secure  access from the BYO device to company networks and centrally-stored data therein ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],How will devices be allowed to connect to internal company networks (wired or wireless)? Options & considerations for internal connection of BYO devices to business networks: ,[object Object],[object Object],[object Object]
Secure  all copies of company data stored on the employee-owned device ,[object Object],[object Object],[object Object],[object Object],[object Object],Info-Tech Research Group Will devices be allowed to store copies of company data  locally ? Options & considerations for storing local copies of data: ,[object Object],[object Object],[object Object]
Understand your current capabilities and assess your readiness for different BYOC approaches ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Info-Tech Research Group
Strategize Execute 3 Understand ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
If the capabilities assessment says you are ready for BYOC, consider these five actions for moving forward with a policy ,[object Object],Success in developing the four pillar capabilities means the organization can support BYOC. Next is to establish the why and the how.  Info-Tech Research Group 1 ,[object Object],[object Object],2 ,[object Object],[object Object],3 ,[object Object],[object Object],4 ,[object Object],[object Object],5 ,[object Object],[object Object]
Measure success against overall objectives  of a multi-device strategy ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Having a multi-device IT service access strategy should contribute to lowering costs while increasing service regardless of who owns the devices. How does BYOC further those objectives? Info-Tech Research Group
Consider impact on overall objectives when deciding between passive or aggressive approach Bring your own policies can range from passive (we allow connection from personally-owned devices to select services) to aggressive (we encourage and even subsidize BYOC).  Passive Approach ,[object Object],[object Object],Aggressive Approach ,[object Object],[object Object]
If your organization decides to pursue an aggressive policy, think about including a stipend as part of the BYOC policy Info-Tech Research Group Below are purchase details for a new laptop on Dell’s online Small & Medium Business shop which allows for business editions of software, such as the OEM version of Windows 7 Pro rather than Home edition. Compare the cost of an individually purchased laptop against the cost of purchasing a device at volume through the business.  Cost considerations: Taxation . Some businesses are eligible for a refund of the sales tax paid toward a business laptop. The amount of the refund varies by the size of the business as well as local tax laws. Cost of Support . The ideal state of a BYOC program is that IT will no longer be responsible for maintenance of the hardware. Calculate the number of man hours spent previously against expected savings. Licensing . Microsoft’s Software Assurance (SA) does not apply to thin clients or employee-owned devices. Compare the cost of SA against the cost of individual licenses or the $100/device/year Virtual Desktop Access (VDA) fee. Dell Vostro 3500 Laptop Processor Intel Core i5 (560M) 2.53GHz/3MB cache Operating System Windows 7 Pro 64-Bit Memory 4GB DDR3 Display 15.6” Hard Drive 320GB SATA Service & Warranty 3 Year Advanced Service Plan (next business day onsite service) Productivity Suite None . Add $399.00 for Office Pro 2010 Anti-Virus None . Add $40.00 for 36 months of Trend Micro Worry-Free Business Security Services Keyboard and Mouse None . Add $99.99 for Wireless Logitech MK710 Included Option Fingerprint reader Price $1219.99 +tax
Communication of policy requirements and explicit support expectations will be critical Failure to meet success measures can be a result of communication failures  as much as a failure of technical and operational capability. Info-Tech Research Group Here’s a Typical Concern The boss loves his smartphone. He wants to use it for work-related tasks. He also wants anybody in the organization with a smartphone to be able to use one. However, if his smartphone stops functioning, he’ll expect IT to support it. As seen above, a previous Info-Tech survey indicated that over half of respondents (52%) found that support workload increased with a mobile device strategy. If the organization has successfully moved to a model where support is focused on making services available and accessible, support requirements at the access points (access devices) should decrease. But this only works if the user community clearly understands their responsibilities and the obligations of the organization to support the device. Action This is a big culture change, so communication is key. Make sure the policies around BYOC are clear and explicit. Define what is in and out of scope in terms of support and in terms of what can be accessed by the employees using their device. Communications Plan Template for a BYOC Program
Maintain business-owned device options for  flexibility and end-user service ,[object Object],Info-Tech sees that even in the case of an aggressive BYOC program, allowing use of a company-owned device can mitigate a number of the potential pitfalls of BYOC. Info-Tech Research Group ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Document your policy position and rationale for the business ,[object Object],[object Object],[object Object],[object Object],In dealing with your internal business customers’ demand for service, there is only one question (with two corollaries) that matter. Can you deliver this service? If yes, how? If no, why? Info-Tech Research Group
Conclusion Info-Tech Research Group ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Understand Strategize Execute High Low Adoption

Weitere ähnliche Inhalte

Was ist angesagt?

Software Engineering: Designing a Better Experience for Communications, Media...
Software Engineering: Designing a Better Experience for Communications, Media...Software Engineering: Designing a Better Experience for Communications, Media...
Software Engineering: Designing a Better Experience for Communications, Media...Cognizant
 
The cloud primer
The cloud primerThe cloud primer
The cloud primerJoe Orlando
 
How Domain-Driven Design Can Boost Legacy System Modernization
How Domain-Driven Design Can Boost Legacy System ModernizationHow Domain-Driven Design Can Boost Legacy System Modernization
How Domain-Driven Design Can Boost Legacy System ModernizationCognizant
 
Windows Apps on Chromebooks: Deliver a Seamless Experience
Windows Apps on Chromebooks: Deliver a Seamless ExperienceWindows Apps on Chromebooks: Deliver a Seamless Experience
Windows Apps on Chromebooks: Deliver a Seamless ExperienceCitrix
 
Blue Central and the world of End User Computing
Blue Central and the world of End User ComputingBlue Central and the world of End User Computing
Blue Central and the world of End User ComputingBlue Central
 
Gabriel consulting whitepaper on enterprise IT for SMB
Gabriel consulting whitepaper on enterprise IT  for SMBGabriel consulting whitepaper on enterprise IT  for SMB
Gabriel consulting whitepaper on enterprise IT for SMBJyothi Satyanathan
 
Erp cloud white paper final
Erp cloud white paper finalErp cloud white paper final
Erp cloud white paper finalraisinli
 
Enterprise application
Enterprise applicationEnterprise application
Enterprise applicationancientsoul90
 
Karen Forster Top 10 IT Costs
Karen Forster Top 10 IT CostsKaren Forster Top 10 IT Costs
Karen Forster Top 10 IT Costspvjeff
 
NEC Backup as a Service reduces administrative tasks, helping it departments...
 NEC Backup as a Service reduces administrative tasks, helping it departments... NEC Backup as a Service reduces administrative tasks, helping it departments...
NEC Backup as a Service reduces administrative tasks, helping it departments...InteractiveNEC
 
Microsoft India - SharePoint Online Services Business Value Whitepaper
Microsoft India - SharePoint Online Services Business Value WhitepaperMicrosoft India - SharePoint Online Services Business Value Whitepaper
Microsoft India - SharePoint Online Services Business Value WhitepaperMicrosoft Private Cloud
 
Enterprise Computing - A Vision of Future Today (Presentation to DCU students)
Enterprise Computing - A Vision of Future Today (Presentation to DCU students)Enterprise Computing - A Vision of Future Today (Presentation to DCU students)
Enterprise Computing - A Vision of Future Today (Presentation to DCU students)Castlebridge Associates
 
Cloud computing research
Cloud computing researchCloud computing research
Cloud computing researchWardah AK
 
IDC Study on Enterprise Hybrid Cloud Strategies
IDC Study on Enterprise Hybrid Cloud StrategiesIDC Study on Enterprise Hybrid Cloud Strategies
IDC Study on Enterprise Hybrid Cloud StrategiesEMC
 
Presentation end-user computing in the post-pc era
Presentation   end-user computing in the post-pc eraPresentation   end-user computing in the post-pc era
Presentation end-user computing in the post-pc erasolarisyourep
 
2015_buyers_guide_to_accounting_and_financial_software
2015_buyers_guide_to_accounting_and_financial_software2015_buyers_guide_to_accounting_and_financial_software
2015_buyers_guide_to_accounting_and_financial_softwareScott Lewis
 

Was ist angesagt? (20)

Software Engineering: Designing a Better Experience for Communications, Media...
Software Engineering: Designing a Better Experience for Communications, Media...Software Engineering: Designing a Better Experience for Communications, Media...
Software Engineering: Designing a Better Experience for Communications, Media...
 
Cloud Computing Project
Cloud Computing ProjectCloud Computing Project
Cloud Computing Project
 
The cloud primer
The cloud primerThe cloud primer
The cloud primer
 
How Domain-Driven Design Can Boost Legacy System Modernization
How Domain-Driven Design Can Boost Legacy System ModernizationHow Domain-Driven Design Can Boost Legacy System Modernization
How Domain-Driven Design Can Boost Legacy System Modernization
 
Windows Apps on Chromebooks: Deliver a Seamless Experience
Windows Apps on Chromebooks: Deliver a Seamless ExperienceWindows Apps on Chromebooks: Deliver a Seamless Experience
Windows Apps on Chromebooks: Deliver a Seamless Experience
 
Retail Cloud Services
Retail Cloud ServicesRetail Cloud Services
Retail Cloud Services
 
Blue Central and the world of End User Computing
Blue Central and the world of End User ComputingBlue Central and the world of End User Computing
Blue Central and the world of End User Computing
 
Gabriel consulting whitepaper on enterprise IT for SMB
Gabriel consulting whitepaper on enterprise IT  for SMBGabriel consulting whitepaper on enterprise IT  for SMB
Gabriel consulting whitepaper on enterprise IT for SMB
 
SageX3_CIO_Whitepaper
SageX3_CIO_WhitepaperSageX3_CIO_Whitepaper
SageX3_CIO_Whitepaper
 
article 3 may
article 3 mayarticle 3 may
article 3 may
 
Erp cloud white paper final
Erp cloud white paper finalErp cloud white paper final
Erp cloud white paper final
 
Enterprise application
Enterprise applicationEnterprise application
Enterprise application
 
Karen Forster Top 10 IT Costs
Karen Forster Top 10 IT CostsKaren Forster Top 10 IT Costs
Karen Forster Top 10 IT Costs
 
NEC Backup as a Service reduces administrative tasks, helping it departments...
 NEC Backup as a Service reduces administrative tasks, helping it departments... NEC Backup as a Service reduces administrative tasks, helping it departments...
NEC Backup as a Service reduces administrative tasks, helping it departments...
 
Microsoft India - SharePoint Online Services Business Value Whitepaper
Microsoft India - SharePoint Online Services Business Value WhitepaperMicrosoft India - SharePoint Online Services Business Value Whitepaper
Microsoft India - SharePoint Online Services Business Value Whitepaper
 
Enterprise Computing - A Vision of Future Today (Presentation to DCU students)
Enterprise Computing - A Vision of Future Today (Presentation to DCU students)Enterprise Computing - A Vision of Future Today (Presentation to DCU students)
Enterprise Computing - A Vision of Future Today (Presentation to DCU students)
 
Cloud computing research
Cloud computing researchCloud computing research
Cloud computing research
 
IDC Study on Enterprise Hybrid Cloud Strategies
IDC Study on Enterprise Hybrid Cloud StrategiesIDC Study on Enterprise Hybrid Cloud Strategies
IDC Study on Enterprise Hybrid Cloud Strategies
 
Presentation end-user computing in the post-pc era
Presentation   end-user computing in the post-pc eraPresentation   end-user computing in the post-pc era
Presentation end-user computing in the post-pc era
 
2015_buyers_guide_to_accounting_and_financial_software
2015_buyers_guide_to_accounting_and_financial_software2015_buyers_guide_to_accounting_and_financial_software
2015_buyers_guide_to_accounting_and_financial_software
 

Andere mochten auch

The New Workplace: Unleashing The Power Of Enterprise Mobility
The New Workplace: Unleashing The Power Of Enterprise MobilityThe New Workplace: Unleashing The Power Of Enterprise Mobility
The New Workplace: Unleashing The Power Of Enterprise MobilityChris Pepin
 
WSO2 Enterprise Mobility Manager - 2.0
WSO2 Enterprise Mobility Manager - 2.0WSO2 Enterprise Mobility Manager - 2.0
WSO2 Enterprise Mobility Manager - 2.0Dilshan Edirisuriya
 
Enabling Business and Reducing Costs Through IT Innovation
Enabling Business and Reducing Costs Through IT InnovationEnabling Business and Reducing Costs Through IT Innovation
Enabling Business and Reducing Costs Through IT InnovationChristina Inge
 
Enabling Innovation Nine Windows
Enabling Innovation Nine WindowsEnabling Innovation Nine Windows
Enabling Innovation Nine WindowsMike Cardus
 
IT Enabling Innovation Across The Corporate Enterprise
IT Enabling Innovation Across The Corporate EnterpriseIT Enabling Innovation Across The Corporate Enterprise
IT Enabling Innovation Across The Corporate EnterpriseRichard Platt
 
Develop an IT Strategy to Support Customer Service
Develop an IT Strategy to Support Customer ServiceDevelop an IT Strategy to Support Customer Service
Develop an IT Strategy to Support Customer ServiceInfo-Tech Research Group
 
Business Strategy Innovation
Business Strategy InnovationBusiness Strategy Innovation
Business Strategy InnovationBraden Kelley
 
Enabling Innovation: A 2017 Softchoice Research Study
Enabling Innovation: A 2017 Softchoice Research StudyEnabling Innovation: A 2017 Softchoice Research Study
Enabling Innovation: A 2017 Softchoice Research StudySoftchoice Corporation
 
Information literacy and computer literacy col aug 2011 2 0
Information literacy and computer literacy col aug 2011 2 0Information literacy and computer literacy col aug 2011 2 0
Information literacy and computer literacy col aug 2011 2 0Amy Glass
 
The Open Networking Foundation: Standard Bearer for SDN
The Open Networking Foundation: Standard Bearer for SDNThe Open Networking Foundation: Standard Bearer for SDN
The Open Networking Foundation: Standard Bearer for SDNOpen Networking Summits
 
Why Enterprise Architecture Must drive Cloud Strategy and Planning
Why Enterprise Architecture Must drive Cloud Strategy and PlanningWhy Enterprise Architecture Must drive Cloud Strategy and Planning
Why Enterprise Architecture Must drive Cloud Strategy and PlanningRateb Abu Hawieleh
 
Parts of the system unit
Parts of the system unitParts of the system unit
Parts of the system unitSamantha Regis
 
Aligning Innovation to Business Strategy
Aligning Innovation to Business StrategyAligning Innovation to Business Strategy
Aligning Innovation to Business StrategyJeremy Jay Lim
 
Computer Literacy For Teacher
Computer Literacy For TeacherComputer Literacy For Teacher
Computer Literacy For Teachermarticamil
 
Elements of Computer
Elements  of ComputerElements  of Computer
Elements of ComputerLUZ PINGOL
 
Fundamental elements of computer
Fundamental elements of computerFundamental elements of computer
Fundamental elements of computerJesus Obenita Jr.
 
7. Guide To Writing A Strategic Plan
7. Guide To Writing A Strategic Plan7. Guide To Writing A Strategic Plan
7. Guide To Writing A Strategic PlanEarl Stevens
 
Computer literacy
Computer literacyComputer literacy
Computer literacyPaulyn Go
 
Introduction to computer literacy
Introduction to computer literacyIntroduction to computer literacy
Introduction to computer literacyMkhululi Silinga
 

Andere mochten auch (20)

The New Workplace: Unleashing The Power Of Enterprise Mobility
The New Workplace: Unleashing The Power Of Enterprise MobilityThe New Workplace: Unleashing The Power Of Enterprise Mobility
The New Workplace: Unleashing The Power Of Enterprise Mobility
 
WSO2 Enterprise Mobility Manager - 2.0
WSO2 Enterprise Mobility Manager - 2.0WSO2 Enterprise Mobility Manager - 2.0
WSO2 Enterprise Mobility Manager - 2.0
 
Enabling Business and Reducing Costs Through IT Innovation
Enabling Business and Reducing Costs Through IT InnovationEnabling Business and Reducing Costs Through IT Innovation
Enabling Business and Reducing Costs Through IT Innovation
 
Enabling Innovation Nine Windows
Enabling Innovation Nine WindowsEnabling Innovation Nine Windows
Enabling Innovation Nine Windows
 
IT Enabling Innovation Across The Corporate Enterprise
IT Enabling Innovation Across The Corporate EnterpriseIT Enabling Innovation Across The Corporate Enterprise
IT Enabling Innovation Across The Corporate Enterprise
 
Develop an IT Strategy to Support Customer Service
Develop an IT Strategy to Support Customer ServiceDevelop an IT Strategy to Support Customer Service
Develop an IT Strategy to Support Customer Service
 
Business Strategy Innovation
Business Strategy InnovationBusiness Strategy Innovation
Business Strategy Innovation
 
Enabling Innovation: A 2017 Softchoice Research Study
Enabling Innovation: A 2017 Softchoice Research StudyEnabling Innovation: A 2017 Softchoice Research Study
Enabling Innovation: A 2017 Softchoice Research Study
 
Information literacy and computer literacy col aug 2011 2 0
Information literacy and computer literacy col aug 2011 2 0Information literacy and computer literacy col aug 2011 2 0
Information literacy and computer literacy col aug 2011 2 0
 
The Open Networking Foundation: Standard Bearer for SDN
The Open Networking Foundation: Standard Bearer for SDNThe Open Networking Foundation: Standard Bearer for SDN
The Open Networking Foundation: Standard Bearer for SDN
 
Why Enterprise Architecture Must drive Cloud Strategy and Planning
Why Enterprise Architecture Must drive Cloud Strategy and PlanningWhy Enterprise Architecture Must drive Cloud Strategy and Planning
Why Enterprise Architecture Must drive Cloud Strategy and Planning
 
Parts of the system unit
Parts of the system unitParts of the system unit
Parts of the system unit
 
Aligning Innovation to Business Strategy
Aligning Innovation to Business StrategyAligning Innovation to Business Strategy
Aligning Innovation to Business Strategy
 
Computer literacy first day slides
Computer literacy   first day slidesComputer literacy   first day slides
Computer literacy first day slides
 
Computer Literacy For Teacher
Computer Literacy For TeacherComputer Literacy For Teacher
Computer Literacy For Teacher
 
Elements of Computer
Elements  of ComputerElements  of Computer
Elements of Computer
 
Fundamental elements of computer
Fundamental elements of computerFundamental elements of computer
Fundamental elements of computer
 
7. Guide To Writing A Strategic Plan
7. Guide To Writing A Strategic Plan7. Guide To Writing A Strategic Plan
7. Guide To Writing A Strategic Plan
 
Computer literacy
Computer literacyComputer literacy
Computer literacy
 
Introduction to computer literacy
Introduction to computer literacyIntroduction to computer literacy
Introduction to computer literacy
 

Ähnlich wie Consider byoc as part of desktop as service strategy

Time for a New Mobile-Cloud Desktop Architecture
Time for a New Mobile-Cloud Desktop ArchitectureTime for a New Mobile-Cloud Desktop Architecture
Time for a New Mobile-Cloud Desktop ArchitectureITOutcomes
 
Handheld Devices & BYOD: Are Enterprises There Yet? - Management Information ...
Handheld Devices & BYOD: Are Enterprises There Yet? - Management Information ...Handheld Devices & BYOD: Are Enterprises There Yet? - Management Information ...
Handheld Devices & BYOD: Are Enterprises There Yet? - Management Information ...Vishrut Shukla
 
A Special Report on Infrastructure Futures: Keeping Pace in the Era of Big Da...
A Special Report on Infrastructure Futures: Keeping Pace in the Era of Big Da...A Special Report on Infrastructure Futures: Keeping Pace in the Era of Big Da...
A Special Report on Infrastructure Futures: Keeping Pace in the Era of Big Da...IBM India Smarter Computing
 
Overview_02-09-16_Digital Workspace
Overview_02-09-16_Digital WorkspaceOverview_02-09-16_Digital Workspace
Overview_02-09-16_Digital WorkspaceTricia Stream
 
Viability of bring your-own-computer BYOC programs
Viability of bring your-own-computer BYOC programsViability of bring your-own-computer BYOC programs
Viability of bring your-own-computer BYOC programsMasaf Dawood
 
Developing more effective mobile enterprise programs
Developing more effective mobile enterprise programsDeveloping more effective mobile enterprise programs
Developing more effective mobile enterprise programsIBM Software India
 
BYOD- A Productivity Catalyst
BYOD- A Productivity CatalystBYOD- A Productivity Catalyst
BYOD- A Productivity CatalystPacket One
 
A Business-Driven Approach to Mobile Enterprise Security
A Business-Driven Approach to Mobile Enterprise SecurityA Business-Driven Approach to Mobile Enterprise Security
A Business-Driven Approach to Mobile Enterprise SecurityТранслируем.бел
 
BYOD - Highlights of "Consumerization"
BYOD - Highlights of "Consumerization"BYOD - Highlights of "Consumerization"
BYOD - Highlights of "Consumerization"NEORIS
 
Building it infrastructure framework that drives innovation and business perf...
Building it infrastructure framework that drives innovation and business perf...Building it infrastructure framework that drives innovation and business perf...
Building it infrastructure framework that drives innovation and business perf...GlobalStep
 
Mobile exalead-whitepaper-a4-8-lw
Mobile exalead-whitepaper-a4-8-lwMobile exalead-whitepaper-a4-8-lw
Mobile exalead-whitepaper-a4-8-lwCarolineFlamand
 
Tablet Access to Business Applications
Tablet Access to Business ApplicationsTablet Access to Business Applications
Tablet Access to Business Applications Array Networks
 
The Essential BYOD Handbook
The Essential BYOD HandbookThe Essential BYOD Handbook
The Essential BYOD HandbookBarcoding, Inc.
 
Good Technology Whitepaper: Mobile Content Collaboration
Good Technology Whitepaper: Mobile Content CollaborationGood Technology Whitepaper: Mobile Content Collaboration
Good Technology Whitepaper: Mobile Content CollaborationKirk Donnan
 
NFRASTRUCTURE MODERNIZATION REVIEW Analyz.docx
NFRASTRUCTURE MODERNIZATION REVIEW                      Analyz.docxNFRASTRUCTURE MODERNIZATION REVIEW                      Analyz.docx
NFRASTRUCTURE MODERNIZATION REVIEW Analyz.docxcurwenmichaela
 
UnifiedCommunication
UnifiedCommunicationUnifiedCommunication
UnifiedCommunicationEmma Alsop
 
Mobile reporting 2010 07 information builder
Mobile reporting 2010 07 information builderMobile reporting 2010 07 information builder
Mobile reporting 2010 07 information builderOKTOPUS Consulting
 

Ähnlich wie Consider byoc as part of desktop as service strategy (20)

Time for a New Mobile-Cloud Desktop Architecture
Time for a New Mobile-Cloud Desktop ArchitectureTime for a New Mobile-Cloud Desktop Architecture
Time for a New Mobile-Cloud Desktop Architecture
 
Embracing BYOD
Embracing BYODEmbracing BYOD
Embracing BYOD
 
Handheld Devices & BYOD: Are Enterprises There Yet? - Management Information ...
Handheld Devices & BYOD: Are Enterprises There Yet? - Management Information ...Handheld Devices & BYOD: Are Enterprises There Yet? - Management Information ...
Handheld Devices & BYOD: Are Enterprises There Yet? - Management Information ...
 
A Special Report on Infrastructure Futures: Keeping Pace in the Era of Big Da...
A Special Report on Infrastructure Futures: Keeping Pace in the Era of Big Da...A Special Report on Infrastructure Futures: Keeping Pace in the Era of Big Da...
A Special Report on Infrastructure Futures: Keeping Pace in the Era of Big Da...
 
Overview_02-09-16_Digital Workspace
Overview_02-09-16_Digital WorkspaceOverview_02-09-16_Digital Workspace
Overview_02-09-16_Digital Workspace
 
Viability of bring your-own-computer BYOC programs
Viability of bring your-own-computer BYOC programsViability of bring your-own-computer BYOC programs
Viability of bring your-own-computer BYOC programs
 
Developing more effective mobile enterprise programs
Developing more effective mobile enterprise programsDeveloping more effective mobile enterprise programs
Developing more effective mobile enterprise programs
 
01 ondrej felix [režim kompatibility]
01   ondrej felix [režim kompatibility]01   ondrej felix [režim kompatibility]
01 ondrej felix [režim kompatibility]
 
BYOD- A Productivity Catalyst
BYOD- A Productivity CatalystBYOD- A Productivity Catalyst
BYOD- A Productivity Catalyst
 
A Business-Driven Approach to Mobile Enterprise Security
A Business-Driven Approach to Mobile Enterprise SecurityA Business-Driven Approach to Mobile Enterprise Security
A Business-Driven Approach to Mobile Enterprise Security
 
BYOD - Highlights of "Consumerization"
BYOD - Highlights of "Consumerization"BYOD - Highlights of "Consumerization"
BYOD - Highlights of "Consumerization"
 
Building it infrastructure framework that drives innovation and business perf...
Building it infrastructure framework that drives innovation and business perf...Building it infrastructure framework that drives innovation and business perf...
Building it infrastructure framework that drives innovation and business perf...
 
Mobile exalead-whitepaper-a4-8-lw
Mobile exalead-whitepaper-a4-8-lwMobile exalead-whitepaper-a4-8-lw
Mobile exalead-whitepaper-a4-8-lw
 
Tablet Access to Business Applications
Tablet Access to Business ApplicationsTablet Access to Business Applications
Tablet Access to Business Applications
 
The Essential BYOD Handbook
The Essential BYOD HandbookThe Essential BYOD Handbook
The Essential BYOD Handbook
 
Good Technology Whitepaper: Mobile Content Collaboration
Good Technology Whitepaper: Mobile Content CollaborationGood Technology Whitepaper: Mobile Content Collaboration
Good Technology Whitepaper: Mobile Content Collaboration
 
NFRASTRUCTURE MODERNIZATION REVIEW Analyz.docx
NFRASTRUCTURE MODERNIZATION REVIEW                      Analyz.docxNFRASTRUCTURE MODERNIZATION REVIEW                      Analyz.docx
NFRASTRUCTURE MODERNIZATION REVIEW Analyz.docx
 
UnifiedCommunication
UnifiedCommunicationUnifiedCommunication
UnifiedCommunication
 
Mobile reporting 2010 07 information builder
Mobile reporting 2010 07 information builderMobile reporting 2010 07 information builder
Mobile reporting 2010 07 information builder
 
Leveraging byod
Leveraging byodLeveraging byod
Leveraging byod
 

Mehr von Info-Tech Research Group

Select and Implement a Next Generation Endpoint Protection Solution
Select and Implement a Next Generation Endpoint Protection SolutionSelect and Implement a Next Generation Endpoint Protection Solution
Select and Implement a Next Generation Endpoint Protection SolutionInfo-Tech Research Group
 
Master Contract Review and Negotiation For Software Agreements-sample
Master Contract Review and Negotiation For Software Agreements-sampleMaster Contract Review and Negotiation For Software Agreements-sample
Master Contract Review and Negotiation For Software Agreements-sampleInfo-Tech Research Group
 
Improve IT Business Alignment With An Infrastructure Roadmap
Improve IT Business Alignment With An Infrastructure RoadmapImprove IT Business Alignment With An Infrastructure Roadmap
Improve IT Business Alignment With An Infrastructure RoadmapInfo-Tech Research Group
 
Build a Business-Driven IT Risk Management Program
Build a Business-Driven IT Risk Management ProgramBuild a Business-Driven IT Risk Management Program
Build a Business-Driven IT Risk Management ProgramInfo-Tech Research Group
 
Optimize Project Intake Approval and Prioritization
Optimize Project Intake Approval and PrioritizationOptimize Project Intake Approval and Prioritization
Optimize Project Intake Approval and PrioritizationInfo-Tech Research Group
 
Modernize Communications and Collaboration Infrastructure
Modernize Communications and Collaboration InfrastructureModernize Communications and Collaboration Infrastructure
Modernize Communications and Collaboration InfrastructureInfo-Tech Research Group
 
Craft an End-to-End Data Center Consolidation Strategy to Maximize Benefits
Craft an End-to-End Data Center Consolidation Strategy to Maximize BenefitsCraft an End-to-End Data Center Consolidation Strategy to Maximize Benefits
Craft an End-to-End Data Center Consolidation Strategy to Maximize BenefitsInfo-Tech Research Group
 
Develop a Project Portfolio Management Strategy
Develop a Project Portfolio Management StrategyDevelop a Project Portfolio Management Strategy
Develop a Project Portfolio Management StrategyInfo-Tech Research Group
 
Implement an enterprise service bus revised
Implement an enterprise service bus    revisedImplement an enterprise service bus    revised
Implement an enterprise service bus revisedInfo-Tech Research Group
 

Mehr von Info-Tech Research Group (20)

Select and Implement a Next Generation Endpoint Protection Solution
Select and Implement a Next Generation Endpoint Protection SolutionSelect and Implement a Next Generation Endpoint Protection Solution
Select and Implement a Next Generation Endpoint Protection Solution
 
Create a Winning BPI Playbook
Create a Winning BPI PlaybookCreate a Winning BPI Playbook
Create a Winning BPI Playbook
 
Master Contract Review and Negotiation For Software Agreements-sample
Master Contract Review and Negotiation For Software Agreements-sampleMaster Contract Review and Negotiation For Software Agreements-sample
Master Contract Review and Negotiation For Software Agreements-sample
 
Optimize Change Management
Optimize Change ManagementOptimize Change Management
Optimize Change Management
 
Improve IT Business Alignment With An Infrastructure Roadmap
Improve IT Business Alignment With An Infrastructure RoadmapImprove IT Business Alignment With An Infrastructure Roadmap
Improve IT Business Alignment With An Infrastructure Roadmap
 
Build a Business-Driven IT Risk Management Program
Build a Business-Driven IT Risk Management ProgramBuild a Business-Driven IT Risk Management Program
Build a Business-Driven IT Risk Management Program
 
Standardize the Service Desk
Standardize the Service DeskStandardize the Service Desk
Standardize the Service Desk
 
Optimize Project Intake Approval and Prioritization
Optimize Project Intake Approval and PrioritizationOptimize Project Intake Approval and Prioritization
Optimize Project Intake Approval and Prioritization
 
Modernize Communications and Collaboration Infrastructure
Modernize Communications and Collaboration InfrastructureModernize Communications and Collaboration Infrastructure
Modernize Communications and Collaboration Infrastructure
 
Optimize the IT Operating Model
Optimize the IT Operating ModelOptimize the IT Operating Model
Optimize the IT Operating Model
 
Info-Tech Membership Overview
Info-Tech Membership OverviewInfo-Tech Membership Overview
Info-Tech Membership Overview
 
Define an EA Operating Model
Define an EA Operating ModelDefine an EA Operating Model
Define an EA Operating Model
 
Become a Transformational CIO
Become a Transformational CIOBecome a Transformational CIO
Become a Transformational CIO
 
Craft an End-to-End Data Center Consolidation Strategy to Maximize Benefits
Craft an End-to-End Data Center Consolidation Strategy to Maximize BenefitsCraft an End-to-End Data Center Consolidation Strategy to Maximize Benefits
Craft an End-to-End Data Center Consolidation Strategy to Maximize Benefits
 
Build and Information Security Strategy
Build and Information Security StrategyBuild and Information Security Strategy
Build and Information Security Strategy
 
Build an Application Integration Strategy
Build an Application Integration StrategyBuild an Application Integration Strategy
Build an Application Integration Strategy
 
Develop a Project Portfolio Management Strategy
Develop a Project Portfolio Management StrategyDevelop a Project Portfolio Management Strategy
Develop a Project Portfolio Management Strategy
 
Implement an enterprise service bus revised
Implement an enterprise service bus    revisedImplement an enterprise service bus    revised
Implement an enterprise service bus revised
 
Implement a Shared Services Model
Implement a Shared Services ModelImplement a Shared Services Model
Implement a Shared Services Model
 
Assess and Optimize EA Capability
Assess and Optimize EA CapabilityAssess and Optimize EA Capability
Assess and Optimize EA Capability
 

Kürzlich hochgeladen

Vector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector DatabasesVector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector DatabasesZilliz
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piececharlottematthew16
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embeddingZilliz
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostZilliz
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
The Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdfThe Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdfSeasiaInfotech2
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Manik S Magar
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024The Digital Insurer
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 

Kürzlich hochgeladen (20)

Vector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector DatabasesVector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector Databases
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piece
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embedding
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
The Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdfThe Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdf
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 

Consider byoc as part of desktop as service strategy

  • 1. Consider BYOC as Part of a Desktop-as-a-Service Strategy
  • 2.
  • 3.
  • 4.
  • 5.
  • 6. However, there is interest & real benefits available for those who want to take advantage of the opportunity IT Benefits Dealing with less break/fix and more infrastructure, security, and strategic initiatives – issues with a higher priority. Lowering costs through elimination of the function of acquiring, configuring, deploying, and maintaining end-user IT assets. Improved efficiency in application management and delivery through centralization means not having to manage applications across distributed assets. Business Benefits Incentive for recruiting and retention. Hire remote employees to reduce office real estate costs and maximize the available talent pool. In business continuity situations, employees can have their work with them outside the office in case of emergency. End-User Benefits Sense of ownership and greater end-user satisfaction. Employees can set their own preferences for their devices. Work flexibility and agility. Ability to use the tools that fit their needs and work style. 100% Laptops 12% 19% 17% Tablets 17% 13% 16% Smartphones 11% 16% 25% Very Interested Implementing Somewhat Interested Not at All Interested Interested Source: Info-Tech Research Group N=75
  • 7. Interest in BYO has escalated because of advancements on both the IT and the consumer side Info-Tech Research Group Generation Y Millennials started entering the workforce in larger numbers and are often associated with the consumerization of IT. Many of the next generation employees don’t remember a world without the Internet and are used to having the latest PC or Mac at their fingertips. Some companies are using BYOC as an incentive program to attract new talent; however, most companies are not likely to look at this as a top driver for business decision-making. Tablets Bring Your Own Computer might more aptly be called BYO Device (BYOD), as much of the recent interest has been driven by iPad users and the proliferation of tablets and smartphones in the workplace. The pressure on IT began as a result of end users and C-level executives wanting to take advantage of their latest toy. As the number and capabilities of tablets on the market continue to grow, so too does pressure for BYOC programs. The Cloud Available SaaS options are almost unlimited – covering, for example, Payroll, Accounting, CRM, Project Management, and HR Management Systems. Online productivity suites are also maturing year over year: Google Apps , Zoho , and now Microsoft Office 365 all offer the potential to reduce application maintenance costs by placing responsibility for patching and upgrading in the hands of a third-party cloud vendor. Virtualization Desktop virtualization is continuing to take hold in organizations of all sizes. Desktop virtualization can range from the virtualization of individual applications to full desktops. Organizations that are farther along the virtualization path are looking for new ways to leverage this desktop-as-a-service delivery model to reduce hardware and support costs. IT Consumer
  • 8. BYOC can be a hot topic for IT – both for and against it; a conversation is potentially confrontational but necessary Info-Tech Research Group In Info-Tech’s survey of trends to watch in 2011, BYOC came dead last. BYOC has established itself as a polarizing topic among IT professionals. Some are very optimistic while others are vehemently opposed to the idea. Interestingly, while BYOC is last, interest in and adoption of desktop virtualization (DV) is very high. DV is seen as a significant enabler of BYOC, and this may predict the future state of BYOC on this chart. I’d love to be the Dr. No, but that’s not a culture that I’ve ever promoted in my organization. We can’t say no to people. They’ll just work around you. These things will come in whether you like it or not. So you better figure out how you want to manage it.” - CISO, Government “ Bring Your Own Computer might more accurately be called BYO Device (BYOD), as it includes a full range of devices from smartphones to tablets to laptops, and whatever the future brings. “ I was talking to a major ISV that employs probably 10,000 people or something like that. And they ran a scan to see how many unmanaged devices they had. They called them cockroaches. And they had 3,000 unmanaged devices that were connected to the network, and they have no idea who owns them. And they definitely didn’t buy them. So whether you like it or not, it’s happening, and IT needs to get on top of it.” - From conversation with virtualization vendor The more IT resists, the more end users are going to push. It’s an age old problem that will only get worse with time: shadow devices on the network . High Low Adoption Interest Source: Info-Tech Research Group N = 254
  • 9. Where this solution set fits: BYOC is enabled by desktop virtualization capabilities Those considering or already implementing BYOC can do so because they are developing capabilities that enable multi-device access and alternatives to traditional desktop PCs. Info-Tech Research Group Question BYOC is fraught with difficulties in a traditional distributed client PC environment. As organizations begin exploring alternative delivery methods, when is the best time to consider BYOC? Answer BYOC can be, and is being, considered by those who are moving away from the traditional distributed fat client model. Who would that be? Organizations that are exploring alternatives to desktop PCs for workers (laptops, thin clients, tablets, and smartphones) as well as alternative application delivery methods such as application presentation, cloud-based SaaS, and Web-enabled applications. Organizations that are invested in or interested in investing in desktop virtualization are better prepared for BYOC and willing to extend their capabilities to this service. Those who are not leveraging virtualization technologies to replace traditional desktops are less likely to be interested in BYOC. Related sets that address aspects of desktop virtualization: Develop a Desktop Virtualization Strategy Select a Desktop Virtualization Solution Build Steps to VDI Implementation
  • 10. Take a device-agnostic approach, but recognize that different devices are used for different purposes Info-Tech Research Group Smartphones, tablets, and laptops are on a usage continuum which is characterized at one end by consumption of small chunks of information with little creation or manipulation; at the other end is broad data consumption and significant creation and manipulation. Tablets are somewhere in the middle and have attributes overlapping both ends of the spectrum. They can be used, for example, to access iPad apps but also full virtual desktops. It is no surprise that executives, who want ready access to small chunks of content in a highly mobile environment while being less likely to create or manipulate content, are more likely to pressure IT for smartphone BYOC policies. Data Consumption, Creation, and Manipulation Implementing 29% Interest 39% 61% 38% 62% 71% No Interest No Executive Pressure Executive Pressure Bring Your Own Smartphones Source: Info-Tech Research Group N = 71 % of Organizations
  • 11.
  • 12.
  • 13.
  • 14.
  • 15.
  • 16.
  • 17. Without proper capabilities, there is simply too much cost & effort required for a successful BYO program No-Go State BYOC would be difficult without a significant cost/effort investment. Currently, users are coming in to work with their iPads despite being discouraged to do so. Infrastructure Traditional, distributed PC environment with some server virtualization, but no desktop virtualization (DV). There are current budget restrictions that prohibit moving forward on DV. Security Early stages of determining what security controls are required to mitigate the risk of employee-owned devices. They use SSL VPN and are investigating ways to leverage this further. Operations/Support Haven’t been able to build a compelling business case to support consumer devices and do not see cost savings in outsourcing. Policies Current policy for contractors connecting to the business network is for IT to ensure the controls on the contractor machine meet or exceed those of the business. There is a user acceptance form in place. They would like to extend this policy to users, but unsure how to police it. Capability Maturity Policy Infrastructure Operations/Support Security Case Study
  • 18. Organizations that have developed capabilities in desktop virtualization are better prepared for BYOC Info-Tech Research Group Can-Go State BYOC may not be desired but can be conceived. Currently, executives are coming to IT asking to bring their iPads into work as they see other businesses are enabling this. Infrastructure Have used presentation virtualization extensively for some users, but not all. Are exploring further virtualization of the desktop. Security Use multi-factor authentication to access the network, have fully encrypted hard drives on their assets, and have developed a plan to move towards a full, authenticated network in the near future. Operations/Support The CIO fully expects BYO to become par for the course and wants to leverage the internal skills achieved through their DV experience. There is some reluctance and concern about rolling out a new support model. Policy Have “secret sauce criteria” in place for dealing with different devices on the network, particularly with contractors. Can limit access for untrusted devices. Capability Maturity Policy Infrastructure Operations/Support Security Case Study
  • 19. Development of capabilities in the four pillars will provide answers to these questions Info-Tech Research Group
  • 20.
  • 21.
  • 22.
  • 23.
  • 24.
  • 25.
  • 26.
  • 27.
  • 28.
  • 29. Consider alternatives to help ease the adjustment of new support arrangements: both for IT and the end user % Info-Tech Research Group Third-party support contracts . As part of a stipend, the business can ask employees to secure support contracts for their devices in case of hardware failure. If employees buy their laptop from a franchise/box store, service contracts are often not suitable for business requirements. In this case, the business may want to contract a suitable service provider and direct employees where to take their devices. A key element of this is having emergency reserves on hand to maintain productivity while the device is being repaired – this could range from previously retired hardware to thin clients. Self-support . The business can also encourage self-service and peer support for some problems. The success of this depends greatly on how comfortable the employee population feels about technology. IT may consider developing a knowledge base or internal wiki that employees can use to self-diagnose and self-help. The changing role of IT from asset manager to service manager. This is a real paradigm shift for IT. The administrative side of desktop management doesn’t really change – managing access and privileges – but IT is no longer managing patching and upgrading on individual machines.
  • 30. The discussion to move towards BYOC is not just about IT policy alone; involve all parts of the business Info-Tech Research Group IT will determine the capability of both the infrastructure and IT staff skills to support the program. It may be necessary to create a skills inventory to determine capability and support guidelines. IT will also outline minimum requirements for devices purchased by employees. HR will define policies that are already available to be leveraged as well as new policies that must be developed. They will also determine how best to handle new employee onboarding, probation periods, and stipend proration if necessary. Finance can crunch the numbers and outline tax implications of the program for the business in order to determine an appropriate stipend amount. Legal will advise as to any compliance or regulatory restrictions that may interfere in widespread deployment of the program. Restrictions may be placed on a department by department basis. See Info-Tech’s BYOC Acceptable Use Policy .
  • 31.
  • 32.
  • 33.
  • 34.
  • 35.
  • 36.
  • 37.
  • 38. If your organization decides to pursue an aggressive policy, think about including a stipend as part of the BYOC policy Info-Tech Research Group Below are purchase details for a new laptop on Dell’s online Small & Medium Business shop which allows for business editions of software, such as the OEM version of Windows 7 Pro rather than Home edition. Compare the cost of an individually purchased laptop against the cost of purchasing a device at volume through the business. Cost considerations: Taxation . Some businesses are eligible for a refund of the sales tax paid toward a business laptop. The amount of the refund varies by the size of the business as well as local tax laws. Cost of Support . The ideal state of a BYOC program is that IT will no longer be responsible for maintenance of the hardware. Calculate the number of man hours spent previously against expected savings. Licensing . Microsoft’s Software Assurance (SA) does not apply to thin clients or employee-owned devices. Compare the cost of SA against the cost of individual licenses or the $100/device/year Virtual Desktop Access (VDA) fee. Dell Vostro 3500 Laptop Processor Intel Core i5 (560M) 2.53GHz/3MB cache Operating System Windows 7 Pro 64-Bit Memory 4GB DDR3 Display 15.6” Hard Drive 320GB SATA Service & Warranty 3 Year Advanced Service Plan (next business day onsite service) Productivity Suite None . Add $399.00 for Office Pro 2010 Anti-Virus None . Add $40.00 for 36 months of Trend Micro Worry-Free Business Security Services Keyboard and Mouse None . Add $99.99 for Wireless Logitech MK710 Included Option Fingerprint reader Price $1219.99 +tax
  • 39. Communication of policy requirements and explicit support expectations will be critical Failure to meet success measures can be a result of communication failures as much as a failure of technical and operational capability. Info-Tech Research Group Here’s a Typical Concern The boss loves his smartphone. He wants to use it for work-related tasks. He also wants anybody in the organization with a smartphone to be able to use one. However, if his smartphone stops functioning, he’ll expect IT to support it. As seen above, a previous Info-Tech survey indicated that over half of respondents (52%) found that support workload increased with a mobile device strategy. If the organization has successfully moved to a model where support is focused on making services available and accessible, support requirements at the access points (access devices) should decrease. But this only works if the user community clearly understands their responsibilities and the obligations of the organization to support the device. Action This is a big culture change, so communication is key. Make sure the policies around BYOC are clear and explicit. Define what is in and out of scope in terms of support and in terms of what can be accessed by the employees using their device. Communications Plan Template for a BYOC Program
  • 40.
  • 41.
  • 42.