SlideShare ist ein Scribd-Unternehmen logo
1 von 22
Managing
              mobility in a
            changing device
               landscape

                Andrew Gee
     Vice President, Sales UK & Ireland



wyse.com
Agenda
      • Trends
           •    Mobility
           •    Devices
           •    Consumerisation
           •    Applications
      • Challenges & Architectures
           •    Breaking the 1:1 link
           •    Inherent security
           •    Smarter management
      • User types & scenarios
      • Technologies




© 2012 Wyse Technology
We are all more mobile

                                        Field worker
                                        productivity
                                        demands
               Office based
                                        maximum time
               workers need
                                        is spent mobile
               access when not
               at their desks




                         Home-based   Customers
                         working is   want services
                         increasing   to come
                                      to them




© 2012 Wyse Technology
Consumerisation


                                      500
                                                        m

                                      smartphones
                                      shipped in 2011




               1.5               bn

                smart devices
                forecast to be
                sold in 2014
                                        20          %

                                         more smartphones
                                         sold than PCs



© 2012 Wyse Technology
Applications are changing

      Collaborative               Location aware
           working




        Unified                   Social
 Communications




© 2012 Wyse Technology
Applications are becoming
      more centralised and more
      local!

                                                   Desktop as a Service & Web applications




                                         Virtual
                                        desktops
                                                                         New local
                           Virtual                                      applications
                         applications


            PC



  6
© 2012 Wyse Technology
Agenda
      • Trends
           •    Mobility
           •    Devices
           •    Consumerisation
           •    Applications
      • Challenges & Architectures
           •    Breaking the 1:1 link
           •    Inherent security
           •    Smarter management
      • User types & scenarios
      • Technologies




© 2012 Wyse Technology
Challenges

                         Desktop refresh



  Demands for higher               Need to reduce
         availability              energy consumption




    Fast delivery of                       Security and
      new services                         Compliance




© 2012 Wyse Technology
Cloud Client Computing




        Long               Easy      Very low power   Centrally       No
     service life        to secure    consumption     managed     moving parts




© 2012 Wyse Technology
Break the link

                         1:1
              BENEFITS




                         USER           Better productivity


                         ORGANISATION   More flexibility and agility



© 2012 Wyse Technology
Inherently more secure




          Avoid data on     Centralised     Authenticated    Secure
           the device         security         access            devices you
                              architecture                       don’t own


   Benefits
             Simplify the      More             Control data        Reduce risks from
             security          integrity        leakage             lost devices
             architecture




© 2012 Wyse Technology
Smarter management




      Centralised         Devices that       Never visit the    Automated
      On-premise or        manage              desktop             mobile device
       cloud-based          themselves                              management


   Benefits
             Reduced management       Consistent device           Faster provisioning
             cost                     configurations




© 2012 Wyse Technology
Agenda
      • Trends
           •    Mobility
           •    Devices
           •    Consumerisation
           •    Applications
      • Challenges & Architectures
           •    Breaking the 1:1 link
           •    Inherent security
           •    Smarter management
      • User types & scenarios
      • Technologies




© 2012 Wyse Technology
Understanding user types

          Mobile
                                              Applications




                             Form factor &                       Content
                              peripherals



   Non mobile
                         Task-based Workers                     Office based
                                                             Knowledge Workers



© 2012 Wyse Technology
Typical user scenarios . Contact Centre




                          Data
                          Voice
                          Video




© 2012 Wyse Technology
Typical user scenarios . Business Manager
       At home




                         In the office   On the move



© 2012 Wyse Technology
Typical user scenarios . Project Manager




                                         3g




                   Hot desking         On the move



© 2012 Wyse Technology
Typical user scenarios . Home Worker




        Occasional home worker

                                     Regular home worker




© 2012 Wyse Technology
Agenda
      • Trends
           •    Mobility
           •    Devices
           •    Consumerisation
           •    Applications
      • Challenges & Architectures
           •    Breaking the 1:1 link
           •    Inherent security
           •    Smarter management
      • User types & scenarios
      • Technologies




© 2012 Wyse Technology
Technologies to take a look at…




              Wyse Thin and Zero clients           Wyse PocketCloud




             Wyse Enterprise Mobility Management   Wyse mobile thin clients


© 2012 Wyse Technology
To take away…

      • Enterprise computing is changing fast – take advantage of it

      • Break the 1:1 link between user and PC

      • Back to Basics – understand your users

      • User satisfaction is not just about how their computer works –
        look for user wins

      • Don’t underestimate the new smart user: Deliver a menu of services
        that they can use to fit the way they work




© 2012 Wyse Technology
agee@wyse.com


                         www.wyse.com




               Andrew Gee
    Vice President, Sales, UK & Ireland



wyse.com

Weitere ähnliche Inhalte

Was ist angesagt?

Smart Style Office for Virtual Desktop Infrastructure
Smart Style Office for Virtual Desktop InfrastructureSmart Style Office for Virtual Desktop Infrastructure
Smart Style Office for Virtual Desktop Infrastructure247 Invest
 
12 Things You Must Know About VDI
12 Things You Must Know About VDI12 Things You Must Know About VDI
12 Things You Must Know About VDIShivani Sehta
 
Virtual desktop infrastructure
Virtual desktop infrastructureVirtual desktop infrastructure
Virtual desktop infrastructuregaurav jain
 
VDI Choices - Citrix XenDesktop, XenApp or VDI in a Box?
VDI Choices - Citrix XenDesktop, XenApp or VDI in a Box?VDI Choices - Citrix XenDesktop, XenApp or VDI in a Box?
VDI Choices - Citrix XenDesktop, XenApp or VDI in a Box?eG Innovations
 
Comparing the TCO of Desktops
Comparing the TCO of DesktopsComparing the TCO of Desktops
Comparing the TCO of DesktopsDesktone
 
Make VDI Personal, Make VDI for Everyone
Make VDI Personal, Make VDI for EveryoneMake VDI Personal, Make VDI for Everyone
Make VDI Personal, Make VDI for EveryoneUnidesk Corporation
 
Citrix Mforum 2014 m104 JonathanWade
Citrix Mforum 2014 m104 JonathanWadeCitrix Mforum 2014 m104 JonathanWade
Citrix Mforum 2014 m104 JonathanWadeJonathan Wade
 
Virtual desktop infrastructure
Virtual desktop infrastructureVirtual desktop infrastructure
Virtual desktop infrastructureKavaskar Ganesan
 
Vdi strategy
Vdi strategyVdi strategy
Vdi strategylatheefca
 
Microsoft the power of choice
Microsoft  the power of choiceMicrosoft  the power of choice
Microsoft the power of choicegadi_fe
 
VDI/ VMware Horizon View
VDI/ VMware Horizon ViewVDI/ VMware Horizon View
VDI/ VMware Horizon ViewSumeraHangi
 
Virtual desktop infrastructure
Virtual desktop infrastructureVirtual desktop infrastructure
Virtual desktop infrastructureGokulan Subramani
 
VDI Performance Assurance With Monitoring and Testing
VDI Performance Assurance With Monitoring and TestingVDI Performance Assurance With Monitoring and Testing
VDI Performance Assurance With Monitoring and TestingeG Innovations
 
Virtual Desktops: How Secure Can They Be?
Virtual Desktops: How Secure Can They Be?Virtual Desktops: How Secure Can They Be?
Virtual Desktops: How Secure Can They Be?Desktone
 
VDI and Application Virtualization
VDI and Application VirtualizationVDI and Application Virtualization
VDI and Application VirtualizationJames W. De Rienzo
 
Securely managing all Dell and non-Dell end user devices: Endpoint systems ma...
Securely managing all Dell and non-Dell end user devices: Endpoint systems ma...Securely managing all Dell and non-Dell end user devices: Endpoint systems ma...
Securely managing all Dell and non-Dell end user devices: Endpoint systems ma...Dell World
 
Desktop as a Service DaaS in India by BSNL SIS
Desktop as a Service DaaS in India by BSNL SISDesktop as a Service DaaS in India by BSNL SIS
Desktop as a Service DaaS in India by BSNL SISSATYAVEER PAL
 

Was ist angesagt? (20)

Smart Style Office for Virtual Desktop Infrastructure
Smart Style Office for Virtual Desktop InfrastructureSmart Style Office for Virtual Desktop Infrastructure
Smart Style Office for Virtual Desktop Infrastructure
 
VDI Best Practices
VDI Best PracticesVDI Best Practices
VDI Best Practices
 
12 Things You Must Know About VDI
12 Things You Must Know About VDI12 Things You Must Know About VDI
12 Things You Must Know About VDI
 
Virtual Desktop Infrastructure
Virtual Desktop InfrastructureVirtual Desktop Infrastructure
Virtual Desktop Infrastructure
 
Virtual desktop infrastructure
Virtual desktop infrastructureVirtual desktop infrastructure
Virtual desktop infrastructure
 
VDI Choices - Citrix XenDesktop, XenApp or VDI in a Box?
VDI Choices - Citrix XenDesktop, XenApp or VDI in a Box?VDI Choices - Citrix XenDesktop, XenApp or VDI in a Box?
VDI Choices - Citrix XenDesktop, XenApp or VDI in a Box?
 
Comparing the TCO of Desktops
Comparing the TCO of DesktopsComparing the TCO of Desktops
Comparing the TCO of Desktops
 
Make VDI Personal, Make VDI for Everyone
Make VDI Personal, Make VDI for EveryoneMake VDI Personal, Make VDI for Everyone
Make VDI Personal, Make VDI for Everyone
 
Citrix Mforum 2014 m104 JonathanWade
Citrix Mforum 2014 m104 JonathanWadeCitrix Mforum 2014 m104 JonathanWade
Citrix Mforum 2014 m104 JonathanWade
 
Virtual desktop infrastructure
Virtual desktop infrastructureVirtual desktop infrastructure
Virtual desktop infrastructure
 
Vdi strategy
Vdi strategyVdi strategy
Vdi strategy
 
Microsoft the power of choice
Microsoft  the power of choiceMicrosoft  the power of choice
Microsoft the power of choice
 
VDI/ VMware Horizon View
VDI/ VMware Horizon ViewVDI/ VMware Horizon View
VDI/ VMware Horizon View
 
Virtual desktop infrastructure
Virtual desktop infrastructureVirtual desktop infrastructure
Virtual desktop infrastructure
 
VDI Performance Assurance With Monitoring and Testing
VDI Performance Assurance With Monitoring and TestingVDI Performance Assurance With Monitoring and Testing
VDI Performance Assurance With Monitoring and Testing
 
Vdi
VdiVdi
Vdi
 
Virtual Desktops: How Secure Can They Be?
Virtual Desktops: How Secure Can They Be?Virtual Desktops: How Secure Can They Be?
Virtual Desktops: How Secure Can They Be?
 
VDI and Application Virtualization
VDI and Application VirtualizationVDI and Application Virtualization
VDI and Application Virtualization
 
Securely managing all Dell and non-Dell end user devices: Endpoint systems ma...
Securely managing all Dell and non-Dell end user devices: Endpoint systems ma...Securely managing all Dell and non-Dell end user devices: Endpoint systems ma...
Securely managing all Dell and non-Dell end user devices: Endpoint systems ma...
 
Desktop as a Service DaaS in India by BSNL SIS
Desktop as a Service DaaS in India by BSNL SISDesktop as a Service DaaS in India by BSNL SIS
Desktop as a Service DaaS in India by BSNL SIS
 

Ähnlich wie Wyse webinar presentation Web2Present Managing mobility in a changing device landscape

IBM Mobile Enterprise Overview
IBM Mobile Enterprise OverviewIBM Mobile Enterprise Overview
IBM Mobile Enterprise Overviewaakhan0830
 
IBM Mobile Strategy - Mobile World Congress 2012
IBM Mobile Strategy - Mobile World Congress 2012IBM Mobile Strategy - Mobile World Congress 2012
IBM Mobile Strategy - Mobile World Congress 2012Robert Sutor
 
Ibm solutions for the mobile enterprise
Ibm solutions for the mobile enterpriseIbm solutions for the mobile enterprise
Ibm solutions for the mobile enterpriseChris Pepin
 
Build and Connect Enterprise Mobile Applications from developerWorks Live!
Build and Connect Enterprise Mobile Applications from developerWorks Live! Build and Connect Enterprise Mobile Applications from developerWorks Live!
Build and Connect Enterprise Mobile Applications from developerWorks Live! Leigh Williamson
 
Gwc mobilefoundation-final-2
Gwc mobilefoundation-final-2Gwc mobilefoundation-final-2
Gwc mobilefoundation-final-2Dirk Nicol
 
Cloud Technology to Facilitate Growth
Cloud Technology to Facilitate GrowthCloud Technology to Facilitate Growth
Cloud Technology to Facilitate GrowthIconnyx
 
Becoming a mobile enterprise: step by step
Becoming a mobile enterprise: step by stepBecoming a mobile enterprise: step by step
Becoming a mobile enterprise: step by stepChris Pepin
 
Mobile advisor zenprise-pitch - lars
Mobile advisor zenprise-pitch - larsMobile advisor zenprise-pitch - lars
Mobile advisor zenprise-pitch - larsLars Bodenhoff
 
Enterasys Mobile IAM BYOD Brochure
Enterasys Mobile IAM BYOD BrochureEnterasys Mobile IAM BYOD Brochure
Enterasys Mobile IAM BYOD BrochureArrow ECS UK
 
Introduction to IBM Worklight: Building and connecting cross-platform mobile ...
Introduction to IBM Worklight: Building and connecting cross-platform mobile ...Introduction to IBM Worklight: Building and connecting cross-platform mobile ...
Introduction to IBM Worklight: Building and connecting cross-platform mobile ...Jeremy Siewert
 
IBM mobile strategy at Innovate 2012
IBM  mobile strategy at Innovate 2012IBM  mobile strategy at Innovate 2012
IBM mobile strategy at Innovate 2012Dirk Nicol
 
Mobile Application Security
Mobile Application SecurityMobile Application Security
Mobile Application SecurityDirk Nicol
 
Riverbed Securing Cloud Applications with a Distributed Web Application Firewall
Riverbed Securing Cloud Applications with a Distributed Web Application FirewallRiverbed Securing Cloud Applications with a Distributed Web Application Firewall
Riverbed Securing Cloud Applications with a Distributed Web Application FirewallRiverbed Technology
 
Infor i Business Cloud
Infor i Business CloudInfor i Business Cloud
Infor i Business CloudInforsystemi
 
Engaging Mobile Apps with IBM® Social Business Solutions and IBM Worklight
Engaging Mobile Apps with IBM® Social Business Solutions and IBM WorklightEngaging Mobile Apps with IBM® Social Business Solutions and IBM Worklight
Engaging Mobile Apps with IBM® Social Business Solutions and IBM WorklightDirk Nicol
 

Ähnlich wie Wyse webinar presentation Web2Present Managing mobility in a changing device landscape (20)

IBM Mobile Strategy
IBM Mobile StrategyIBM Mobile Strategy
IBM Mobile Strategy
 
IBM Mobile Enterprise Overview
IBM Mobile Enterprise OverviewIBM Mobile Enterprise Overview
IBM Mobile Enterprise Overview
 
IBM Mobile Strategy - Mobile World Congress 2012
IBM Mobile Strategy - Mobile World Congress 2012IBM Mobile Strategy - Mobile World Congress 2012
IBM Mobile Strategy - Mobile World Congress 2012
 
Ibm solutions for the mobile enterprise
Ibm solutions for the mobile enterpriseIbm solutions for the mobile enterprise
Ibm solutions for the mobile enterprise
 
IBM Mobile Strategy
IBM Mobile StrategyIBM Mobile Strategy
IBM Mobile Strategy
 
Get your house on order
Get your house on orderGet your house on order
Get your house on order
 
Build and Connect Enterprise Mobile Applications from developerWorks Live!
Build and Connect Enterprise Mobile Applications from developerWorks Live! Build and Connect Enterprise Mobile Applications from developerWorks Live!
Build and Connect Enterprise Mobile Applications from developerWorks Live!
 
Gwc mobilefoundation-final-2
Gwc mobilefoundation-final-2Gwc mobilefoundation-final-2
Gwc mobilefoundation-final-2
 
WinWire_azure_session
WinWire_azure_sessionWinWire_azure_session
WinWire_azure_session
 
Cloud Technology to Facilitate Growth
Cloud Technology to Facilitate GrowthCloud Technology to Facilitate Growth
Cloud Technology to Facilitate Growth
 
Becoming a mobile enterprise: step by step
Becoming a mobile enterprise: step by stepBecoming a mobile enterprise: step by step
Becoming a mobile enterprise: step by step
 
Mobile advisor zenprise-pitch - lars
Mobile advisor zenprise-pitch - larsMobile advisor zenprise-pitch - lars
Mobile advisor zenprise-pitch - lars
 
Enterasys Mobile IAM BYOD Brochure
Enterasys Mobile IAM BYOD BrochureEnterasys Mobile IAM BYOD Brochure
Enterasys Mobile IAM BYOD Brochure
 
Introduction to IBM Worklight: Building and connecting cross-platform mobile ...
Introduction to IBM Worklight: Building and connecting cross-platform mobile ...Introduction to IBM Worklight: Building and connecting cross-platform mobile ...
Introduction to IBM Worklight: Building and connecting cross-platform mobile ...
 
IBM mobile strategy at Innovate 2012
IBM  mobile strategy at Innovate 2012IBM  mobile strategy at Innovate 2012
IBM mobile strategy at Innovate 2012
 
Beyond BYOD
Beyond BYODBeyond BYOD
Beyond BYOD
 
Mobile Application Security
Mobile Application SecurityMobile Application Security
Mobile Application Security
 
Riverbed Securing Cloud Applications with a Distributed Web Application Firewall
Riverbed Securing Cloud Applications with a Distributed Web Application FirewallRiverbed Securing Cloud Applications with a Distributed Web Application Firewall
Riverbed Securing Cloud Applications with a Distributed Web Application Firewall
 
Infor i Business Cloud
Infor i Business CloudInfor i Business Cloud
Infor i Business Cloud
 
Engaging Mobile Apps with IBM® Social Business Solutions and IBM Worklight
Engaging Mobile Apps with IBM® Social Business Solutions and IBM WorklightEngaging Mobile Apps with IBM® Social Business Solutions and IBM Worklight
Engaging Mobile Apps with IBM® Social Business Solutions and IBM Worklight
 

Mehr von Web2Present

Web2Present Student Recruitment Webinar Media kit 2017 18
Web2Present Student Recruitment Webinar Media kit 2017 18Web2Present Student Recruitment Webinar Media kit 2017 18
Web2Present Student Recruitment Webinar Media kit 2017 18Web2Present
 
Webinar presentation master's programs - TU/e
Webinar presentation master's programs - TU/eWebinar presentation master's programs - TU/e
Webinar presentation master's programs - TU/eWeb2Present
 
Webinar earn a high scientific and technical master degree in applied mechani...
Webinar earn a high scientific and technical master degree in applied mechani...Webinar earn a high scientific and technical master degree in applied mechani...
Webinar earn a high scientific and technical master degree in applied mechani...Web2Present
 
Web2 present 2016 in review
Web2 present 2016 in reviewWeb2 present 2016 in review
Web2 present 2016 in reviewWeb2Present
 
Webinar: Enquiries to enrolment - July 2016
Webinar: Enquiries to enrolment - July 2016Webinar: Enquiries to enrolment - July 2016
Webinar: Enquiries to enrolment - July 2016Web2Present
 
Webinar: Study International Relations in the Heart of Transylvania
Webinar: Study International Relations in the Heart of TransylvaniaWebinar: Study International Relations in the Heart of Transylvania
Webinar: Study International Relations in the Heart of TransylvaniaWeb2Present
 
Webinar - Achieve your Supply Chain qualification studying at MIT and ZLC, tw...
Webinar - Achieve your Supply Chain qualification studying at MIT and ZLC, tw...Webinar - Achieve your Supply Chain qualification studying at MIT and ZLC, tw...
Webinar - Achieve your Supply Chain qualification studying at MIT and ZLC, tw...Web2Present
 
Integrating companion animal knowledge into aquatic veterinary medicine
Integrating companion animal knowledge into aquatic veterinary medicineIntegrating companion animal knowledge into aquatic veterinary medicine
Integrating companion animal knowledge into aquatic veterinary medicineWeb2Present
 
Webinar: Specialize in energy, transport and telecommunications economics at ...
Webinar: Specialize in energy, transport and telecommunications economics at ...Webinar: Specialize in energy, transport and telecommunications economics at ...
Webinar: Specialize in energy, transport and telecommunications economics at ...Web2Present
 
Webinar: An MBA in the Hospitality Industry – A ‘Necessity’ or ‘Nice to Have’?
Webinar: An MBA in the Hospitality Industry – A ‘Necessity’ or ‘Nice to Have’?Webinar: An MBA in the Hospitality Industry – A ‘Necessity’ or ‘Nice to Have’?
Webinar: An MBA in the Hospitality Industry – A ‘Necessity’ or ‘Nice to Have’?Web2Present
 
Webinar: MS and MBA programs from Embry-Riddle Aeronautical University in Day...
Webinar: MS and MBA programs from Embry-Riddle Aeronautical University in Day...Webinar: MS and MBA programs from Embry-Riddle Aeronautical University in Day...
Webinar: MS and MBA programs from Embry-Riddle Aeronautical University in Day...Web2Present
 
Webinar: Study an online Master’s in Gender Studies, Linköping University, Sw...
Webinar: Study an online Master’s in Gender Studies, Linköping University, Sw...Webinar: Study an online Master’s in Gender Studies, Linköping University, Sw...
Webinar: Study an online Master’s in Gender Studies, Linköping University, Sw...Web2Present
 
Webinar: MSc in Software, Systems and Services Development in Global Environment
Webinar: MSc in Software, Systems and Services Development in Global EnvironmentWebinar: MSc in Software, Systems and Services Development in Global Environment
Webinar: MSc in Software, Systems and Services Development in Global EnvironmentWeb2Present
 
Webinar: SAIS Europe: The Master of Arts in Global Risk Information
Webinar: SAIS Europe: The Master of Arts in Global Risk InformationWebinar: SAIS Europe: The Master of Arts in Global Risk Information
Webinar: SAIS Europe: The Master of Arts in Global Risk InformationWeb2Present
 
Webinar: Study a Master’s in Education and Globalisation in Finland
Webinar: Study a Master’s in Education and Globalisation in FinlandWebinar: Study a Master’s in Education and Globalisation in Finland
Webinar: Study a Master’s in Education and Globalisation in FinlandWeb2Present
 
Webinar: MSc in Software, Systems and Services Development in Global Environment
Webinar: MSc in Software, Systems and Services Development in Global EnvironmentWebinar: MSc in Software, Systems and Services Development in Global Environment
Webinar: MSc in Software, Systems and Services Development in Global EnvironmentWeb2Present
 
Webinar: AACSB accredited MSc programs in Oulu, the capital of Northern Scand...
Webinar: AACSB accredited MSc programs in Oulu, the capital of Northern Scand...Webinar: AACSB accredited MSc programs in Oulu, the capital of Northern Scand...
Webinar: AACSB accredited MSc programs in Oulu, the capital of Northern Scand...Web2Present
 
MA in Learning, Education and Technology - University of Oulu
MA in Learning, Education and Technology - University of OuluMA in Learning, Education and Technology - University of Oulu
MA in Learning, Education and Technology - University of OuluWeb2Present
 
The Study Abroad Portal Media Kit 2015
The Study Abroad Portal Media Kit 2015The Study Abroad Portal Media Kit 2015
The Study Abroad Portal Media Kit 2015Web2Present
 
Tips to prepare a better presentation for a webinar
Tips to prepare a better presentation for a webinarTips to prepare a better presentation for a webinar
Tips to prepare a better presentation for a webinarWeb2Present
 

Mehr von Web2Present (20)

Web2Present Student Recruitment Webinar Media kit 2017 18
Web2Present Student Recruitment Webinar Media kit 2017 18Web2Present Student Recruitment Webinar Media kit 2017 18
Web2Present Student Recruitment Webinar Media kit 2017 18
 
Webinar presentation master's programs - TU/e
Webinar presentation master's programs - TU/eWebinar presentation master's programs - TU/e
Webinar presentation master's programs - TU/e
 
Webinar earn a high scientific and technical master degree in applied mechani...
Webinar earn a high scientific and technical master degree in applied mechani...Webinar earn a high scientific and technical master degree in applied mechani...
Webinar earn a high scientific and technical master degree in applied mechani...
 
Web2 present 2016 in review
Web2 present 2016 in reviewWeb2 present 2016 in review
Web2 present 2016 in review
 
Webinar: Enquiries to enrolment - July 2016
Webinar: Enquiries to enrolment - July 2016Webinar: Enquiries to enrolment - July 2016
Webinar: Enquiries to enrolment - July 2016
 
Webinar: Study International Relations in the Heart of Transylvania
Webinar: Study International Relations in the Heart of TransylvaniaWebinar: Study International Relations in the Heart of Transylvania
Webinar: Study International Relations in the Heart of Transylvania
 
Webinar - Achieve your Supply Chain qualification studying at MIT and ZLC, tw...
Webinar - Achieve your Supply Chain qualification studying at MIT and ZLC, tw...Webinar - Achieve your Supply Chain qualification studying at MIT and ZLC, tw...
Webinar - Achieve your Supply Chain qualification studying at MIT and ZLC, tw...
 
Integrating companion animal knowledge into aquatic veterinary medicine
Integrating companion animal knowledge into aquatic veterinary medicineIntegrating companion animal knowledge into aquatic veterinary medicine
Integrating companion animal knowledge into aquatic veterinary medicine
 
Webinar: Specialize in energy, transport and telecommunications economics at ...
Webinar: Specialize in energy, transport and telecommunications economics at ...Webinar: Specialize in energy, transport and telecommunications economics at ...
Webinar: Specialize in energy, transport and telecommunications economics at ...
 
Webinar: An MBA in the Hospitality Industry – A ‘Necessity’ or ‘Nice to Have’?
Webinar: An MBA in the Hospitality Industry – A ‘Necessity’ or ‘Nice to Have’?Webinar: An MBA in the Hospitality Industry – A ‘Necessity’ or ‘Nice to Have’?
Webinar: An MBA in the Hospitality Industry – A ‘Necessity’ or ‘Nice to Have’?
 
Webinar: MS and MBA programs from Embry-Riddle Aeronautical University in Day...
Webinar: MS and MBA programs from Embry-Riddle Aeronautical University in Day...Webinar: MS and MBA programs from Embry-Riddle Aeronautical University in Day...
Webinar: MS and MBA programs from Embry-Riddle Aeronautical University in Day...
 
Webinar: Study an online Master’s in Gender Studies, Linköping University, Sw...
Webinar: Study an online Master’s in Gender Studies, Linköping University, Sw...Webinar: Study an online Master’s in Gender Studies, Linköping University, Sw...
Webinar: Study an online Master’s in Gender Studies, Linköping University, Sw...
 
Webinar: MSc in Software, Systems and Services Development in Global Environment
Webinar: MSc in Software, Systems and Services Development in Global EnvironmentWebinar: MSc in Software, Systems and Services Development in Global Environment
Webinar: MSc in Software, Systems and Services Development in Global Environment
 
Webinar: SAIS Europe: The Master of Arts in Global Risk Information
Webinar: SAIS Europe: The Master of Arts in Global Risk InformationWebinar: SAIS Europe: The Master of Arts in Global Risk Information
Webinar: SAIS Europe: The Master of Arts in Global Risk Information
 
Webinar: Study a Master’s in Education and Globalisation in Finland
Webinar: Study a Master’s in Education and Globalisation in FinlandWebinar: Study a Master’s in Education and Globalisation in Finland
Webinar: Study a Master’s in Education and Globalisation in Finland
 
Webinar: MSc in Software, Systems and Services Development in Global Environment
Webinar: MSc in Software, Systems and Services Development in Global EnvironmentWebinar: MSc in Software, Systems and Services Development in Global Environment
Webinar: MSc in Software, Systems and Services Development in Global Environment
 
Webinar: AACSB accredited MSc programs in Oulu, the capital of Northern Scand...
Webinar: AACSB accredited MSc programs in Oulu, the capital of Northern Scand...Webinar: AACSB accredited MSc programs in Oulu, the capital of Northern Scand...
Webinar: AACSB accredited MSc programs in Oulu, the capital of Northern Scand...
 
MA in Learning, Education and Technology - University of Oulu
MA in Learning, Education and Technology - University of OuluMA in Learning, Education and Technology - University of Oulu
MA in Learning, Education and Technology - University of Oulu
 
The Study Abroad Portal Media Kit 2015
The Study Abroad Portal Media Kit 2015The Study Abroad Portal Media Kit 2015
The Study Abroad Portal Media Kit 2015
 
Tips to prepare a better presentation for a webinar
Tips to prepare a better presentation for a webinarTips to prepare a better presentation for a webinar
Tips to prepare a better presentation for a webinar
 

Kürzlich hochgeladen

Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 

Kürzlich hochgeladen (20)

Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 

Wyse webinar presentation Web2Present Managing mobility in a changing device landscape

  • 1. Managing mobility in a changing device landscape Andrew Gee Vice President, Sales UK & Ireland wyse.com
  • 2. Agenda • Trends • Mobility • Devices • Consumerisation • Applications • Challenges & Architectures • Breaking the 1:1 link • Inherent security • Smarter management • User types & scenarios • Technologies © 2012 Wyse Technology
  • 3. We are all more mobile Field worker productivity demands Office based maximum time workers need is spent mobile access when not at their desks Home-based Customers working is want services increasing to come to them © 2012 Wyse Technology
  • 4. Consumerisation 500 m smartphones shipped in 2011 1.5 bn smart devices forecast to be sold in 2014 20 % more smartphones sold than PCs © 2012 Wyse Technology
  • 5. Applications are changing Collaborative Location aware working Unified Social Communications © 2012 Wyse Technology
  • 6. Applications are becoming more centralised and more local! Desktop as a Service & Web applications Virtual desktops New local Virtual applications applications PC 6 © 2012 Wyse Technology
  • 7. Agenda • Trends • Mobility • Devices • Consumerisation • Applications • Challenges & Architectures • Breaking the 1:1 link • Inherent security • Smarter management • User types & scenarios • Technologies © 2012 Wyse Technology
  • 8. Challenges Desktop refresh Demands for higher Need to reduce availability energy consumption Fast delivery of Security and new services Compliance © 2012 Wyse Technology
  • 9. Cloud Client Computing Long Easy Very low power Centrally No service life to secure consumption managed moving parts © 2012 Wyse Technology
  • 10. Break the link 1:1 BENEFITS USER Better productivity ORGANISATION More flexibility and agility © 2012 Wyse Technology
  • 11. Inherently more secure  Avoid data on  Centralised  Authenticated  Secure the device security access devices you architecture don’t own Benefits Simplify the More Control data Reduce risks from security integrity leakage lost devices architecture © 2012 Wyse Technology
  • 12. Smarter management  Centralised  Devices that  Never visit the  Automated  On-premise or manage desktop mobile device cloud-based themselves management Benefits Reduced management Consistent device Faster provisioning cost configurations © 2012 Wyse Technology
  • 13. Agenda • Trends • Mobility • Devices • Consumerisation • Applications • Challenges & Architectures • Breaking the 1:1 link • Inherent security • Smarter management • User types & scenarios • Technologies © 2012 Wyse Technology
  • 14. Understanding user types Mobile Applications Form factor & Content peripherals Non mobile Task-based Workers Office based Knowledge Workers © 2012 Wyse Technology
  • 15. Typical user scenarios . Contact Centre  Data  Voice  Video © 2012 Wyse Technology
  • 16. Typical user scenarios . Business Manager At home In the office On the move © 2012 Wyse Technology
  • 17. Typical user scenarios . Project Manager 3g Hot desking On the move © 2012 Wyse Technology
  • 18. Typical user scenarios . Home Worker Occasional home worker Regular home worker © 2012 Wyse Technology
  • 19. Agenda • Trends • Mobility • Devices • Consumerisation • Applications • Challenges & Architectures • Breaking the 1:1 link • Inherent security • Smarter management • User types & scenarios • Technologies © 2012 Wyse Technology
  • 20. Technologies to take a look at… Wyse Thin and Zero clients Wyse PocketCloud Wyse Enterprise Mobility Management Wyse mobile thin clients © 2012 Wyse Technology
  • 21. To take away… • Enterprise computing is changing fast – take advantage of it • Break the 1:1 link between user and PC • Back to Basics – understand your users • User satisfaction is not just about how their computer works – look for user wins • Don’t underestimate the new smart user: Deliver a menu of services that they can use to fit the way they work © 2012 Wyse Technology
  • 22. agee@wyse.com www.wyse.com Andrew Gee Vice President, Sales, UK & Ireland wyse.com

Hinweis der Redaktion

  1. Replace bullets with Image + lable
  2. Purpose: Share that we’re aware of and workingplaying a key role in driving major trendsComments: The center of our digital world is changing from the PC, to multiple screens per user – combining personal and secure digital activities.Virtualization and the cloud are enabling this revolution. Wyse has been there, as an inventor and innovator for over 30 years. We invented the thin client, that has been an important part of this changing landscape. And the client’s importance grows over time.Browsing only: Web 1.0Windows Applications: Terminal ServicesFull Desktop: VDI, Provisioning, Web 2.0Open Cloud Computing: Web 3.0
  3. Too big and bulkyUnreliable – moving parts – fans, hard drivesApplications need to be localHigh energy useNot secure, from theft, viruses, data theft
  4. Break the 1:1 link between the users and their PCDiagram: 1:1 PC & User vs Data in one location accessed by multiple devices. Thin Client, smartphone, tablet, web browser
  5. Desktop zero client : Wyse C10LEVirtual desktopSoftphone installed in the virtual desktopHeadset attached to thin clientVideo in window on thin client – aka Jewelry TV
  6. Hot desk access in HQ: P20 zero clientHTC smartphoneMobile thin client with 3G/WiFi
  7. Thin client mounted on back of monitor Softphone installed on thin clientUses mobile thin client when visits HQ