Welcome!

Java Authors: Javier Paniza, Liz McMillan, Pat Romanski, Elizabeth White, Plutora Blog

Related Topics: Virtualization, Java, SOA & WOA, Open Source, Web 2.0, Cloud Expo

Virtualization: Article

“Give It to Me Now”: The Age of Instant Technology Gratification

How IT departments can address rising expectations for IT delivery in the age of instant technology gratification

IT departments within companies are seeing the growth of a more complex IT environment fueled by growing user demands for more flexible and productive solutions. The growing desire of users to have instant access to their IT services from any device at any given time - combined with IT trends such as the consumerization of IT, cloud-based technologies and hybrid end-user computing - are challenging the way nearly every enterprise IT department operates. The rising demand for flexibility is forcing them to grapple with the increasingly blurred lines between personal and professional device usage and making it difficult to reconcile the security and compliance implications of granting users constant access to IT services.

While IT departments struggle to fix and manage complicated IT infrastructures, the mobility and variation of today's workers and their devices has led to the slow and steady disintermediation of the IT department. Historically, IT departments have dictated the corporate policies that manage access to company data and applications. This worked well enough when employees did their work in their offices during set business hours. Now, a more competitive economic landscape and new technologies are changing the way people work.

Workers today want access to enterprise IT services 24/7 from any location, and a traditional PC-based setup simply cannot support this. Adding to this challenge, new technologies do not merely replace older ones. They add layers of complexity when they are folded into the mix along with legacy applications and existing systems. Companies introduce new technologies with the hope that they will provide the ease-of-use and flexibility that end users demand. But, problems arise when each new product requires its own set of management tools. This adds massive technical complexity to an already clunky IT environment. Managing these environments has become not just convoluted, but costly as well.

What's on the IT Department's Wish List?
It's clear that the traditional way of managing and dictating IT policies is out-of-date and out-of-touch with the daily realities of modern IT departments. What are the top issues IT managers are grappling with to maintain control over their IT architecture and deliver the types of services expected by today's workers?

Providing secure access. The challenges that affect IT departments trying to maintain security and control over corporate data and apps are rooted in the extreme complexity of their multi-layered IT environments. With the hodgepodge of applications and devices connecting to a company's network today, IT departments have had to implement security measures for a myriad of different software and platform requirements. Across several industries, such as government, finance and healthcare, more stringent regulations are being drafted and enforced that are requiring companies to maintain better data privacy and security. IT departments are not only mandated by their companies to protect intellectual property, but outside regulatory pressures are also demanding that they do the same in order to remain compliant.

Increasing automation. Workers have often complained about how slow the IT department can be when responding to troubleshooting requests, while the IT department complains of having to fix the same task over and over again on a regular basis. Employees who have grown used to the fast and easy service delivery of their consumer technologies will sometimes grow impatient waiting for a response from their help desk and attempt to "fix" the problem themselves by downloading software without the IT department's approval or using a third-party application to complete their work. Having the ability to automate standard IT tasks in the infrastructure can help reduce the amount of time and resources a company's IT department spends on help desk calls, while minimizing the security risks inherent with the usage of rogue IT applications.

Designing a flexible and personalized virtual workspace. How does a company keep control of their data and manage their critical applications while still allowing for users to work remotely, on the road, evenings and weekends, independently of their traditionally locked-down computing devices? Over the span of one day, a user's job role, location, and time zone can vary greatly, along with the kind of device they may be using. The desired features, capabilities, and access requirements that doctors or financial professionals, for example, can have will fluctuate drastically depending on the physical setting and the hour of the day they are attempting to access information. IT departments need to find a solution that not only provides the end user with the appropriate information they need within a user-friendly interface, but one that also seamlessly integrates with a company's existing hybrid IT infrastructure.

The Path to Workspace Virtualization
The rising need for IT operational excellence, improved user experience, better security and increased compliance has created a perfect storm for the IT department. End users are demanding a workplace experience that is similar to that of their consumer lifestyle - one of instant gratification. The "I want it, and I want it now," mentality has left IT management searching for answers for the inevitable need for self-servicing.

Achieving an easy-to-manage, low-cost, automated and secure virtualized IT environment can be achieved with workspace virtualization. The benefits provided by workspace virtualization can meet the demands of both end users and IT managers, while also providing a foundation for the inevitable need for more self-service within an enterprise IT environment. With workspace virtualization, IT departments and end users are given a lightweight, independent technology that provides context awareness and automation capabilities to its IT applications, while seamlessly integrating with an existing hybrid application delivery infrastructure. A context-aware virtualized workspace allows IT managers to attach rules governing computer access based on a user's circumstances, without regard to device type, location or time of day. In short, workspace virtualization enables enterprises to operate more efficiently while simultaneously lowering the costs of daily operations. It frees up an IT department's staff from constant support requests and it satisfies the "do-it-yourself" urge in every modern consumer.

What's more, workspace virtualization enables IT to centrally deliver, manage, and secure the key elements of a user's computing experience, independent of workstyles and devices. This also appeases some of the headaches faced by enterprises struggling with liability and compliance issues. With a carefully deployed workspace virtualization solution, gone are the days of IT nightmares, and here to stay is a vastly more productive IT experience where the enterprise, the consumer and the IT department are in perfect harmony.


Context Awareness: A Virtual Workspace that Adapts with Users
Within the IT environment, context awareness refers to the idea that an end user's virtual workspace can both sense and react based on their environment. With context-aware technology, IT managers can provide end users with workspace personalization while maintaining security and regulatory compliance oversight, without hands-on intervention. Context-aware technology can automatically prevent unauthorized actions such as executing certain applications and using removable disks. These restrictions can be added or removed based on a user's context as it changes, 24/7. IT can also automate all day-to-day tasks and combine them into run-books, saving time on about 80% of manual tasks. And, ultimately, IT can introduce self-servicing, where users can request and be automatically approved for services directly - based on a user's circumstances. Workspaces that are context-aware can provide end users with a fully dynamic desktop environment, while allowing IT managers to retain full control and management of an organization's IT structure.

More Stories By Jeff Fisher

As Vice President of Strategy at RES Software, Jeff Fisher is responsible for developing key business relationships and revenue opportunities to fuel continued, global growth for RES Software. He plays a critical role in developing the company’s long term global growth strategy as well as solidifying its presence in key regions, such as the United States. Mr. Fisher brings to RES Software more than 15 years of experience in strategic planning and market development, technical selling and alliance formation in the infrastructure software market.

Prior to RES Software, Mr. Fisher was Vice President of Strategy at Desktone, where he architected and executed a multi-year market development strategy, establishing the company as a globally recognized leader in desktop virtualization. Prior to that, he held the positions of Senior Business Development Manager at Microsoft and Director of Business Development at Softricity, where he established and managed an alliance with Microsoft that ultimately led to acquisition. Additionally, Mr. Fisher worked for Citrix Systems and NETLAN.

Mr. Fisher earned his BA from Cornell University and MBA from Columbia Business School.

Comments (0)

Share your thoughts on this story.

Add your comment
You must be signed in to add a comment. Sign-in | Register

In accordance with our Comment Policy, we encourage comments that are on topic, relevant and to-the-point. We will remove comments that include profanity, personal attacks, racial slurs, threats of violence, or other inappropriate material that violates our Terms and Conditions, and will block users who make repeated violations. We ask all readers to expect diversity of opinion and to treat one another with dignity and respect.


@ThingsExpo Stories
Recurring revenue models are great for driving new business in every market sector, but they are complex and need to be effectively managed to maximize profits. How you handle the range of options for pricing, co-terming and proration will ultimately determine the fate of your bottom line. In his session at 15th Cloud Expo, Brendan O'Brien, Co-founder at Aria Systems, session examined: How time impacts recurring revenue How to effectively handle customer plan changes The range of pricing and packaging options to consider
The Industrial Internet revolution is now underway, enabled by connected machines and billions of devices that communicate and collaborate. The massive amounts of Big Data requiring real-time analysis is flooding legacy IT systems and giving way to cloud environments that can handle the unpredictable workloads. Yet many barriers remain until we can fully realize the opportunities and benefits from the convergence of machines and devices with Big Data and the cloud, including interoperability, data security and privacy.
Things are being built upon cloud foundations to transform organizations. This CEO Power Panel at 15th Cloud Expo, moderated by Roger Strukhoff, Cloud Expo and @ThingsExpo conference chair, addressed the big issues involving these technologies and, more important, the results they will achieve. Rodney Rogers, chairman and CEO of Virtustream; Brendan O'Brien, co-founder of Aria Systems, Bart Copeland, president and CEO of ActiveState Software; Jim Cowie, chief scientist at Dyn; Dave Wagstaff, VP and chief architect at BSQUARE Corporation; Seth Proctor, CTO of NuoDB, Inc.; and Andris Gailitis, C...
The 3rd International Internet of @ThingsExpo, co-located with the 16th International Cloud Expo - to be held June 9-11, 2015, at the Javits Center in New York City, NY - announces that its Call for Papers is now open. The Internet of Things (IoT) is the biggest idea since the creation of the Worldwide Web more than 20 years ago.
Today’s enterprise is being driven by disruptive competitive and human capital requirements to provide enterprise application access through not only desktops, but also mobile devices. To retrofit existing programs across all these devices using traditional programming methods is very costly and time consuming – often prohibitively so. In his session at @ThingsExpo, Jesse Shiah, CEO, President, and Co-Founder of AgilePoint Inc., discussed how you can create applications that run on all mobile devices as well as laptops and desktops using a visual drag-and-drop application – and eForms-buildi...
The Internet of Things is tied together with a thin strand that is known as time. Coincidentally, at the core of nearly all data analytics is a timestamp. When working with time series data there are a few core principles that everyone should consider, especially across datasets where time is the common boundary. In his session at Internet of @ThingsExpo, Jim Scott, Director of Enterprise Strategy & Architecture at MapR Technologies, discussed single-value, geo-spatial, and log time series data. By focusing on enterprise applications and the data center, he will use OpenTSDB as an example t...
Scott Jenson leads a project called The Physical Web within the Chrome team at Google. Project members are working to take the scalability and openness of the web and use it to talk to the exponentially exploding range of smart devices. Nearly every company today working on the IoT comes up with the same basic solution: use my server and you'll be fine. But if we really believe there will be trillions of these devices, that just can't scale. We need a system that is open a scalable and by using the URL as a basic building block, we open this up and get the same resilience that the web enjoys.
Code Halos - aka "digital fingerprints" - are the key organizing principle to understand a) how dumb things become smart and b) how to monetize this dynamic. In his session at @ThingsExpo, Robert Brown, AVP, Center for the Future of Work at Cognizant Technology Solutions, outlined research, analysis and recommendations from his recently published book on this phenomena on the way leading edge organizations like GE and Disney are unlocking the Internet of Things opportunity and what steps your organization should be taking to position itself for the next platform of digital competition.
SYS-CON Media announced that Splunk, a provider of the leading software platform for real-time Operational Intelligence, has launched an ad campaign on Big Data Journal. Splunk software and cloud services enable organizations to search, monitor, analyze and visualize machine-generated big data coming from websites, applications, servers, networks, sensors and mobile devices. The ads focus on delivering ROI - how improved uptime delivered $6M in annual ROI, improving customer operations by mining large volumes of unstructured data, and how data tracking delivers uptime when it matters most.
In their session at @ThingsExpo, Shyam Varan Nath, Principal Architect at GE, and Ibrahim Gokcen, who leads GE's advanced IoT analytics, focused on the Internet of Things / Industrial Internet and how to make it operational for business end-users. Learn about the challenges posed by machine and sensor data and how to marry it with enterprise data. They also discussed the tips and tricks to provide the Industrial Internet as an end-user consumable service using Big Data Analytics and Industrial Cloud.
How do APIs and IoT relate? The answer is not as simple as merely adding an API on top of a dumb device, but rather about understanding the architectural patterns for implementing an IoT fabric. There are typically two or three trends: Exposing the device to a management framework Exposing that management framework to a business centric logic Exposing that business layer and data to end users. This last trend is the IoT stack, which involves a new shift in the separation of what stuff happens, where data lives and where the interface lies. For instance, it's a mix of architectural styles ...
Almost everyone sees the potential of Internet of Things but how can businesses truly unlock that potential. The key will be in the ability to discover business insight in the midst of an ocean of Big Data generated from billions of embedded devices via Systems of Discover. Businesses will also need to ensure that they can sustain that insight by leveraging the cloud for global reach, scale and elasticity.
The Internet of Things (IoT) promises to evolve the way the world does business; however, understanding how to apply it to your company can be a mystery. Most people struggle with understanding the potential business uses or tend to get caught up in the technology, resulting in solutions that fail to meet even minimum business goals. In his session at @ThingsExpo, Jesse Shiah, CEO / President / Co-Founder of AgilePoint Inc., showed what is needed to leverage the IoT to transform your business. He discussed opportunities and challenges ahead for the IoT from a market and technical point of vie...
IoT is still a vague buzzword for many people. In his session at @ThingsExpo, Mike Kavis, Vice President & Principal Cloud Architect at Cloud Technology Partners, discussed the business value of IoT that goes far beyond the general public's perception that IoT is all about wearables and home consumer services. He also discussed how IoT is perceived by investors and how venture capitalist access this space. Other topics discussed were barriers to success, what is new, what is old, and what the future may hold. Mike Kavis is Vice President & Principal Cloud Architect at Cloud Technology Pa...
Dale Kim is the Director of Industry Solutions at MapR. His background includes a variety of technical and management roles at information technology companies. While his experience includes work with relational databases, much of his career pertains to non-relational data in the areas of search, content management, and NoSQL, and includes senior roles in technical marketing, sales engineering, and support engineering. Dale holds an MBA from Santa Clara University, and a BA in Computer Science from the University of California, Berkeley.
The Internet of Things (IoT) is rapidly in the process of breaking from its heretofore relatively obscure enterprise applications (such as plant floor control and supply chain management) and going mainstream into the consumer space. More and more creative folks are interconnecting everyday products such as household items, mobile devices, appliances and cars, and unleashing new and imaginative scenarios. We are seeing a lot of excitement around applications in home automation, personal fitness, and in-car entertainment and this excitement will bleed into other areas. On the commercial side, m...
"People are a lot more knowledgeable about APIs now. There are two types of people who work with APIs - IT people who want to use APIs for something internal and the product managers who want to do something outside APIs for people to connect to them," explained Roberto Medrano, Executive Vice President at SOA Software, in this SYS-CON.tv interview at Cloud Expo, held Nov 4–6, 2014, at the Santa Clara Convention Center in Santa Clara, CA.
Performance is the intersection of power, agility, control, and choice. If you value performance, and more specifically consistent performance, you need to look beyond simple virtualized compute. Many factors need to be considered to create a truly performant environment. In his General Session at 15th Cloud Expo, Harold Hannon, Sr. Software Architect at SoftLayer, discussed how to take advantage of a multitude of compute options and platform features to make cloud the cornerstone of your online presence.
An entirely new security model is needed for the Internet of Things, or is it? Can we save some old and tested controls for this new and different environment? In his session at @ThingsExpo, New York's at the Javits Center, Davi Ottenheimer, EMC Senior Director of Trust, reviewed hands-on lessons with IoT devices and reveal a new risk balance you might not expect. Davi Ottenheimer, EMC Senior Director of Trust, has more than nineteen years' experience managing global security operations and assessments, including a decade of leading incident response and digital forensics. He is co-author of t...
DevOps Summit 2015 New York, co-located with the 16th International Cloud Expo - to be held June 9-11, 2015, at the Javits Center in New York City, NY - announces that it is now accepting Keynote Proposals. The widespread success of cloud computing is driving the DevOps revolution in enterprise IT. Now as never before, development teams must communicate and collaborate in a dynamic, 24/7/365 environment. There is no time to wait for long development cycles that produce software that is obsolete at launch. DevOps may be disruptive, but it is essential.