Welcome!

Cloud Expo Authors: Elizabeth White, Liz McMillan, Pat Romanski, Vincent Brasseur, Ignacio M. Llorente

Related Topics: Cloud Expo, Wireless, SOA & WOA, Virtualization, Web 2.0

Cloud Expo: Article

VDI and Cloud Infrastructure – Together at Last

Users still have concerns about the security of their information

This year, virtual desktop and cloud storage initiatives are at the top of many IT organization's wish lists. But what is not obvious is how tightly intertwined these two initiatives have become as users embrace the Bring Your Own Device (BYOD) movement. This new BYOD model forces IT groups to provide both secure user applications (VDI) and secure user data (cloud storage).

Although cloud storage services have experienced success in the enterprise, users still have concerns about the security of their information and other problems related to control over data in the cloud. Because of this, VDI will not go away as cloud computing expands, as many have predicted, but instead be used to complement the cloud. According to experts, VDI adoption is predicted to spike - with Gartner estimating that 60 percent of enterprises will deploy some form of VDI by the end of this year.

VDI Enables the New BYOD Wave
Today's workers expect to use their own PCs, smartphones and tablets in the workplace. The reality of the situation in 2012 is that BYOD is mainstream - and IT can no longer avoid it.

According to a recent study by Avanade, approximately 60 percent of companies are adapting their IT infrastructure to accommodate employees' personal devices instead of restricting how employees can use them. Nearly 90 percent of the business leaders in the survey said that they are aware that employees are already using personal technology for work purposes, and 65 percent of C-level executives in the survey consider the growing use of employee-owned technology as a top priority in their organization.

While the arrival of these mobile devices has clearly defined the value of moving IT functions over to a cloud environment, many companies are still resistant, citing security concerns as an obstacle. As employees continue to take their work on the road, overseas or back to the comfort of their own home, it's clear that IT managers will search for ways to allow easy and secure access to the various tools and services that workers use to be productive.

This is the forcing function for VDI. Rather than evaluating VDI as a separate IT priority that requires changing user patterns, VDI now enables an unstoppable trend. VDI has quickly become the ultimate IT tool to efficiently support heterogeneous user devices and maintain application security. The justification for VDI is no longer tied to moving compute from the edge to the core; now, compute remains squarely in both camps. The justification is in security and offloading endpoint ownership, and possibly maintenance, to users.

With VDI, the desktop is moved to a central, ubiquitously accessible location and users are given remote access to corporate resources on both managed and unmanaged devices - without it ever leaving the safe borders of the data center. Additionally, IT administrators are not only able to harbor cloud applications, but they can also stream other traditional applications to thin clients running their VDI tools. With these capabilities, IT is presented with simplified management and is also better able to meet the needs of a workforce that is now constantly on the go with fast, flexible and reliable solutions.

BYOD Similarly Drives Cloud Storage
According to a recent KPMG International global survey on cloud computing, a vast majority of organizations have already moved at least some of their business activities to the cloud and it's expected that in 2012 investment in cloud computing will skyrocket. In fact, according to another survey conducted by AMI research, SMB cloud spending alone will reach $100B by 2014. These forecasts come as no surprise, as workers rely heavily on many different cloud services to house their users' data and information.

VDI is an important component of BYOD since it protects corporate applications. However, there is no corresponding protection for user data. The success of Dropbox showed the appetite for cloud storage and quickly led to investments in ShareFile by Citrix and in Octopus by VMware. Untethered, unsecured endpoint devices are the latest motivation for centralized storage; but with two new technical requirements and one exciting new marketing attribute.

The technical attributes are, first, a need for IT-controlled security and, second, a need for single sign-on password control to simplify user access and make sure central storage is actually used. The exciting marketing attribute is that these two requirements finally make central secured storage more valuable and profitable for the right user base.

When you think about the cloud holistically it's equally important to think about the ease at which users can enter the cloud for services and not just what cloud services can be shipped out to users. Users want access to all of their information in the cloud as fast and efficiently as possible. When coupled with cloud computing, VDI has the capability to onboard more and more enterprises to the cloud with fewer barriers and obstacles. With this in mind, it's clear that VDI has the potential to integrate two infrastructures - using single, secure sign-on to bridge the gap between user access from any device through VDI and data in the cloud.

How Can SMB Customers Adapt?
BYOD is not just an enterprise phenomenon. It ripples through all user types and may actually be deployed first in the cost-sensitive and management-strapped SMB segment. But SMB organizations are unlikely to adopt the expensive infrastructure that characterized the first wave of VDI deployments. Custom storage, expensive blade servers and proprietary networks are unlikely to meet the budget requirements of the SMB market.

A new appliance model changes the game by introducing server economics, Ethernet-based systems that are manageable by desktop admins and a simple scaling model that simplifies configuration and management of what turns out to be a fairly gnarly storage problem. It's just this type of innovation that is required to make VDI cost-effective for the customer segment that needs it most.

More Stories By Lee Caswell

Lee Caswell is the co-founder and chief marketing officer of Pivot3. He is an experienced technology executive with more than 20 years of marketing and management experience in the storage, networking, and digital video markets. Prior to Pivot3, Caswell held positions as EVP Marketing and Business Development at VMware and was a corporate officer at Adaptec, where he was VP and General Manager of Adaptec's $350M Storage Solutions Group. He spent the first five years of his career in management programs at GE. Caswell has a BA from Carleton College where he was a Wingspread Fellow and an MBA from the Tuck School at Dartmouth College where he was a Tuck Scholar.

Comments (0)

Share your thoughts on this story.

Add your comment
You must be signed in to add a comment. Sign-in | Register

In accordance with our Comment Policy, we encourage comments that are on topic, relevant and to-the-point. We will remove comments that include profanity, personal attacks, racial slurs, threats of violence, or other inappropriate material that violates our Terms and Conditions, and will block users who make repeated violations. We ask all readers to expect diversity of opinion and to treat one another with dignity and respect.


@CloudExpo Stories
Connected devices and the Internet of Things are getting significant momentum in 2014. In his session at Internet of @ThingsExpo, Jim Hunter, Chief Scientist & Technology Evangelist at Greenwave Systems, examined three key elements that together will drive mass adoption of the IoT before the end of 2015. The first element is the recent advent of robust open source protocols (like AllJoyn and WebRTC) that facilitate M2M communication. The second is broad availability of flexible, cost-effective ...
"For the past 4 years we have been working mainly to export. For the last 3 or 4 years the main market was Russia. In the past year we have been working to expand our footprint in Europe and the United States," explained Andris Gailitis, CEO of DEAC, in this SYS-CON.tv interview at Cloud Expo, held Nov 4–6, 2014, at the Santa Clara Convention Center in Santa Clara, CA.
Scott Jenson leads a project called The Physical Web within the Chrome team at Google. Project members are working to take the scalability and openness of the web and use it to talk to the exponentially exploding range of smart devices. Nearly every company today working on the IoT comes up with the same basic solution: use my server and you'll be fine. But if we really believe there will be trillions of these devices, that just can't scale. We need a system that is open a scalable and by using ...
High-performing enterprise Software Quality Assurance (SQA) teams validate systems that are ready for use - getting most actively involved as components integrate and form complete systems. These teams catch and report on defects, making sure the customer gets the best software possible. SQA teams have leveraged automation and virtualization to execute more thorough testing in less time - bringing Dev and Ops together, ensuring production readiness. Does the emergence of DevOps mean the end of E...
"Matrix is an ambitious open standard and implementation that's set up to break down the fragmentation problems that exist in IP messaging and VoIP communication," explained John Woolf, Technical Evangelist at Matrix, in this SYS-CON.tv interview at @ThingsExpo, held Nov 4–6, 2014, at the Santa Clara Convention Center in Santa Clara, CA.
How do APIs and IoT relate? The answer is not as simple as merely adding an API on top of a dumb device, but rather about understanding the architectural patterns for implementing an IoT fabric. There are typically two or three trends: Exposing the device to a management framework Exposing that management framework to a business centric logic Exposing that business layer and data to end users. This last trend is the IoT stack, which involves a new shift in the separation of what stuff happe...
The Internet of Things will put IT to its ultimate test by creating infinite new opportunities to digitize products and services, generate and analyze new data to improve customer satisfaction, and discover new ways to gain a competitive advantage across nearly every industry. In order to help corporate business units to capitalize on the rapidly evolving IoT opportunities, IT must stand up to a new set of challenges. In his session at @ThingsExpo, Jeff Kaplan, Managing Director of THINKstrateg...
Cultural, regulatory, environmental, political and economic (CREPE) conditions over the past decade are creating cross-industry solution spaces that require processes and technologies from both the Internet of Things (IoT), and Data Management and Analytics (DMA). These solution spaces are evolving into Sensor Analytics Ecosystems (SAE) that represent significant new opportunities for organizations of all types. Public Utilities throughout the world, providing electricity, natural gas and water,...
DevOps is all about agility. However, you don't want to be on a high-speed bus to nowhere. The right DevOps approach controls velocity with a tight feedback loop that not only consists of operational data but also incorporates business context. With a business context in the decision making, the right business priorities are incorporated, which results in a higher value creation. In his session at DevOps Summit, Todd Rader, Solutions Architect at AppDynamics, discussed key monitoring techniques...
Want to enable self-service provisioning of application environments in minutes that mirror production? Can you automatically provide rich data with code-level detail back to the developers when issues occur in production? In his session at DevOps Summit, David Tesar, Microsoft Technical Evangelist on Microsoft Azure and DevOps, will discuss how to accomplish this and more utilizing technologies such as Microsoft Azure, Visual Studio online, and Application Insights in this demo-heavy session.
When an enterprise builds a hybrid IaaS cloud connecting its data center to one or more public clouds, security is often a major topic along with the other challenges involved. Security is closely intertwined with the networking choices made for the hybrid cloud. Traditional networking approaches for building a hybrid cloud try to kludge together the enterprise infrastructure with the public cloud. Consequently this approach requires risky, deep "surgery" including changes to firewalls, subnets...
The Internet of Things will greatly expand the opportunities for data collection and new business models driven off of that data. In her session at @ThingsExpo, Esmeralda Swartz, CMO of MetraTech, discussed how for this to be effective you not only need to have infrastructure and operational models capable of utilizing this new phenomenon, but increasingly service providers will need to convince a skeptical public to participate. Get ready to show them the money!
One of the biggest challenges when developing connected devices is identifying user value and delivering it through successful user experiences. In his session at Internet of @ThingsExpo, Mike Kuniavsky, Principal Scientist, Innovation Services at PARC, described an IoT-specific approach to user experience design that combines approaches from interaction design, industrial design and service design to create experiences that go beyond simple connected gadgets to create lasting, multi-device exp...
P2P RTC will impact the landscape of communications, shifting from traditional telephony style communications models to OTT (Over-The-Top) cloud assisted & PaaS (Platform as a Service) communication services. The P2P shift will impact many areas of our lives, from mobile communication, human interactive web services, RTC and telephony infrastructure, user federation, security and privacy implications, business costs, and scalability. In his session at @ThingsExpo, Robin Raymond, Chief Architect...
The Internet of Things is tied together with a thin strand that is known as time. Coincidentally, at the core of nearly all data analytics is a timestamp. When working with time series data there are a few core principles that everyone should consider, especially across datasets where time is the common boundary. In his session at Internet of @ThingsExpo, Jim Scott, Director of Enterprise Strategy & Architecture at MapR Technologies, discussed single-value, geo-spatial, and log time series dat...
"Verizon offers public cloud, virtual private cloud as well as private cloud on-premises - many different alternatives. Verizon's deep knowledge in applications and the fact that we are responsible for applications that make call outs to other systems. Those systems and those resources may not be in Verizon Cloud, we understand at the end of the day it's going to be federated," explained Anne Plese, Senior Consultant, Cloud Product Marketing at Verizon Enterprise, in this SYS-CON.tv interview at...
The Domain Name Service (DNS) is one of the most important components in networking infrastructure, enabling users and services to access applications by translating URLs (names) into IP addresses (numbers). Because every icon and URL and all embedded content on a website requires a DNS lookup loading complex sites necessitates hundreds of DNS queries. In addition, as more internet-enabled ‘Things' get connected, people will rely on DNS to name and find their fridges, toasters and toilets. Acco...
The term culture has had a polarizing effect among DevOps supporters. Some propose that culture change is critical for success with DevOps, but are remiss to define culture. Some talk about a DevOps culture but then reference activities that could lead to culture change and there are those that talk about culture change as a set of behaviors that need to be adopted by those in IT. There is no question that businesses successful in adopting a DevOps mindset have seen departmental culture change, ...
"Cloud consumption is something we envision at Solgenia. That is trying to let the cloud spread to the user as a consumption, as utility computing. We want to allow the people to just pay for what they use, not a subscription model," explained Ermanno Bonifazi, CEO & Founder of Solgenia, in this SYS-CON.tv interview at Cloud Expo, held Nov 4–6, 2014, at the Santa Clara Convention Center in Santa Clara, CA.
Enthusiasm for the Internet of Things has reached an all-time high. In 2013 alone, venture capitalists spent more than $1 billion dollars investing in the IoT space. With "smart" appliances and devices, IoT covers wearable smart devices, cloud services to hardware companies. Nest, a Google company, detects temperatures inside homes and automatically adjusts it by tracking its user's habit. These technologies are quickly developing and with it come challenges such as bridging infrastructure gaps,...