|By Dean Nedelman||
|December 10, 2012 06:00 AM EST||
One of the truisms in information technology is that everything old is new again - well, except maybe for punched cards. We went from big corporate data centers to regional/division corporate data centers back to big corporate data centers and now to even bigger cloud data centers. We have gone from dumb terminals were everything was done on the mainframe, to PCs, and now to virtualized desktops - where everything is run on the central servers. And now, we are back to talking about the IT advantages of telecommuting.
Telecommuting is certainly nothing new. But what is changing is how people are telecommuting and the IT processes and procedures that support them. Gone are the days of modem banks and analog days. Gone are the days when IT departments handed out PCs so people could work from home. And gone are the days when connecting remote employees meant connecting them directly into the corporate network.
When most people think of telecommuting, we hark back to the model that JetBlue made famous: the company supplied the personal computer, monitor, keyboard, mouse, and Internet connection (there is no need to go back to the caveman days with terminals and modems or acoustic couplers!). The PC was company property so that the policies, anti-virus, patches, etc., could all be controlled and managed by the corporate IT department. After all, a lot of employees still didn't even own their own computer.
These PCs had the necessary software pre-loaded on them, be it a thick client or a terminal emulator. When the remote staff connected in - their computers were placed onto the corporate network and became part of the companies extended network. When the PCs needed to be updated, patched, or upgraded - the employee had to bring everything back to the in-house IT department.
What changed? Well... EVERYTHING! There were four basic changes made for teleworking - and each of these changes required the IT department to adapt in different ways. As the ability to provide a realistic work environment kept increasing, we have gone from teleworkers to virtual offices.
One of the first big changes was that users no longer wanted to take a company PC home with them. They had their own perfectly good computer, and wanted to be able to connect using their machines. These machines/users wanted to connect to the company over the Internet instead of through dial-up modems. So IT departments started to increase their network connectivity, add Virtual Private Network (VPN) devices, and put in place intrusion detection/prevention appliances. Many a sleepless night was had by the IT administrator waiting for some remote user to spread a worm or Trojan through the entire organization.
The next big change was also Internet related - the death of thick clients. As browser technologies involved we were finally able to produce thick-client like look-and-feel inside a browser window. Most companies ported their internal applications to use browser-based web interfaces. These browser-based applications were exactly what were needed to allow better remote workers.
Ironically the Internet contributed the necessary technology to the next big change in our march to the virtual office: the move from IPSec-based VPN connections to browser-based SSL connections. IPSec, while a good protocol, proved problematic. Many travelers found out that their VPN connections were either blocked, or that the ISP or hotel lacked the technology to allow IPSec to pass through their networks. Just about every company's helpdesk received a call from some executive complaining about being unable to connect, and the helpdesk would have to try to work with the hotel or ISP to resolve the problem (and usual not be able to).
SSL VPNs resolve that issue because they work through the browser - an application that every PC already had loaded and that every user was already familiar with using. No longer would users have to be given CDs of the VPN software along with installation instructions (and the sure to follow helpdesk call). Most SSL VPN systems function as a proxy to allow dynamic access rights to the user. Instead of connecting them to the network (along with every virus, Trojan, and worm and the person's computer), we can now limit them to accessing the company's Intranet server, or to allow only access to specific company web pages.
Now that we have people using their own computers, over their own Internet connection, to securely access browser based applications - we must be done, right? What could be left? What is left is giving the user the necessary tools to have a virtual office instead of a remote connection.
Remote phone are required. The person needs to have a phone at his desk - even if that desk is 1000 miles away (or more). Here again new technology was required. We needed the new modern voice systems that allow Voice over IP (VoIP) so that we could have corporate phones remotely become part of the corporate telephone system. Even here, this is starting to give way to soft phones - software running on somebody's computer that provides that phone interface.
The remote person needs to know if his/her co-worker is available. After all, she can't simply look over the cubicle wall anymore to see if the coworker is there or not - and she can't see/hear if the co-worker is on the phone. But presence software, tied into the phone and using software on the person's computer, can tell the remote person if that co-worker is on the phone, in a meeting, or even at their desk working on their computer. Such presence software is normally built into an instant messaging client. These clients provide an easy way to communicate with somebody. Instant messaging is the new way to ask: Do you have a second?
The final piece of the puzzle to finally become feasible is video conferencing. IT departments no longer have to purchase expensive cameras, video conferencing servers, and large data connections everywhere. Point-to-point ad-hoc video conferences are easily done today with commercial "webcams" sitting on people's monitors and attached to their computers. In fact, most modern laptops have webcams built into them. Video conferencing allows the visual interfacing that is critical in modern communications. If you think that video is not important, remember that 70% of all our communication information comes from visual "clues". Without providing video conferencing, you are removing 70% of the person's comprehension.
Now that we know how to create a modern telecommuter environment, the question becomes whether we should allow telecommuting. Why are companies, both big and small, investing in this technology? Is this a technology that you should to be implementing?
The biggest advantages to having remote workers and virtual offices are in-house facility costs, expansion, and talent acquisition. Companies that have increased their use of remote workers have benefited from reduced building overhead expenses. One company that I frequently visit has been so successful with their remote worker program that they had to close the on-site cafeteria because there simply wasn't enough staff present to make use of it.
JetBlue used remote employees to staff their reservation lines. These were primarily part-time college educated women who only wanted to work 3-4 hours while their kids were in school. Using remote employees allowed JetBlue to staff across the country - thereby moving calls across the country as people's shifts changed. This is something that could not have been done with a traditional on-site call center.
Sometimes the perfect employee that you need to succeed isn't willing to relocate to where your office is. This leaves employers with the choice of either doing without a key resource, or figuring out how to allow that employee to work from home. Remote employees and virtual offices empower an employer to find the employee that will best contribute to the company - even if that person lives in a mountain cabin.
Those people who wonder if I really mean what I say about the advantages of virtual offices should know that it is what I use. I have a company phone that connects directly over the Internet to the company's phone system. I have an SSL VPN connection to gain access to the internal system. I use Cisco's Jabber service to provide presence information and instant messaging capabilities. And I use Cisco's WebEx Telepresence video conferencing service for when I need "face-to-face" time. The most important lesson I have learned about using a virtual office is to treat it like it is your real office - because the day you decide to wear your fuzzy slippers to the office is the day your boss will have a surprise video conference call with you.
The buzz continues for cloud, data analytics and the Internet of Things (IoT) and their collective impact across all industries. But a new conversation is emerging - how do companies use industry disruption and technology enablers to lead in markets undergoing change, uncertainty and ambiguity? Organizations of all sizes need to evolve and transform, often under massive pressure, as industry lines blur and merge and traditional business models are assaulted and turned upside down. In this new da...
Oct. 8, 2015 09:30 PM EDT Reads: 259
Containers are revolutionizing the way we deploy and maintain our infrastructures, but monitoring and troubleshooting in a containerized environment can still be painful and impractical. Understanding even basic resource usage is difficult - let alone tracking network connections or malicious activity. In his session at DevOps Summit, Gianluca Borello, Sr. Software Engineer at Sysdig, will cover the current state of the art for container monitoring and visibility, including pros / cons and li...
Oct. 8, 2015 09:30 PM EDT Reads: 190
The Internet of Things (IoT) is growing rapidly by extending current technologies, products and networks. By 2020, Cisco estimates there will be 50 billion connected devices. Gartner has forecast revenues of over $300 billion, just to IoT suppliers. Now is the time to figure out how you’ll make money – not just create innovative products. With hundreds of new products and companies jumping into the IoT fray every month, there’s no shortage of innovation. Despite this, McKinsey/VisionMobile data...
Oct. 8, 2015 09:30 PM EDT Reads: 182
As-a-service models offer huge opportunities, but also complicate security. It may seem that the easiest way to migrate to a new architectural model is to let others, experts in their field, do the work. This has given rise to many as-a-service models throughout the industry and across the entire technology stack, from software to infrastructure. While this has unlocked huge opportunities to accelerate the deployment of new capabilities or increase economic efficiencies within an organization, i...
Oct. 8, 2015 09:30 PM EDT Reads: 239
There are so many tools and techniques for data analytics that even for a data scientist the choices, possible systems, and even the types of data can be daunting. In his session at @ThingsExpo, Chris Harrold, Global CTO for Big Data Solutions for EMC Corporation, will show how to perform a simple, but meaningful analysis of social sentiment data using freely available tools that take only minutes to download and install. Participants will get the download information, scripts, and complete en...
Oct. 8, 2015 09:15 PM EDT Reads: 261
Containers are changing the security landscape for software development and deployment. As with any security solutions, security approaches that work for developers, operations personnel and security professionals is a requirement. In his session at @DevOpsSummit, Kevin Gilpin, CTO and Co-Founder of Conjur, will discuss various security considerations for container-based infrastructure and related DevOps workflows.
Oct. 8, 2015 09:15 PM EDT Reads: 202
Manufacturing has widely adopted standardized and automated processes to create designs, build them, and maintain them through their life cycle. However, many modern manufacturing systems go beyond mechanized workflows to introduce empowered workers, flexible collaboration, and rapid iteration. Such behaviors also characterize open source software development and are at the heart of DevOps culture, processes, and tooling.
Oct. 8, 2015 09:00 PM EDT Reads: 1,081
Between the compelling mockups and specs produced by analysts, and resulting applications built by developers, there exists a gulf where projects fail, costs spiral, and applications disappoint. Methodologies like Agile attempt to address this with intensified communication, with partial success but many limitations. In his session at DevOps Summit, Charles Kendrick, CTO and Chief Architect at Isomorphic Software, will present a revolutionary model enabled by new technologies. Learn how busine...
Oct. 8, 2015 08:45 PM EDT Reads: 265
There are many considerations when moving applications from on-premise to cloud. It is critical to understand the benefits and also challenges of this migration. A successful migration will result in lower Total Cost of Ownership, yet offer the same or higher level of robustness. Migration to cloud shifts computing resources from your data center, which can yield significant advantages provided that the cloud vendor an offer enterprise-grade quality for your application.
Oct. 8, 2015 08:00 PM EDT Reads: 234
IT data is typically silo'd by the various tools in place. Unifying all the log, metric and event data in one analytics platform stops finger pointing and provides the end-to-end correlation. Logs, metrics and custom event data can be joined to tell the holistic story of your software and operations. For example, users can correlate code deploys to system performance to application error codes.
Oct. 8, 2015 06:45 PM EDT Reads: 208
Internet of Things (IoT) will be a hybrid ecosystem of diverse devices and sensors collaborating with operational and enterprise systems to create the next big application. In their session at @ThingsExpo, Bramh Gupta, founder and CEO of robomq.io, and Fred Yatzeck, principal architect leading product development at robomq.io, discussed how choosing the right middleware and integration strategy from the get-go will enable IoT solution developers to adapt and grow with the industry, while at th...
Oct. 8, 2015 06:00 PM EDT Reads: 2,161
The web app is agile. The REST API is agile. The testing and planning are agile. But alas, data infrastructures certainly are not. Once an application matures, changing the shape or indexing scheme of data often forces at best a top down planning exercise and at worst includes schema changes that force downtime. The time has come for a new approach that fundamentally advances the agility of distributed data infrastructures. Come learn about a new solution to the problems faced by software organ...
Oct. 8, 2015 06:00 PM EDT Reads: 784
The last decade was about virtual machines, but the next one is about containers. Containers enable a service to run on any host at any time. Traditional tools are starting to show cracks because they were not designed for this level of application portability. Now is the time to look at new ways to deploy and manage applications at scale. In his session at @DevOpsSummit, Brian “Redbeard” Harrington, a principal architect at CoreOS, will examine how CoreOS helps teams run in production. Attende...
Oct. 8, 2015 05:45 PM EDT Reads: 1,226
“All our customers are looking at the cloud ecosystem as an important part of their overall product strategy. Some see it evolve as a multi-cloud / hybrid cloud strategy, while others are embracing all forms of cloud offerings like PaaS, IaaS and SaaS in their solutions,” noted Suhas Joshi, Vice President – Technology, at Harbinger Group, in this exclusive Q&A with Cloud Expo Conference Chair Roger Strukhoff.
Oct. 8, 2015 05:00 PM EDT Reads: 440
Can call centers hang up the phones for good? Intuitive Solutions did. WebRTC enabled this contact center provider to eliminate antiquated telephony and desktop phone infrastructure with a pure web-based solution, allowing them to expand beyond brick-and-mortar confines to a home-based agent model. It also ensured scalability and better service for customers, including MUY! Companies, one of the country's largest franchise restaurant companies with 232 Pizza Hut locations. This is one example of...
Oct. 8, 2015 04:30 PM EDT Reads: 7,470
Secure Cloud through Automated Compliance | @CloudExpo @CloudRaxak #Cloud #BigData #DevOps #Microservices
Cloud computing delivers on-demand resources that provide businesses with flexibility and cost-savings. The challenge in moving workloads to the cloud has been the cost and complexity of ensuring the initial and ongoing security and regulatory (PCI, HIPAA, FFIEC) compliance across private and public clouds. Manual security compliance is slow, prone to human error, and represents over 50% of the cost of managing cloud applications. Determining how to automate cloud security compliance is critical...
Oct. 8, 2015 04:00 PM EDT Reads: 304
SYS-CON Events announced today that VividCortex, the monitoring solution for the modern data system, will exhibit at the 17th International Cloud Expo®, which will take place on November 3–5, 2015, at the Santa Clara Convention Center in Santa Clara, CA. The database is the heart of most applications, but it’s also the part that’s hardest to scale, monitor, and optimize even as it’s growing 50% year over year. VividCortex is the first unified suite of database monitoring tools specifically desi...
Oct. 8, 2015 04:00 PM EDT Reads: 465
Saviynt Inc. has announced the availability of the next release of Saviynt for AWS. The comprehensive security and compliance solution provides a Command-and-Control center to gain visibility into risks in AWS, enforce real-time protection of critical workloads as well as data and automate access life-cycle governance. The solution enables AWS customers to meet their compliance mandates such as ITAR, SOX, PCI, etc. by including an extensive risk and controls library to detect known threats and b...
Oct. 8, 2015 03:00 PM EDT Reads: 209
You have your devices and your data, but what about the rest of your Internet of Things story? Two popular classes of technologies that nicely handle the Big Data analytics for Internet of Things are Apache Hadoop and NoSQL. Hadoop is designed for parallelizing analytical work across many servers and is ideal for the massive data volumes you create with IoT devices. NoSQL databases such as Apache HBase are ideal for storing and retrieving IoT data as “time series data.”
Oct. 8, 2015 02:45 PM EDT Reads: 499
Clearly the way forward is to move to cloud be it bare metal, VMs or containers. One aspect of the current public clouds that is slowing this cloud migration is cloud lock-in. Every cloud vendor is trying to make it very difficult to move out once a customer has chosen their cloud. In his session at 17th Cloud Expo, Naveen Nimmu, CEO of Clouber, Inc., will advocate that making the inter-cloud migration as simple as changing airlines would help the entire industry to quickly adopt the cloud wit...
Oct. 8, 2015 02:30 PM EDT Reads: 649