|By Dean Nedelman||
|December 10, 2012 06:00 AM EST||
One of the truisms in information technology is that everything old is new again - well, except maybe for punched cards. We went from big corporate data centers to regional/division corporate data centers back to big corporate data centers and now to even bigger cloud data centers. We have gone from dumb terminals were everything was done on the mainframe, to PCs, and now to virtualized desktops - where everything is run on the central servers. And now, we are back to talking about the IT advantages of telecommuting.
Telecommuting is certainly nothing new. But what is changing is how people are telecommuting and the IT processes and procedures that support them. Gone are the days of modem banks and analog days. Gone are the days when IT departments handed out PCs so people could work from home. And gone are the days when connecting remote employees meant connecting them directly into the corporate network.
When most people think of telecommuting, we hark back to the model that JetBlue made famous: the company supplied the personal computer, monitor, keyboard, mouse, and Internet connection (there is no need to go back to the caveman days with terminals and modems or acoustic couplers!). The PC was company property so that the policies, anti-virus, patches, etc., could all be controlled and managed by the corporate IT department. After all, a lot of employees still didn't even own their own computer.
These PCs had the necessary software pre-loaded on them, be it a thick client or a terminal emulator. When the remote staff connected in - their computers were placed onto the corporate network and became part of the companies extended network. When the PCs needed to be updated, patched, or upgraded - the employee had to bring everything back to the in-house IT department.
What changed? Well... EVERYTHING! There were four basic changes made for teleworking - and each of these changes required the IT department to adapt in different ways. As the ability to provide a realistic work environment kept increasing, we have gone from teleworkers to virtual offices.
One of the first big changes was that users no longer wanted to take a company PC home with them. They had their own perfectly good computer, and wanted to be able to connect using their machines. These machines/users wanted to connect to the company over the Internet instead of through dial-up modems. So IT departments started to increase their network connectivity, add Virtual Private Network (VPN) devices, and put in place intrusion detection/prevention appliances. Many a sleepless night was had by the IT administrator waiting for some remote user to spread a worm or Trojan through the entire organization.
The next big change was also Internet related - the death of thick clients. As browser technologies involved we were finally able to produce thick-client like look-and-feel inside a browser window. Most companies ported their internal applications to use browser-based web interfaces. These browser-based applications were exactly what were needed to allow better remote workers.
Ironically the Internet contributed the necessary technology to the next big change in our march to the virtual office: the move from IPSec-based VPN connections to browser-based SSL connections. IPSec, while a good protocol, proved problematic. Many travelers found out that their VPN connections were either blocked, or that the ISP or hotel lacked the technology to allow IPSec to pass through their networks. Just about every company's helpdesk received a call from some executive complaining about being unable to connect, and the helpdesk would have to try to work with the hotel or ISP to resolve the problem (and usual not be able to).
SSL VPNs resolve that issue because they work through the browser - an application that every PC already had loaded and that every user was already familiar with using. No longer would users have to be given CDs of the VPN software along with installation instructions (and the sure to follow helpdesk call). Most SSL VPN systems function as a proxy to allow dynamic access rights to the user. Instead of connecting them to the network (along with every virus, Trojan, and worm and the person's computer), we can now limit them to accessing the company's Intranet server, or to allow only access to specific company web pages.
Now that we have people using their own computers, over their own Internet connection, to securely access browser based applications - we must be done, right? What could be left? What is left is giving the user the necessary tools to have a virtual office instead of a remote connection.
Remote phone are required. The person needs to have a phone at his desk - even if that desk is 1000 miles away (or more). Here again new technology was required. We needed the new modern voice systems that allow Voice over IP (VoIP) so that we could have corporate phones remotely become part of the corporate telephone system. Even here, this is starting to give way to soft phones - software running on somebody's computer that provides that phone interface.
The remote person needs to know if his/her co-worker is available. After all, she can't simply look over the cubicle wall anymore to see if the coworker is there or not - and she can't see/hear if the co-worker is on the phone. But presence software, tied into the phone and using software on the person's computer, can tell the remote person if that co-worker is on the phone, in a meeting, or even at their desk working on their computer. Such presence software is normally built into an instant messaging client. These clients provide an easy way to communicate with somebody. Instant messaging is the new way to ask: Do you have a second?
The final piece of the puzzle to finally become feasible is video conferencing. IT departments no longer have to purchase expensive cameras, video conferencing servers, and large data connections everywhere. Point-to-point ad-hoc video conferences are easily done today with commercial "webcams" sitting on people's monitors and attached to their computers. In fact, most modern laptops have webcams built into them. Video conferencing allows the visual interfacing that is critical in modern communications. If you think that video is not important, remember that 70% of all our communication information comes from visual "clues". Without providing video conferencing, you are removing 70% of the person's comprehension.
Now that we know how to create a modern telecommuter environment, the question becomes whether we should allow telecommuting. Why are companies, both big and small, investing in this technology? Is this a technology that you should to be implementing?
The biggest advantages to having remote workers and virtual offices are in-house facility costs, expansion, and talent acquisition. Companies that have increased their use of remote workers have benefited from reduced building overhead expenses. One company that I frequently visit has been so successful with their remote worker program that they had to close the on-site cafeteria because there simply wasn't enough staff present to make use of it.
JetBlue used remote employees to staff their reservation lines. These were primarily part-time college educated women who only wanted to work 3-4 hours while their kids were in school. Using remote employees allowed JetBlue to staff across the country - thereby moving calls across the country as people's shifts changed. This is something that could not have been done with a traditional on-site call center.
Sometimes the perfect employee that you need to succeed isn't willing to relocate to where your office is. This leaves employers with the choice of either doing without a key resource, or figuring out how to allow that employee to work from home. Remote employees and virtual offices empower an employer to find the employee that will best contribute to the company - even if that person lives in a mountain cabin.
Those people who wonder if I really mean what I say about the advantages of virtual offices should know that it is what I use. I have a company phone that connects directly over the Internet to the company's phone system. I have an SSL VPN connection to gain access to the internal system. I use Cisco's Jabber service to provide presence information and instant messaging capabilities. And I use Cisco's WebEx Telepresence video conferencing service for when I need "face-to-face" time. The most important lesson I have learned about using a virtual office is to treat it like it is your real office - because the day you decide to wear your fuzzy slippers to the office is the day your boss will have a surprise video conference call with you.
"Once customers get a year into their IoT deployments, they start to realize that they may have been shortsighted in the ways they built out their deployment and the key thing I see a lot of people looking at is - how can I take equipment data, pull it back in an IoT solution and show it in a dashboard," stated Dave McCarthy, Director of Products at Bsquare Corporation, in this SYS-CON.tv interview at @ThingsExpo, held November 1-3, 2016, at the Santa Clara Convention Center in Santa Clara, CA.
Dec. 8, 2016 09:45 PM EST Reads: 1,232
What happens when the different parts of a vehicle become smarter than the vehicle itself? As we move toward the era of smart everything, hundreds of entities in a vehicle that communicate with each other, the vehicle and external systems create a need for identity orchestration so that all entities work as a conglomerate. Much like an orchestra without a conductor, without the ability to secure, control, and connect the link between a vehicle’s head unit, devices, and systems and to manage the ...
Dec. 8, 2016 09:15 PM EST Reads: 947
Complete Internet of Things (IoT) embedded device security is not just about the device but involves the entire product’s identity, data and control integrity, and services traversing the cloud. A device can no longer be looked at as an island; it is a part of a system. In fact, given the cross-domain interactions enabled by IoT it could be a part of many systems. Also, depending on where the device is deployed, for example, in the office building versus a factory floor or oil field, security ha...
Dec. 8, 2016 07:45 PM EST Reads: 310
Amazon has gradually rolled out parts of its IoT offerings in the last year, but these are just the tip of the iceberg. In addition to optimizing their back-end AWS offerings, Amazon is laying the ground work to be a major force in IoT – especially in the connected home and office. Amazon is extending its reach by building on its dominant Cloud IoT platform, its Dash Button strategy, recently announced Replenishment Services, the Echo/Alexa voice recognition control platform, the 6-7 strategic...
Dec. 8, 2016 07:15 PM EST Reads: 370
Everyone knows that truly innovative companies learn as they go along, pushing boundaries in response to market changes and demands. What's more of a mystery is how to balance innovation on a fresh platform built from scratch with the legacy tech stack, product suite and customers that continue to serve as the business' foundation. In his General Session at 19th Cloud Expo, Michael Chambliss, Head of Engineering at ReadyTalk, discussed why and how ReadyTalk diverted from healthy revenue and mor...
Dec. 8, 2016 05:45 PM EST Reads: 1,719
As data explodes in quantity, importance and from new sources, the need for managing and protecting data residing across physical, virtual, and cloud environments grow with it. Managing data includes protecting it, indexing and classifying it for true, long-term management, compliance and E-Discovery. Commvault can ensure this with a single pane of glass solution – whether in a private cloud, a Service Provider delivered public cloud or a hybrid cloud environment – across the heterogeneous enter...
Dec. 8, 2016 05:00 PM EST Reads: 1,817
You have great SaaS business app ideas. You want to turn your idea quickly into a functional and engaging proof of concept. You need to be able to modify it to meet customers' needs, and you need to deliver a complete and secure SaaS application. How could you achieve all the above and yet avoid unforeseen IT requirements that add unnecessary cost and complexity? You also want your app to be responsive in any device at any time. In his session at 19th Cloud Expo, Mark Allen, General Manager of...
Dec. 8, 2016 04:45 PM EST Reads: 1,846
Financial Technology has become a topic of intense interest throughout the cloud developer and enterprise IT communities. Accordingly, attendees at the upcoming 20th Cloud Expo at the Javits Center in New York, June 6-8, 2017, will find fresh new content in a new track called FinTech.
Dec. 8, 2016 04:45 PM EST Reads: 2,249
The 20th International Cloud Expo has announced that its Call for Papers is open. Cloud Expo, to be held June 6-8, 2017, at the Javits Center in New York City, brings together Cloud Computing, Big Data, Internet of Things, DevOps, Containers, Microservices and WebRTC to one location. With cloud computing driving a higher percentage of enterprise IT budgets every year, it becomes increasingly important to plant your flag in this fast-expanding business opportunity. Submit your speaking proposal ...
Dec. 8, 2016 04:15 PM EST Reads: 2,315
Bert Loomis was a visionary. This general session will highlight how Bert Loomis and people like him inspire us to build great things with small inventions. In their general session at 19th Cloud Expo, Harold Hannon, Architect at IBM Bluemix, and Michael O'Neill, Strategic Business Development at Nvidia, discussed the accelerating pace of AI development and how IBM Cloud and NVIDIA are partnering to bring AI capabilities to "every day," on-demand. They also reviewed two "free infrastructure" pr...
Dec. 8, 2016 03:30 PM EST Reads: 1,241
Unsecured IoT devices were used to launch crippling DDOS attacks in October 2016, targeting services such as Twitter, Spotify, and GitHub. Subsequent testimony to Congress about potential attacks on office buildings, schools, and hospitals raised the possibility for the IoT to harm and even kill people. What should be done? Does the government need to intervene? This panel at @ThingExpo New York brings together leading IoT and security experts to discuss this very serious topic.
Dec. 8, 2016 03:00 PM EST Reads: 530
More and more brands have jumped on the IoT bandwagon. We have an excess of wearables – activity trackers, smartwatches, smart glasses and sneakers, and more that track seemingly endless datapoints. However, most consumers have no idea what “IoT” means. Creating more wearables that track data shouldn't be the aim of brands; delivering meaningful, tangible relevance to their users should be. We're in a period in which the IoT pendulum is still swinging. Initially, it swung toward "smart for smar...
Dec. 8, 2016 02:30 PM EST Reads: 934
"Dice has been around for the last 20 years. We have been helping tech professionals find new jobs and career opportunities," explained Manish Dixit, VP of Product and Engineering at Dice, in this SYS-CON.tv interview at 19th Cloud Expo, held November 1-3, 2016, at the Santa Clara Convention Center in Santa Clara, CA.
Dec. 8, 2016 02:15 PM EST Reads: 1,193
"ReadyTalk is an audio and web video conferencing provider. We've really come to embrace WebRTC as the platform for our future of technology," explained Dan Cunningham, CTO of ReadyTalk, in this SYS-CON.tv interview at WebRTC Summit at 19th Cloud Expo, held November 1-3, 2016, at the Santa Clara Convention Center in Santa Clara, CA.
Dec. 8, 2016 01:45 PM EST Reads: 796
"At ROHA we develop an app called Catcha. It was developed after we spent a year meeting with, talking to, interacting with senior citizens watching them use their smartphones and talking to them about how they use their smartphones so we could get to know their smartphone behavior," explained Dave Woods, Chief Innovation Officer at ROHA, in this SYS-CON.tv interview at 19th Cloud Expo, held November 1-3, 2016, at the Santa Clara Convention Center in Santa Clara, CA.
Dec. 8, 2016 01:45 PM EST Reads: 776
WebRTC is the future of browser-to-browser communications, and continues to make inroads into the traditional, difficult, plug-in web communications world. The 6th WebRTC Summit continues our tradition of delivering the latest and greatest presentations within the world of WebRTC. Topics include voice calling, video chat, P2P file sharing, and use cases that have already leveraged the power and convenience of WebRTC.
Dec. 8, 2016 12:45 PM EST Reads: 1,752
The many IoT deployments around the world are busy integrating smart devices and sensors into their enterprise IT infrastructures. Yet all of this technology – and there are an amazing number of choices – is of no use without the software to gather, communicate, and analyze the new data flows. Without software, there is no IT. In this power panel at @ThingsExpo, moderated by Conference Chair Roger Strukhoff, Dave McCarthy, Director of Products at Bsquare Corporation; Alan Williamson, Principal...
Dec. 8, 2016 12:00 PM EST Reads: 537
20th Cloud Expo, taking place June 6-8, 2017, at the Javits Center in New York City, NY, will feature technical sessions from a rock star conference faculty and the leading industry players in the world. Cloud computing is now being embraced by a majority of enterprises of all sizes. Yesterday's debate about public vs. private has transformed into the reality of hybrid cloud: a recent survey shows that 74% of enterprises have a hybrid cloud strategy.
Dec. 8, 2016 11:30 AM EST Reads: 2,348
An IoT product’s log files speak volumes about what’s happening with your products in the field, pinpointing current and potential issues, and enabling you to predict failures and save millions of dollars in inventory. But until recently, no one knew how to listen. In his session at @ThingsExpo, Dan Gettens, Chief Research Officer at OnProcess, discussed recent research by Massachusetts Institute of Technology and OnProcess Technology, where MIT created a new, breakthrough analytics model for ...
Dec. 8, 2016 10:30 AM EST Reads: 576
In his keynote at 18th Cloud Expo, Andrew Keys, Co-Founder of ConsenSys Enterprise, provided an overview of the evolution of the Internet and the Database and the future of their combination – the Blockchain. Andrew Keys is Co-Founder of ConsenSys Enterprise. He comes to ConsenSys Enterprise with capital markets, technology and entrepreneurial experience. Previously, he worked for UBS investment bank in equities analysis. Later, he was responsible for the creation and distribution of life sett...
Dec. 8, 2016 10:30 AM EST Reads: 7,330