|By Dean Nedelman||
|December 10, 2012 06:00 AM EST||
One of the truisms in information technology is that everything old is new again - well, except maybe for punched cards. We went from big corporate data centers to regional/division corporate data centers back to big corporate data centers and now to even bigger cloud data centers. We have gone from dumb terminals were everything was done on the mainframe, to PCs, and now to virtualized desktops - where everything is run on the central servers. And now, we are back to talking about the IT advantages of telecommuting.
Telecommuting is certainly nothing new. But what is changing is how people are telecommuting and the IT processes and procedures that support them. Gone are the days of modem banks and analog days. Gone are the days when IT departments handed out PCs so people could work from home. And gone are the days when connecting remote employees meant connecting them directly into the corporate network.
When most people think of telecommuting, we hark back to the model that JetBlue made famous: the company supplied the personal computer, monitor, keyboard, mouse, and Internet connection (there is no need to go back to the caveman days with terminals and modems or acoustic couplers!). The PC was company property so that the policies, anti-virus, patches, etc., could all be controlled and managed by the corporate IT department. After all, a lot of employees still didn't even own their own computer.
These PCs had the necessary software pre-loaded on them, be it a thick client or a terminal emulator. When the remote staff connected in - their computers were placed onto the corporate network and became part of the companies extended network. When the PCs needed to be updated, patched, or upgraded - the employee had to bring everything back to the in-house IT department.
What changed? Well... EVERYTHING! There were four basic changes made for teleworking - and each of these changes required the IT department to adapt in different ways. As the ability to provide a realistic work environment kept increasing, we have gone from teleworkers to virtual offices.
One of the first big changes was that users no longer wanted to take a company PC home with them. They had their own perfectly good computer, and wanted to be able to connect using their machines. These machines/users wanted to connect to the company over the Internet instead of through dial-up modems. So IT departments started to increase their network connectivity, add Virtual Private Network (VPN) devices, and put in place intrusion detection/prevention appliances. Many a sleepless night was had by the IT administrator waiting for some remote user to spread a worm or Trojan through the entire organization.
The next big change was also Internet related - the death of thick clients. As browser technologies involved we were finally able to produce thick-client like look-and-feel inside a browser window. Most companies ported their internal applications to use browser-based web interfaces. These browser-based applications were exactly what were needed to allow better remote workers.
Ironically the Internet contributed the necessary technology to the next big change in our march to the virtual office: the move from IPSec-based VPN connections to browser-based SSL connections. IPSec, while a good protocol, proved problematic. Many travelers found out that their VPN connections were either blocked, or that the ISP or hotel lacked the technology to allow IPSec to pass through their networks. Just about every company's helpdesk received a call from some executive complaining about being unable to connect, and the helpdesk would have to try to work with the hotel or ISP to resolve the problem (and usual not be able to).
SSL VPNs resolve that issue because they work through the browser - an application that every PC already had loaded and that every user was already familiar with using. No longer would users have to be given CDs of the VPN software along with installation instructions (and the sure to follow helpdesk call). Most SSL VPN systems function as a proxy to allow dynamic access rights to the user. Instead of connecting them to the network (along with every virus, Trojan, and worm and the person's computer), we can now limit them to accessing the company's Intranet server, or to allow only access to specific company web pages.
Now that we have people using their own computers, over their own Internet connection, to securely access browser based applications - we must be done, right? What could be left? What is left is giving the user the necessary tools to have a virtual office instead of a remote connection.
Remote phone are required. The person needs to have a phone at his desk - even if that desk is 1000 miles away (or more). Here again new technology was required. We needed the new modern voice systems that allow Voice over IP (VoIP) so that we could have corporate phones remotely become part of the corporate telephone system. Even here, this is starting to give way to soft phones - software running on somebody's computer that provides that phone interface.
The remote person needs to know if his/her co-worker is available. After all, she can't simply look over the cubicle wall anymore to see if the coworker is there or not - and she can't see/hear if the co-worker is on the phone. But presence software, tied into the phone and using software on the person's computer, can tell the remote person if that co-worker is on the phone, in a meeting, or even at their desk working on their computer. Such presence software is normally built into an instant messaging client. These clients provide an easy way to communicate with somebody. Instant messaging is the new way to ask: Do you have a second?
The final piece of the puzzle to finally become feasible is video conferencing. IT departments no longer have to purchase expensive cameras, video conferencing servers, and large data connections everywhere. Point-to-point ad-hoc video conferences are easily done today with commercial "webcams" sitting on people's monitors and attached to their computers. In fact, most modern laptops have webcams built into them. Video conferencing allows the visual interfacing that is critical in modern communications. If you think that video is not important, remember that 70% of all our communication information comes from visual "clues". Without providing video conferencing, you are removing 70% of the person's comprehension.
Now that we know how to create a modern telecommuter environment, the question becomes whether we should allow telecommuting. Why are companies, both big and small, investing in this technology? Is this a technology that you should to be implementing?
The biggest advantages to having remote workers and virtual offices are in-house facility costs, expansion, and talent acquisition. Companies that have increased their use of remote workers have benefited from reduced building overhead expenses. One company that I frequently visit has been so successful with their remote worker program that they had to close the on-site cafeteria because there simply wasn't enough staff present to make use of it.
JetBlue used remote employees to staff their reservation lines. These were primarily part-time college educated women who only wanted to work 3-4 hours while their kids were in school. Using remote employees allowed JetBlue to staff across the country - thereby moving calls across the country as people's shifts changed. This is something that could not have been done with a traditional on-site call center.
Sometimes the perfect employee that you need to succeed isn't willing to relocate to where your office is. This leaves employers with the choice of either doing without a key resource, or figuring out how to allow that employee to work from home. Remote employees and virtual offices empower an employer to find the employee that will best contribute to the company - even if that person lives in a mountain cabin.
Those people who wonder if I really mean what I say about the advantages of virtual offices should know that it is what I use. I have a company phone that connects directly over the Internet to the company's phone system. I have an SSL VPN connection to gain access to the internal system. I use Cisco's Jabber service to provide presence information and instant messaging capabilities. And I use Cisco's WebEx Telepresence video conferencing service for when I need "face-to-face" time. The most important lesson I have learned about using a virtual office is to treat it like it is your real office - because the day you decide to wear your fuzzy slippers to the office is the day your boss will have a surprise video conference call with you.
An IoT product’s log files speak volumes about what’s happening with your products in the field, pinpointing current and potential issues, and enabling you to predict failures and save millions of dollars in inventory. But until recently, no one knew how to listen. In his session at @ThingsExpo, Dan Gettens, Chief Research Officer at OnProcess, discussed recent research by Massachusetts Institute of Technology and OnProcess Technology, where MIT created a new, breakthrough analytics model for s...
Dec. 11, 2016 02:45 AM EST Reads: 895
SYS-CON Events has announced today that Roger Strukhoff has been named conference chair of Cloud Expo and @ThingsExpo 2017 New York. The 20th Cloud Expo and 7th @ThingsExpo will take place on June 6-8, 2017, at the Javits Center in New York City, NY. "The Internet of Things brings trillions of dollars of opportunity to developers and enterprise IT, no matter how you measure it," stated Roger Strukhoff. "More importantly, it leverages the power of devices and the Internet to enable us all to im...
Dec. 11, 2016 02:30 AM EST Reads: 1,043
Complete Internet of Things (IoT) embedded device security is not just about the device but involves the entire product’s identity, data and control integrity, and services traversing the cloud. A device can no longer be looked at as an island; it is a part of a system. In fact, given the cross-domain interactions enabled by IoT it could be a part of many systems. Also, depending on where the device is deployed, for example, in the office building versus a factory floor or oil field, security ha...
Dec. 11, 2016 02:00 AM EST Reads: 771
Data is the fuel that drives the machine learning algorithmic engines and ultimately provides the business value. In his session at 20th Cloud Expo, Ed Featherston, director/senior enterprise architect at Collaborative Consulting, will discuss the key considerations around quality, volume, timeliness, and pedigree that must be dealt with in order to properly fuel that engine.
Dec. 11, 2016 01:30 AM EST Reads: 1,742
In his general session at 19th Cloud Expo, Manish Dixit, VP of Product and Engineering at Dice, discussed how Dice leverages data insights and tools to help both tech professionals and recruiters better understand how skills relate to each other and which skills are in high demand using interactive visualizations and salary indicator tools to maximize earning potential. Manish Dixit is VP of Product and Engineering at Dice. As the leader of the Product, Engineering and Data Sciences team at D...
Dec. 11, 2016 01:15 AM EST Reads: 1,333
What happens when the different parts of a vehicle become smarter than the vehicle itself? As we move toward the era of smart everything, hundreds of entities in a vehicle that communicate with each other, the vehicle and external systems create a need for identity orchestration so that all entities work as a conglomerate. Much like an orchestra without a conductor, without the ability to secure, control, and connect the link between a vehicle’s head unit, devices, and systems and to manage the ...
Dec. 11, 2016 12:00 AM EST Reads: 1,129
Financial Technology has become a topic of intense interest throughout the cloud developer and enterprise IT communities. Accordingly, attendees at the upcoming 20th Cloud Expo at the Javits Center in New York, June 6-8, 2017, will find fresh new content in a new track called FinTech.
Dec. 11, 2016 12:00 AM EST Reads: 2,400
The Internet of Things will challenge the status quo of how IT and development organizations operate. Or will it? Certainly the fog layer of IoT requires special insights about data ontology, security and transactional integrity. But the developmental challenges are the same: People, Process and Platform and how we integrate our thinking to solve complicated problems. In his session at 19th Cloud Expo, Craig Sproule, CEO of Metavine, demonstrated how to move beyond today's coding paradigm and sh...
Dec. 11, 2016 12:00 AM EST Reads: 938
"We're a cybersecurity firm that specializes in engineering security solutions both at the software and hardware level. Security cannot be an after-the-fact afterthought, which is what it's become," stated Richard Blech, Chief Executive Officer at Secure Channels, in this SYS-CON.tv interview at @ThingsExpo, held November 1-3, 2016, at the Santa Clara Convention Center in Santa Clara, CA.
Dec. 10, 2016 11:15 PM EST Reads: 1,222
"Once customers get a year into their IoT deployments, they start to realize that they may have been shortsighted in the ways they built out their deployment and the key thing I see a lot of people looking at is - how can I take equipment data, pull it back in an IoT solution and show it in a dashboard," stated Dave McCarthy, Director of Products at Bsquare Corporation, in this SYS-CON.tv interview at @ThingsExpo, held November 1-3, 2016, at the Santa Clara Convention Center in Santa Clara, CA.
Dec. 10, 2016 09:15 PM EST Reads: 1,356
Everyone knows that truly innovative companies learn as they go along, pushing boundaries in response to market changes and demands. What's more of a mystery is how to balance innovation on a fresh platform built from scratch with the legacy tech stack, product suite and customers that continue to serve as the business' foundation. In his General Session at 19th Cloud Expo, Michael Chambliss, Head of Engineering at ReadyTalk, discussed why and how ReadyTalk diverted from healthy revenue and mor...
Dec. 10, 2016 07:30 PM EST Reads: 1,825
Whether your IoT service is connecting cars, homes, appliances, wearable, cameras or other devices, one question hangs in the balance – how do you actually make money from this service? The ability to turn your IoT service into profit requires the ability to create a monetization strategy that is flexible, scalable and working for you in real-time. It must be a transparent, smoothly implemented strategy that all stakeholders – from customers to the board – will be able to understand and comprehe...
Dec. 10, 2016 07:00 PM EST Reads: 4,159
The Internet of Things (IoT) promises to simplify and streamline our lives by automating routine tasks that distract us from our goals. This promise is based on the ubiquitous deployment of smart, connected devices that link everything from industrial control systems to automobiles to refrigerators. Unfortunately, comparatively few of the devices currently deployed have been developed with an eye toward security, and as the DDoS attacks of late October 2016 have demonstrated, this oversight can ...
Dec. 10, 2016 06:30 PM EST Reads: 1,552
You have great SaaS business app ideas. You want to turn your idea quickly into a functional and engaging proof of concept. You need to be able to modify it to meet customers' needs, and you need to deliver a complete and secure SaaS application. How could you achieve all the above and yet avoid unforeseen IT requirements that add unnecessary cost and complexity? You also want your app to be responsive in any device at any time. In his session at 19th Cloud Expo, Mark Allen, General Manager of...
Dec. 10, 2016 06:30 PM EST Reads: 1,973
More and more brands have jumped on the IoT bandwagon. We have an excess of wearables – activity trackers, smartwatches, smart glasses and sneakers, and more that track seemingly endless datapoints. However, most consumers have no idea what “IoT” means. Creating more wearables that track data shouldn't be the aim of brands; delivering meaningful, tangible relevance to their users should be. We're in a period in which the IoT pendulum is still swinging. Initially, it swung toward "smart for smar...
Dec. 10, 2016 06:15 PM EST Reads: 1,111
"ReadyTalk is an audio and web video conferencing provider. We've really come to embrace WebRTC as the platform for our future of technology," explained Dan Cunningham, CTO of ReadyTalk, in this SYS-CON.tv interview at WebRTC Summit at 19th Cloud Expo, held November 1-3, 2016, at the Santa Clara Convention Center in Santa Clara, CA.
Dec. 10, 2016 05:30 PM EST Reads: 1,015
Bert Loomis was a visionary. This general session will highlight how Bert Loomis and people like him inspire us to build great things with small inventions. In their general session at 19th Cloud Expo, Harold Hannon, Architect at IBM Bluemix, and Michael O'Neill, Strategic Business Development at Nvidia, discussed the accelerating pace of AI development and how IBM Cloud and NVIDIA are partnering to bring AI capabilities to "every day," on-demand. They also reviewed two "free infrastructure" pr...
Dec. 10, 2016 05:15 PM EST Reads: 1,429
WebRTC is the future of browser-to-browser communications, and continues to make inroads into the traditional, difficult, plug-in web communications world. The 6th WebRTC Summit continues our tradition of delivering the latest and greatest presentations within the world of WebRTC. Topics include voice calling, video chat, P2P file sharing, and use cases that have already leveraged the power and convenience of WebRTC.
Dec. 10, 2016 04:30 PM EST Reads: 1,842
As data explodes in quantity, importance and from new sources, the need for managing and protecting data residing across physical, virtual, and cloud environments grow with it. Managing data includes protecting it, indexing and classifying it for true, long-term management, compliance and E-Discovery. Commvault can ensure this with a single pane of glass solution – whether in a private cloud, a Service Provider delivered public cloud or a hybrid cloud environment – across the heterogeneous enter...
Dec. 10, 2016 04:30 PM EST Reads: 1,934
"At ROHA we develop an app called Catcha. It was developed after we spent a year meeting with, talking to, interacting with senior citizens watching them use their smartphones and talking to them about how they use their smartphones so we could get to know their smartphone behavior," explained Dave Woods, Chief Innovation Officer at ROHA, in this SYS-CON.tv interview at 19th Cloud Expo, held November 1-3, 2016, at the Santa Clara Convention Center in Santa Clara, CA.
Dec. 10, 2016 03:30 PM EST Reads: 950