Archive
User Data Mess! #ShareFile, #Podio, #DropBox #SmartAccess etc…
This blog post is not really supposed to give any clear message, just to confuse a bit more and see if anyone out there can assist in clearing the view going forward from a strategy point of view.
The main question is; how are users going to leverage and consume services so that they know where to store and get to their data, collaborate with it, archive it etc.?
Right now I personally live in a very confused world, but I’m still a bit of a geek so I got a fairly good idea on how and where to store my data so that I can reach it and store it the best possible way. But just today I have the following services and capabilities that I consume;
- Personal Data
- DropBox
- iCloud
- Local Macbook Air that is backed up to my TimeMachine
- DVD’s etc…
- Corporate Data
- ShareFile (On-premise and public ShareFile service)
- DropBox
- H:\ drive
- SharePoint (Office 365)
- Document management system
This picture is an ugly and quickly put together one but kind of highlight the problem we face as solution architects when we shall try and paint the way forward and the wanted position for our corporation in terms of how to provide cost effective, simple and intuitive storage services to our end-users.
So how are users going to know where to store which type of data, and where and when they can get to it, from which device and from which application? This is getting confusing for them…
New security threat at work: Bring-your-own-network
Computerworld – Even as IT pros wrestle with the bring-your-own-device (BYOD) trend, corporate security is being further complicated by another emerging trend: bring your own network (BYON).
BYON is a by-product of increasingly common technology that allows users to create their own mobile networks, usually through mobile wireless hotspots. Security professionals say BYON requires a new approach to security because some internal networks may now be as insecure as consumer devices.
Jim Kunick, an attorney with the Chicago law firm Much Shelist, said BYON represents a more dangerous threat to data security than employees who bring their own smartphones or tablets into the office. “The network thing blows this up completely, because it takes the data out of the network the company protects,” he said. “There’s no way to ensure the security of that data. People are running corporate apps and processing corporate and client data using networks that may or may not be secure.
“I mean, no one is sure the Boingo network is secure,” he said.
Continue reading here…
//Richard
Issue 23 – The XenDesktop Experience A Technical Publication for XenDesktop Customers
Ok, Citrix has again released the XenDesktop technical publication, have a look at it!
Example topics include;
- High Availability for Citrix XenDesktop and Citrix XenApp – Planning Guide
- How to Tighten the Security of Windows Desktops
- Tackling Windows Migration
Continue reading here!
//Richard
Fire Your CIO
Ok, yet another interesting article!
“The following post is by Mike Abramsky, principal of Red Team Global , which facilitates technology innovation via collaborative workshops and consulting.
Do you stifle productivity – or shoot the CIO?
That’s the dilemma increasingly faced by CEOs. With the rise of tablets, smartphones, social media, apps and personal clouds, we are in the midst of a profound computing shift, perhaps the greatest technology revolution in the enterprise since the invention of the PC. But the IT department with its risk-averse, slow-moving, heavy-handed culture threatens to torpedo hoped-for productivity.
This revolution is more than just technology; some CEOs recognize it as early days of Retooling the Enterprise. The ease of adoption of these new tools means non-technical staff can pursue faster, more flexible”
Continue reading here…
//Richard
Mastering the BYOD trend: The ultimate guide
Have a look at this BYOD guide and get inspired! 😉
“Let’s face it: The BYOD trend is a big deal.
IT admins have questions about the influx of personal smartphones and tablets in the enterprise. They worry about it. And they often need help figuring out what to do about bring your own device (BYOD) management, security and application delivery.
It takes a combination of technology, policy and organization-wide strategy to maximize the benefits of a BYOD program and minimize the risks. This comprehensive guide explains the basics and offers helpful, in-depth tips for admins stuck at any level of a BYOD program.”
Continue reading here!
//Richard
Hype cycles
Ok, this is very interesting and I must say that I really enjoyed reading this great post from Dinakaran Sankaranarayanan! And thank you Michael Keen for posting this one! Michael is an old colleague of mine from my HP-days and is a person I really suggest that you follow, he’s got great ideas and thoughts!
But back to the post content, here is the article/post I’d like to recommend;
Understanding the Technology Hype Cycle
I hope you like it too!
//Richard





