SlideShare uma empresa Scribd logo
1 de 13
Baixar para ler offline
Enterprise Mobile and Client Management Demands a
Rethinking of Work, Play and Productivity, Says Dell
Executive
Transcript of a Briefings Direct podcast on the new landscape sculpted by the increasing use of
mobile and BYOD and how Dell is helping companies navigate that terrain.
Listen to the podcast. Find it on iTunes. Sponsor: Dell Software

Dana Gardner: Hi, this is Dana Gardner, Principal Analyst at Interarbor Solutions, and you’re
listening to BriefingsDirect.
Today, we present a sponsored podcast discussion on how the recent and rapid evolution of
mobile and client management requirements and approaches have caused considerable
complexity and confusion.
We’ll examine how the incomplete solutions and a lack of a clear pan-client
strategy have hampered that move to broader mobile support at enterprises and
mid-market companies alike. The state of muddled direction has put IT in a
bind, while frustrating users who are eager to gain greater productivity,
flexibility in their work habits, and device choice.
To share his insights on how to better prepare for a mobile-enablement future that quickly
complements other IT imperatives such as cloud, big data, and even more efficient data centers,
we’re pleased to welcome our special guest Tom Kendra, Vice President and General Manager,
Systems Management at Dell Software.
Welcome, Tom. How are you?
Tom Kendra: Hey, Dana. I am doing very well, and with that intro, it sounds like you’ve pretty
much got the answers, my friend.
Gardner: Well, we have the questions, Tom. The answers are what people are looking for.
Kendra: I think that you’ve laid it out quite well in your opening comments. There is an
enormous amount of conversation in this area and it’s moving very, very rapidly. Similar to many
of your listeners, I imagine, the number of invitations we get to attend a conference on mobility
or bring your own device (BYOD), is off the charts.
Every day my inbox is filled with new invites. So there’s a lot of conversation around it. Part of
that, Dana, is around the fact that this is an evolving space. There are a lot of moving parts, and
hopefully, in the next few minutes, we’ll be able to dive into some of those.
Gardner: I suppose, Tom, looking at this from a historical perspective, people have been dealing
with a fast-moving client environment for decades. Things have changed rapidly with the client.
We went through the Web transition and client-server. We’ve seen all kinds of different ways of
getting apps to devices. It’s always been a fast-moving target.
I wonder, from your perspective, what’s different about the mobile and BYOD challenges today?
I suppose it’s more of a change, rather than just a gradual shift.

Speed and agility

Kendra: Our industry is characterized by speed and agility. Right now, the big drivers causing
the acceleration can be put into three categories: the amount and type of data that’s available, all
the different ways and devices for accessing this data, as well as the evolving
preferences and policies for dictating who, what, and how data is shared.
For example, training videos, charts and graphs versus just text, and the ability
to combine these assets and deliver them in a way that allows a front-line
salesperson, a service desk staffer or anyone else in the corporate ecosystem to
satisfy customer requests much more efficiently and rapidly.
The second area is the number of devices we need to support. You touched on this earlier. In
yesterday’s world -- and yesterday was a very short time ago -- mobility was all around the PC.
Then, it was around a corporate-issued device, most likely a business phone. Now, all of a
sudden, there are many, many, many more devices that corporations are issuing as well as
devices people are bringing into their work environment at a rapid pace.
We’ve moved from laptops to smartphones that were corporate issued to tablets. Soon, we’ll get
more and more wearables in the environment and machine-to-machine communications will
become more prevalent. All of these essentially create unprecedented opportunities, yet also
complicate the problem.
The third area that’s driving change at a much higher velocity is the ever-evolving attitude about
work and work-life balance. And, along with that, privacy. Employees want to use what they’re
comfortable using at work and they want to make sure their information and privacy rights are
understood and protected. These three items are really driving the acceleration.
Gardner: And the response to this complexity so far, Tom, has been some suite, some mobile
device management (MDM) approaches, trying to have multiple paths to these devices and
supporting multiple types of infrastructure behind that. Why have these not yet reached a point
where enterprises are comfortable? Why have we not yet solved the problem of how to do this
well?
Kendra: When you think about all the different requirements, you realize there are many ways
to achieve the objectives. You might postulate that, in certain industries, there are regulatory
requirements that somewhat dictate a solution. So a lot of organizations in those industries move
down one path. In industries where you don’t have quite the same regulatory environment, you
might have more flexibility to choose yet another path.
The range of available options is wide, and many organizations have experimented with
numerous approaches. Now, we’ve gotten to the point where we have the unique opportunity,
today and over the next couple of years, to think about how we consolidate these approaches into
a more integrated, holistic mobility solution that elevates data security and mobile workforce
productivity.
None of them are inherently good or bad. They all serve a purpose. We have to ask, “How do I
preserve the uniqueness of what those different approaches offer, while bringing together the
similarities?”

More efficient

How can you take advantage of similarities, such as the definition of roles or which roles
within the organization have access to what types of data. The commonalities may be contextual
in the sense that I’m going to provide this kind of data access if you are in these
kinds of locations on these kinds of devices. Those things we could probably pull
together and manage in a more efficient way.
But we still want to give companies the flexibility to determine what it means to
support different form factors, which means you need to understand the
characteristics of a wearable device versus a smartphone or an iPad.
I also need to understand the different use cases that are most prevalent in my organization. If
I’m a factory worker, for example, it may be better to have a wearable in the future, rather than a
tablet. In the medical field, however, tablets are probably preferred over wearables because of the
need to enter, modify and view electronic medical records. So there are different tradeoffs, and
we want to be able to support all of them.
Gardner: Looking again at the historical perspective, in the past when IT was faced with a
complexity, too many moving parts, too many variables, they could walk in and say, “Here’s the
solution. This is the box we’ve put around it. You have to use it this way. That may cause you
some frustration, but it will solve the bigger problem.” And they could get away with that.
Today, that’s really no longer the case. There’s shadow IT. There’s consumerization of IT. There
are people using cloud services on their own volition without even going through any of the lines
of business. It's right down to the individual user. How does IT now find a way to get some
control, get the needed enterprise requirements met, but recognize that their ability to dictate
terms is less than it used to be?
Kendra: You’re bringing up a very big issue. Companies today are getting a lot of pressure from
individuals bringing in their own technology. One of the case studies you and I have been
following for many months is Green Clinic Health System, a physician-owned community
healthcare organization in Louisiana. As you know, Jason Thomas, the CIO and IT Director, has
been very open about discussing their progress -- and the many challenges -- encountered on
their BYOD journey. 
As part of Green Clinic’s goal to ensure excellent patient care, the 50 physicians started bringing
in different technologies, including tablets and smartphones, and then asked IT to support them.
This is a great example of what happens when major organizational stakeholders -- Green
Clinic’s physicians, in this case -- make technology selections to deliver better service. With
Green Clinic, this meant giving doctors and clinicians anytime, anywhere access to highly
sensitive patient information on any Internet-connected device without compromising security or
HIPAA compliance requirements. 
In other kinds of businesses, similar selection processes are underway as line-of-business owners
are coming forward to request that different employees or organizational groups have access to
information from a multitude of devices. Now, IT has to figure out how to put the security in
place to make sure corporate information is protected while still providing the flexibility for
users to do their jobs using preferred devices.
Shadow IT often emerges in scenarios where IT puts too many restrictions on device choice,
which leads line-of-business owners and their constituents to seek workarounds. As we all know,
this can open the door to all sorts of security risks. When we think about the Green Clinic
example, you can see that Jason Thomas strives to be as flexible as possible in supporting
preferred devices while taking all the necessary precautions to protect patient privacy and
HIPAA regulations.

Similar shift

Gardner: When we think about how IT needs to approach this differently, perhaps embracing
and extending what's going on, while also being mindful of those important compliance risk and
governance issues, we’re seeing a similar shift from the vendors.
I think there’s such a large opportunity in the market for mobile, for the data center, for the
management of the data and the apps out to these devices, that we are seeing a rapid dashboard
and virtualization in some cases. Vendor models are shifting, and we’re seeing acquisitions
happening quite a bit.
What's different this time from the vendor perspective? When you’re trying to bring a solution, I
suppose, like IT, you don’t have the same ability to just plop down a product and say, “Here’s
what you do. Here’s how you buy it.” Is this is something that’s closer to an ecosystem or
solution type of approach?
Kendra: An excellent point again. The types of solutions Dell is bringing to the market embrace
what’s needed today while being flexible enough to accommodate future applications and
evolving data access needs.
The goal is to leverage customers’ existing investments in their current infrastructures and find
ways to build and expand on those with foundational elements that can scale easily as needs
dictate. You can imagine a scenario in which an IT shop is not going to have the resources,
especially in the mid-market, to embrace multiple ways of managing, securing, granting access,
or all of these things.
The industry has to move from a position of providing a series of point solutions to guiding and
leading with a strategy for pulling all these things together. Again, it comes down to giving
companies a plan for the future that keeps pace with their emerging requirements, accommodates
existing skill sets and grows with them as mobility becomes more ingrained in their ways of
doing business. That’s the game -- and that’s the hard part.
We were at MobileCON two months ago in San Jose and we spoke about how companies need to
think through this as they move forward. There are a couple of important points we think need to
be taken into consideration. First of all, it is not just a line-of-business, IT, legal, security, or HR
discussion. It's getting all those teams together to think about their current and future
requirements. These conversations are critical and they need to happen in context with what’s
happening across the business while taking into account the intersections and correlations with
the various stakeholders.
Line of business has to step forward and say, “This is what I think allows me to drive customer
value. This is what I think I need to do.” HR needs to think about it and have a say in giving
employees what they need to achieve ideal work-life balance while ensuring that policies address
the impact on current and future employees, contractors and consultants.
And IT needs to say, “Here is how I have to leverage the investments we’re making.” That
conversation has to happen, and it happens in some organizations at a much more rapid rate than
others.

Long-term affair

Gardner: That’s why I think this is easily going to be a three- to five-year type of affair.
Perhaps it will be longer, because we’re not just talking about plopping in a mobile device
management capability. We’re really talking about rethinking processes, business models,
productivity, and how you acquire working skills. We’re no longer just doing word processing
instead of using typewriters. We’re not just repaving cow paths. We’re charting something quite
new.
And there is that interrelationship between the technology capabilities and the work. I think
that’s something that hasn’t been thought out. Companies were perhaps thinking, “We'll just add
mobile devices onto the roster of things that we support.” But that’s probably not enough. How
does the vision from that aspect work, when you try to do both a technology shift and a business
transformation?
Kendra: You’ve hit again on a really important point. You used the term “plop in a MDM
solution.” It's important to understand that the efforts and the initiatives that have taken place
have all been really valuable. We’ve learned a lot. The issue is, as you are talking about, how to
evolve this strategy and why.
Equally important is having an understanding of the business transformation that takes place
when you put all these elements together.—it’s much more far-reaching than simply “plopping”
in a point solution for a particular aspect.
In yesterday's world, I might have had the right or ability to wipe entire devices. Let’s look at the
corporate-issued device scenario. The company owns the device and therefore owns the data that
resides or is accessed on that device.  Wiping the device would be entirely within my domain or
purview. But in a BYOD environment, I’m not going to be able to wipe a device. So, I have to
think about things much differently than I did before.
As companies evolve their own mobility strategies, it’s important to leverage their learnings,
while remaining focused on enhancing their users’ experiences and not sacrificing them. That’s
why some of the research we’ve done suggests there is a very high reconsideration rate in terms
of people and their current mobility solutions.
They’ve tried various approaches and point solutions and some worked out, but others have
found these solutions lacking, which has caused gaps in usability, user adoption, manageability,
etc. Our goal is to address and close those gaps.
Gardner: Let's get a little bit more detailed about what needs to happen. It seems to me that
containerization has come to the fore, a way of accessing different types of applications,
acquiring those applications perhaps on the fly, rather than rolled out for the entire populace of
the workforce over time. Tell us a little bit more about how you see this working better, moving
toward a more supported, agile, business-friendly and user-productivity vision or future for
mobility?
Kendra: Giving users the ability to acquire applications on the fly is hugely important as users,
based on their roles, need to have access to applications and data, and they need to have it served
up in a very easy, user-friendly manner.
The crucial considerations here are role-based, potentially even location based. Do I really want
to allow the same kinds of access to information if I’m in a coffee house in China as I do if I am
in my own office? Does data need to be resident on the device once I’m offline? Those are the
kinds of considerations we need to think about.
Seamless experience

What’s needed to ensure a seamless offline experience is where the issue of containerization
arises. There are capabilities that enable users to view and access information in a secure manner
when they’re connected to an Internet-enabled device.
But what happens when those same users are offline? Secure container-based workspaces allow
me to take documents, data or other corporate information from that online experience and have
it accessible whether I’m on a plane, in a tunnel or outside a wi-fi area.
The container provides a protected place to store, view, manage and use that data. If I need to
wipe it later on, I can just wipe the information stored in the container, not the entire device,
which likely will have personal information and other unrelated data. With the secure digital
workspace, it’s easy to restrict how corporate information is used, and policies can be readily
established to govern which data can go outside the container or be used by other applications.
The industry is clearing moving in this direction, and it’s critical that we make it across corporate
applications.
Gardner: If I hear you correctly, Tom, it sounds as if we’re going to be able to bring down the
right container, for the right device, at the right time, for the right process and/or data or
application activity. That’s putting more onus on the data center, but that’s probably a good thing.
That gives IT the control that they want and need.
It also seems to me that, when you have that flexibility on the device and you can manage
sessions and roles and permissions, this can be a cost and productivity benefit to the operators of
that data center. They can start to do better data management, dedupe, reduce their storage costs,
and do backup and recovery with more of a holistic, agile or strategic approach. They can also
meter out the resources they need to support these workloads with much greater efficiency,
predict those workloads, and then react to them very swiftly.
We’ve talked so far about all how difficult and tough this is. It sounds like if you crack this nut
properly, not only do you get that benefit of the user experience and the mobility factor, but you
can also do quite a bit of a good IT blocking and tackling on the backend. Am I reading that
correctly or am I overstating that?
Kendra: I think you’re absolutely on the money. Take us as individuals. You may have a
corporate-issued laptop. You might have a corporate-issued phone. You also may have an iPad, a
Dell tablet, or another type of tablet at home. For me, it’s important to know what Tom Kendra
has access to across all of those devices in a very simple manner.
I don’t want to set up a different approach based on each individual device. I want to set up a
way of viewing my data, based on my role, permissions and work needs. Heretofore, it's been
largely device-centric and management-centric, as opposed to user productivity role-centric.
Holistic manner

The Dell position -- and where we see the industry going -- is consolidating much of the
management and security around those devices in a holistic manner, so I can focus on what the
individual needs. In doing so, it’s much easier to serve the appropriate data access in a fairly
seamless manner. This approach rings true with many of our customers who want to spend more
resources on driving their businesses and facilitating increased user productivity and fewer
resources on managing a myriad of multiple systems.
Gardner: It also sounds that by bringing the point of management, the point of power, the point
of control and enablement back into that data center, you’re also able to link up to your legacy
assets much more easily than if you had to somehow retrofit those legacy assets out to a specific
device platform or a device's format.
Kendra: You’re hitting on the importance of flexibility. Earlier, we said the user experience is a
major driver along with ensuring flexibility for both the employee and IT. Reducing risk
exposure is another crucial driver and by taking a more holistic approach to mobility enablement,
we can address policy enforcement based on roles across all those devices. Not only does this
lower exposure to risk, it elevates data security since you’re addressing it from the user point of
view instead of trying to sync up three or four different devices with multiple user profiles.
Gardner: And if I am thinking at that data center level, it will give me choices on where and
how I create that data center, where I locate it, how I produce it, and how I host it. It opens up a
lot more opportunity for utilizing public types of cloud services or a combination that best suits
my needs and that can shift and adapt over time.
Kendra: It really does come down to freedom of choice, doesn’t it? The freedom to use
whatever device in whichever data center combination that makes the most sense for the business
is really what everyone is striving for. Many of Dell’s customers are moving toward
environments where they are taking both on-premise and off-premise compute resources. They
think about applications as, “I can serve them up from inside my company or I can serve them up
from outside my company.”
The issue comes down to the fact that I want to integrate wherever possible. I want to serve up
the data and the applications when needed and how needed, and I want to make sure that I have
the appropriate management and security controls over those things.
Gardner: Okay, I think I have the vision much more clearly now. I expect we’re going to be
hearing more from Dell Software on ways to execute toward that vision, but before we move on
to some examples of how this works in practice, why Dell? What is it about Dell now that you
think puts you in a position to deliver the means to accomplish this vision?
Kendra: Dell has relationships with millions of customers around the world. We’re a very
trusted brand, and companies are interested in what Dell has to say. People are interested in
where Dell is going. If you think about the PC market, for example, Dell has about an 11.9
percent worldwide market share. There are hundreds and hundreds of millions of PCs used in the
world today. I believe there were approximately 82 million PCs sold during the third quarter of
2013.
The point here is that we have a natural entrée into this discussion and the discussion goes like
this: Dell has been a trusted supplier of hardware and we’ve played an important role in helping
you drive your business, increase productivity and enable your people to do more, which has
produced some amazing business results. As you move into thinking about the management of
additional capabilities around mobile, Dell has hardware and software that you should consider.
Now, given that we’ve been a trusted supplier for a long time, when getting into the discussion of
our world-class technology around hardware, software and services, most people are willing to
listen. So we have a natural advantage for getting into the conversation.

World-class technologies

Once we’re in the conversation, we can highlight Dell’s world-class technologies, including
end-user computing, servers, storage, networking, security, data protection, software, and
services.
As a trusted brand with world-class technologies and proven solutions, Dell is ideally suited to
help bring together the devices and underlying security, encryption, and management
technologies required to deliver a unified mobile enablement solution. We can pull it all together
and deliver it to the mid-market probably better than anyone else.
So the Dell advantages are numerous. In our announcements over the next few months, you’ll
see how we’re bringing these capabilities together and making it easier for our customers to
acquire and use them at a lower cost and faster time to value.
Gardner: One of the things that I'd like to do, Tom, is not just to tell how things are, but to show.
Do we have some examples of organizations -- you already mentioned one with the Green Clinic
-- that have bitten the bullet and recognized the strategic approach, the flexibility on the client,
leveraging containerization, retaining control and governance, risk, and compliance requirements
through IT, but giving those end-users the power they want? What's it like when this actually
works?
Kendra: When it actually works, it's a beautiful thing. Let’s start there. We work with customers
around the world and, as you can imagine, given people's desire for their own privacy, a lot of
them don't want their names used. But we’re working with a major North American bank that has
the problems that we have been discussing.
They have 20,000-plus corporate-owned smartphones, growing to some 35,000 in the next year.
They have more than a thousand iPads in place, growing rapidly. They have a desktop
virtualization (VDI) solution, but the VDI solution, as we spoke about earlier, really doesn't
support the offline experience that they need.
They are trying to leverage an 850-person IT department that has worldwide responsibilities, all
the things that we spoke about earlier. And they use technology from companies that haven’t
evolved as quickly as they should have. So they're wondering whether those companies are going
to be around in the future.
This is the classic case of, “I have a lot of technology deployed. I need to move to a container
solution to support both online and offline experiences, and my IT budget is being squeezed.” So
how do you do this? It goes back to the things we talked about.
First, I need to leverage what I have. Second, I need to pick solutions that can support multiple
environments rather than a point solution for each environment. Third, I need to think about the
future, and in this case, that entails a rapid explosion of mobile devices.
I need to mobilize rapidly without compromising security or the user experience. The concept of
an integrated suite of policy and management capabilities is going to be extremely important to
my organization going forward.

Mobile wave

This reminds me of some information we reviewed from a Lopez Research report. In their
“Mobile Management: A Foundation for the New Mobile Ecosystem,” Maribel Lopez shared that
more than half the firms interviewed as part of custom CIO research plan to mobile-enable
business apps and processes. The mobile wave is coming and it’s coming fast.
This large financial institution fits that profile. They're moving rapidly. They’re thinking about
how to give greater access to applications and data and they need streamlined ways to
accomplish that. It’s a typical customer scenario that we are seeing these days.
Gardner: Tom, who gets to do this faster, better, cheaper? The large enterprise that's dragging a
long legacy and has a thousand IT people to either help them or hinder them or the mid-size
organization that can look to a myriad of sourcing options and wants to get out of the data center
or facilities business? Is there some sort of a natural advantage, in some way -- a leapfrog type of
an effect -- for those mid-market organizations with this?
Kendra: The mid-market has the advantage of not having giant deployments and huge teams,
which gives them a certain advantage in being able to move fast and nimbly. On the flip side, the
mid-market organization often is resource constrained in terms of budget and skills. Let’s face it,
a 10-person IT shop will likely have deep skills in certain areas, but they have to have more
generalized experiences.
For them, finding solutions that address multiple problems quickly is an absolute imperative, so
they can rollout simple solutions while maximizing economies of scale to the fullest extent.
That’s not to say that large enterprises don’t have similar priorities, but they often have complex
legacy issues that exacerbate their issues. Dell is equally adept at helping those organizations
work through those issues and devise a plan for what to move, when and how without losing
sight of longer-term plans and business directions.
There are advantages and disadvantages with each. Both need agile solutions and want to
leverage their resources to the fullest extent. Both are striving to lower costs and eliminate risks.
Both groups are interested in very much the same things but often take different approaches to
achieving those goals.
Gardner: It certainly sounds as if Dell is approaching this enterprise mobility manager market
with an aggressive perspective, recognizing a big opportunity in the market and an opportunity
that they are uniquely positioned to go at. There’s not too much emphasis on the client alone and
not just emphasis on the data center. It really needs to be a bridging type of a value-add these
days. Can you tease us a little bit about some upcoming news? What should we expect next?
Kendra: The solutions we announced in April essentially laid out our vision of Dell’s evolving
mobility strategies. We talked about the need to consolidate mobility management systems and
streamline enablement. We focused on the importance of leveraging world-class security,
including secure remote access and encryption. And the market has responded well to Dell's
point of view.
As we move forward, we have the opportunity to get much more prescriptive in describing our
unified approach that consolidates the capabilities organizations need to ensure secure control
over their corporate data while still ensuring an excellent user experience.
You’ll see more from us detailing how those integrated solutions come together to deliver fast
time to value. You'll also see different delivery vehicles, giving our customers the flexibility to
choose from on premise, software-as-a-service (SaaS) based or cloud-based approaches. You'll
see additional device support, and you'll see containerization.

Leverage advantages

We plan to leverage our advantages, our best-in-class capabilities around security, encryption,
device management; this common functionality approach. We plan to leverage all of that in
upcoming announcements.
As we take the analyst community through our end-to-end mobile/BYOD enablement plans,
we’ve gotten high marks for our approach and direction. Our discussions involving Dell’s broad
OS support, embedded security, unified management and proven customer relationship all have
been well received.
Our next step is to make sure that, as we announce and deliver in the coming months, customers
absolutely understand what we have and where we're going. We think they're going be very
excited about it. We think we're in the sweet spot of the mid-market and the upper mid-market in
terms of what solutions they need to ease their mobile enablement objectives.
We also believe we can provide a unique point-of-view and compelling technology roadmaps for
those very large customers who may have a longer journey in their deployments or rollout.
We're very excited about what we're doing. The specifics of what we're doing play out in early
December, January, and beyond. You'll see a rolling thunder of announcements from Dell, much
like we did in April. We’ll lay out the solutions. We’ll talk about how these products come
together and we’ll deliver.
Gardner: Very good. I’m afraid we'll have to leave it there. You have been listening to a
sponsored BriefingsDirect podcast discussion on how the recent rapid evolution of mobile and
client management requirements and approaches have caused complexity and confusion, but we
have now heard Dell's vision for how mobile enablement should be able to quickly complement
other IT imperatives and allow for the IT department do what it does best and for end-users to
innovate and do what they do best as well.
So a big thank you to our guest, Tom Kendra, Vice President and General Manager Systems
Management at Dell Software. Thanks so much, Tom.
Kendra: Thank you, Dana.
Gardner: And also a big thank you to our audience for joining this insightful discussion. This is
Dana Gardner, Principal Analyst at Interarbor Solutions, thanks again for listening, and come
back next time.
Listen to the podcast. Find it on iTunes. Sponsor: Dell Software
Transcript of a Briefings Direct podcast on the new landscape sculpted by the increasing use of
mobile and BYOD and how Dell is helping companies navigate that terrain. Copyright
Interarbor Solutions, LLC, 2005-2013. All rights reserved.

You may also be interested in:
	

 •	

	

 •	

	

 •	

	

 •	


BI and Big Data Analytics Force an Overdue Reckoning Between IT and Business
Interests
BYOD Trend Brings New Security Challenges for IT: Allowing Greater Access While
Protecting Networks
Dell updates virtualization suite, makes VMware support a priority
Want a Data-Driven Culture? Start Sorting Out the BI and Big Data Myths Now
•	

	

 •	

	

 •	


Data complexity forces need for agnostic tool chain approach for information
management, says Dell Software executive
Dell's Foglight for Virtualization update extends visibility and management control across
more infrastructure
For Dell's Quest Software, BYOD Puts Users First and with IT's Blessing

Mais conteúdo relacionado

Mais procurados

The UNIX Evolution: An Innovative History reaches a 20-Year Milestone
The UNIX Evolution: An Innovative History reaches a 20-Year MilestoneThe UNIX Evolution: An Innovative History reaches a 20-Year Milestone
The UNIX Evolution: An Innovative History reaches a 20-Year MilestoneDana Gardner
 
IT Support Gains Automation and Intelligence to Bring Self-Service to Both Le...
IT Support Gains Automation and Intelligence to Bring Self-Service to Both Le...IT Support Gains Automation and Intelligence to Bring Self-Service to Both Le...
IT Support Gains Automation and Intelligence to Bring Self-Service to Both Le...Dana Gardner
 
Using a Big Data Solution Helps Conservation International Identify and Proac...
Using a Big Data Solution Helps Conservation International Identify and Proac...Using a Big Data Solution Helps Conservation International Identify and Proac...
Using a Big Data Solution Helps Conservation International Identify and Proac...Dana Gardner
 
How Analytics as a Service Changes the Game and Expands the Market for Big Da...
How Analytics as a Service Changes the Game and Expands the Market for Big Da...How Analytics as a Service Changes the Game and Expands the Market for Big Da...
How Analytics as a Service Changes the Game and Expands the Market for Big Da...Dana Gardner
 
Needham bank desktop direct case study
Needham bank desktop direct case studyNeedham bank desktop direct case study
Needham bank desktop direct case studyShawn Reilly
 
How Modern Operational Services Leads to More Self-Managing, Self-Healing, an...
How Modern Operational Services Leads to More Self-Managing, Self-Healing, an...How Modern Operational Services Leads to More Self-Managing, Self-Healing, an...
How Modern Operational Services Leads to More Self-Managing, Self-Healing, an...Dana Gardner
 
How HPE Pointnext Tech Care Changes the Game for Delivering Enhanced IT Solut...
How HPE Pointnext Tech Care Changes the Game for Delivering Enhanced IT Solut...How HPE Pointnext Tech Care Changes the Game for Delivering Enhanced IT Solut...
How HPE Pointnext Tech Care Changes the Game for Delivering Enhanced IT Solut...Dana Gardner
 
How INOVVO Delivers Analysis that Leads to Greater User Retention and Loyalty...
How INOVVO Delivers Analysis that Leads to Greater User Retention and Loyalty...How INOVVO Delivers Analysis that Leads to Greater User Retention and Loyalty...
How INOVVO Delivers Analysis that Leads to Greater User Retention and Loyalty...Dana Gardner
 
As Cloud Trends Drive User Expectations Higher, Networks Must Now Deliver App...
As Cloud Trends Drive User Expectations Higher, Networks Must Now Deliver App...As Cloud Trends Drive User Expectations Higher, Networks Must Now Deliver App...
As Cloud Trends Drive User Expectations Higher, Networks Must Now Deliver App...Dana Gardner
 
How a Hackathon Approach Juices Innovation on Big Data Applications for Thoms...
How a Hackathon Approach Juices Innovation on Big Data Applications for Thoms...How a Hackathon Approach Juices Innovation on Big Data Applications for Thoms...
How a Hackathon Approach Juices Innovation on Big Data Applications for Thoms...Dana Gardner
 
How New York Genome Center Manages the Massive Data Generated from DNA Sequen...
How New York Genome Center Manages the Massive Data Generated from DNA Sequen...How New York Genome Center Manages the Massive Data Generated from DNA Sequen...
How New York Genome Center Manages the Massive Data Generated from DNA Sequen...Dana Gardner
 
Intralinks Uses Hybrid Computing to Blaze a Compliance Trail Across the Regul...
Intralinks Uses Hybrid Computing to Blaze a Compliance Trail Across the Regul...Intralinks Uses Hybrid Computing to Blaze a Compliance Trail Across the Regul...
Intralinks Uses Hybrid Computing to Blaze a Compliance Trail Across the Regul...Dana Gardner
 
How Unisys and Microsoft Team Up To Ease Complex Cloud Adoption For Governmen...
How Unisys and Microsoft Team Up To Ease Complex Cloud Adoption For Governmen...How Unisys and Microsoft Team Up To Ease Complex Cloud Adoption For Governmen...
How Unisys and Microsoft Team Up To Ease Complex Cloud Adoption For Governmen...Dana Gardner
 
How the Journey to Modern Data Management is Paved with an Inclusive Edge-to-...
How the Journey to Modern Data Management is Paved with an Inclusive Edge-to-...How the Journey to Modern Data Management is Paved with an Inclusive Edge-to-...
How the Journey to Modern Data Management is Paved with an Inclusive Edge-to-...Dana Gardner
 
Business Readiness—The Key to Surviving and Thriving in Uncertain Times
Business Readiness—The Key to Surviving and Thriving in Uncertain TimesBusiness Readiness—The Key to Surviving and Thriving in Uncertain Times
Business Readiness—The Key to Surviving and Thriving in Uncertain TimesDana Gardner
 
Telepresence - Not just for meetings any more
Telepresence - Not just for meetings any moreTelepresence - Not just for meetings any more
Telepresence - Not just for meetings any moreDave Martella
 
How Financial Firms Blaze a Trail To New, More Predictive Operational Resilie...
How Financial Firms Blaze a Trail To New, More Predictive Operational Resilie...How Financial Firms Blaze a Trail To New, More Predictive Operational Resilie...
How Financial Firms Blaze a Trail To New, More Predictive Operational Resilie...Dana Gardner
 
How HTC Centralizes Storage Management to Gain Visibility, Reduce Costs and I...
How HTC Centralizes Storage Management to Gain Visibility, Reduce Costs and I...How HTC Centralizes Storage Management to Gain Visibility, Reduce Costs and I...
How HTC Centralizes Storage Management to Gain Visibility, Reduce Costs and I...Dana Gardner
 
How Big Data Generates New Insights into What’s Happening in Tropical Ecosyst...
How Big Data Generates New Insights into What’s Happening in Tropical Ecosyst...How Big Data Generates New Insights into What’s Happening in Tropical Ecosyst...
How Big Data Generates New Insights into What’s Happening in Tropical Ecosyst...Dana Gardner
 

Mais procurados (20)

The UNIX Evolution: An Innovative History reaches a 20-Year Milestone
The UNIX Evolution: An Innovative History reaches a 20-Year MilestoneThe UNIX Evolution: An Innovative History reaches a 20-Year Milestone
The UNIX Evolution: An Innovative History reaches a 20-Year Milestone
 
IT Support Gains Automation and Intelligence to Bring Self-Service to Both Le...
IT Support Gains Automation and Intelligence to Bring Self-Service to Both Le...IT Support Gains Automation and Intelligence to Bring Self-Service to Both Le...
IT Support Gains Automation and Intelligence to Bring Self-Service to Both Le...
 
Using a Big Data Solution Helps Conservation International Identify and Proac...
Using a Big Data Solution Helps Conservation International Identify and Proac...Using a Big Data Solution Helps Conservation International Identify and Proac...
Using a Big Data Solution Helps Conservation International Identify and Proac...
 
How Analytics as a Service Changes the Game and Expands the Market for Big Da...
How Analytics as a Service Changes the Game and Expands the Market for Big Da...How Analytics as a Service Changes the Game and Expands the Market for Big Da...
How Analytics as a Service Changes the Game and Expands the Market for Big Da...
 
Needham bank desktop direct case study
Needham bank desktop direct case studyNeedham bank desktop direct case study
Needham bank desktop direct case study
 
How Modern Operational Services Leads to More Self-Managing, Self-Healing, an...
How Modern Operational Services Leads to More Self-Managing, Self-Healing, an...How Modern Operational Services Leads to More Self-Managing, Self-Healing, an...
How Modern Operational Services Leads to More Self-Managing, Self-Healing, an...
 
How HPE Pointnext Tech Care Changes the Game for Delivering Enhanced IT Solut...
How HPE Pointnext Tech Care Changes the Game for Delivering Enhanced IT Solut...How HPE Pointnext Tech Care Changes the Game for Delivering Enhanced IT Solut...
How HPE Pointnext Tech Care Changes the Game for Delivering Enhanced IT Solut...
 
How INOVVO Delivers Analysis that Leads to Greater User Retention and Loyalty...
How INOVVO Delivers Analysis that Leads to Greater User Retention and Loyalty...How INOVVO Delivers Analysis that Leads to Greater User Retention and Loyalty...
How INOVVO Delivers Analysis that Leads to Greater User Retention and Loyalty...
 
As Cloud Trends Drive User Expectations Higher, Networks Must Now Deliver App...
As Cloud Trends Drive User Expectations Higher, Networks Must Now Deliver App...As Cloud Trends Drive User Expectations Higher, Networks Must Now Deliver App...
As Cloud Trends Drive User Expectations Higher, Networks Must Now Deliver App...
 
How a Hackathon Approach Juices Innovation on Big Data Applications for Thoms...
How a Hackathon Approach Juices Innovation on Big Data Applications for Thoms...How a Hackathon Approach Juices Innovation on Big Data Applications for Thoms...
How a Hackathon Approach Juices Innovation on Big Data Applications for Thoms...
 
How New York Genome Center Manages the Massive Data Generated from DNA Sequen...
How New York Genome Center Manages the Massive Data Generated from DNA Sequen...How New York Genome Center Manages the Massive Data Generated from DNA Sequen...
How New York Genome Center Manages the Massive Data Generated from DNA Sequen...
 
Intralinks Uses Hybrid Computing to Blaze a Compliance Trail Across the Regul...
Intralinks Uses Hybrid Computing to Blaze a Compliance Trail Across the Regul...Intralinks Uses Hybrid Computing to Blaze a Compliance Trail Across the Regul...
Intralinks Uses Hybrid Computing to Blaze a Compliance Trail Across the Regul...
 
How Unisys and Microsoft Team Up To Ease Complex Cloud Adoption For Governmen...
How Unisys and Microsoft Team Up To Ease Complex Cloud Adoption For Governmen...How Unisys and Microsoft Team Up To Ease Complex Cloud Adoption For Governmen...
How Unisys and Microsoft Team Up To Ease Complex Cloud Adoption For Governmen...
 
How the Journey to Modern Data Management is Paved with an Inclusive Edge-to-...
How the Journey to Modern Data Management is Paved with an Inclusive Edge-to-...How the Journey to Modern Data Management is Paved with an Inclusive Edge-to-...
How the Journey to Modern Data Management is Paved with an Inclusive Edge-to-...
 
Business Readiness—The Key to Surviving and Thriving in Uncertain Times
Business Readiness—The Key to Surviving and Thriving in Uncertain TimesBusiness Readiness—The Key to Surviving and Thriving in Uncertain Times
Business Readiness—The Key to Surviving and Thriving in Uncertain Times
 
Telepresence - Not just for meetings any more
Telepresence - Not just for meetings any moreTelepresence - Not just for meetings any more
Telepresence - Not just for meetings any more
 
How Financial Firms Blaze a Trail To New, More Predictive Operational Resilie...
How Financial Firms Blaze a Trail To New, More Predictive Operational Resilie...How Financial Firms Blaze a Trail To New, More Predictive Operational Resilie...
How Financial Firms Blaze a Trail To New, More Predictive Operational Resilie...
 
Nicola Millard - Futurologist
Nicola Millard - FuturologistNicola Millard - Futurologist
Nicola Millard - Futurologist
 
How HTC Centralizes Storage Management to Gain Visibility, Reduce Costs and I...
How HTC Centralizes Storage Management to Gain Visibility, Reduce Costs and I...How HTC Centralizes Storage Management to Gain Visibility, Reduce Costs and I...
How HTC Centralizes Storage Management to Gain Visibility, Reduce Costs and I...
 
How Big Data Generates New Insights into What’s Happening in Tropical Ecosyst...
How Big Data Generates New Insights into What’s Happening in Tropical Ecosyst...How Big Data Generates New Insights into What’s Happening in Tropical Ecosyst...
How Big Data Generates New Insights into What’s Happening in Tropical Ecosyst...
 

Destaque

Open Source Creativity
Open Source CreativityOpen Source Creativity
Open Source CreativitySara Cannon
 
The impact of innovation on travel and tourism industries (World Travel Marke...
The impact of innovation on travel and tourism industries (World Travel Marke...The impact of innovation on travel and tourism industries (World Travel Marke...
The impact of innovation on travel and tourism industries (World Travel Marke...Brian Solis
 
Reuters: Pictures of the Year 2016 (Part 2)
Reuters: Pictures of the Year 2016 (Part 2)Reuters: Pictures of the Year 2016 (Part 2)
Reuters: Pictures of the Year 2016 (Part 2)maditabalnco
 
The Six Highest Performing B2B Blog Post Formats
The Six Highest Performing B2B Blog Post FormatsThe Six Highest Performing B2B Blog Post Formats
The Six Highest Performing B2B Blog Post FormatsBarry Feldman
 
Lightning Talk #9: How UX and Data Storytelling Can Shape Policy by Mika Aldaba
Lightning Talk #9: How UX and Data Storytelling Can Shape Policy by Mika AldabaLightning Talk #9: How UX and Data Storytelling Can Shape Policy by Mika Aldaba
Lightning Talk #9: How UX and Data Storytelling Can Shape Policy by Mika Aldabaux singapore
 
The Outcome Economy
The Outcome EconomyThe Outcome Economy
The Outcome EconomyHelge Tennø
 

Destaque (7)

Open Source Creativity
Open Source CreativityOpen Source Creativity
Open Source Creativity
 
The impact of innovation on travel and tourism industries (World Travel Marke...
The impact of innovation on travel and tourism industries (World Travel Marke...The impact of innovation on travel and tourism industries (World Travel Marke...
The impact of innovation on travel and tourism industries (World Travel Marke...
 
Reuters: Pictures of the Year 2016 (Part 2)
Reuters: Pictures of the Year 2016 (Part 2)Reuters: Pictures of the Year 2016 (Part 2)
Reuters: Pictures of the Year 2016 (Part 2)
 
Succession “Losers”: What Happens to Executives Passed Over for the CEO Job?
Succession “Losers”: What Happens to Executives Passed Over for the CEO Job? Succession “Losers”: What Happens to Executives Passed Over for the CEO Job?
Succession “Losers”: What Happens to Executives Passed Over for the CEO Job?
 
The Six Highest Performing B2B Blog Post Formats
The Six Highest Performing B2B Blog Post FormatsThe Six Highest Performing B2B Blog Post Formats
The Six Highest Performing B2B Blog Post Formats
 
Lightning Talk #9: How UX and Data Storytelling Can Shape Policy by Mika Aldaba
Lightning Talk #9: How UX and Data Storytelling Can Shape Policy by Mika AldabaLightning Talk #9: How UX and Data Storytelling Can Shape Policy by Mika Aldaba
Lightning Talk #9: How UX and Data Storytelling Can Shape Policy by Mika Aldaba
 
The Outcome Economy
The Outcome EconomyThe Outcome Economy
The Outcome Economy
 

Semelhante a Enterprise Mobile Management Demands Rethinking Work and Productivity

HP Simplifies Foundation Care Services to Deliver Just-in-Time Pan-IT Support
HP Simplifies Foundation Care Services to Deliver Just-in-Time Pan-IT Support HP Simplifies Foundation Care Services to Deliver Just-in-Time Pan-IT Support
HP Simplifies Foundation Care Services to Deliver Just-in-Time Pan-IT Support Dana Gardner
 
Platform 3.0 Ripe to Give Standard Access to Advanced Intelligence and Automa...
Platform 3.0 Ripe to Give Standard Access to Advanced Intelligence and Automa...Platform 3.0 Ripe to Give Standard Access to Advanced Intelligence and Automa...
Platform 3.0 Ripe to Give Standard Access to Advanced Intelligence and Automa...Dana Gardner
 
Big Data Pushes Enterprises into Data-Driven Mode, Makes Demands for More App...
Big Data Pushes Enterprises into Data-Driven Mode, Makes Demands for More App...Big Data Pushes Enterprises into Data-Driven Mode, Makes Demands for More App...
Big Data Pushes Enterprises into Data-Driven Mode, Makes Demands for More App...Dana Gardner
 
App Stores -- They're Not Just for Consumers Any More, as More Enterprises Ad...
App Stores -- They're Not Just for Consumers Any More, as More Enterprises Ad...App Stores -- They're Not Just for Consumers Any More, as More Enterprises Ad...
App Stores -- They're Not Just for Consumers Any More, as More Enterprises Ad...Dana Gardner
 
Exploring the Business Decision to Use Cloud Computing
Exploring the Business Decision to Use Cloud ComputingExploring the Business Decision to Use Cloud Computing
Exploring the Business Decision to Use Cloud ComputingDana Gardner
 
Tag-Team of Workshops Provides Proven Path of Data Center Transformation, Ass...
Tag-Team of Workshops Provides Proven Path of Data Center Transformation, Ass...Tag-Team of Workshops Provides Proven Path of Data Center Transformation, Ass...
Tag-Team of Workshops Provides Proven Path of Data Center Transformation, Ass...Dana Gardner
 
The Rise of Business Networks
The Rise of Business NetworksThe Rise of Business Networks
The Rise of Business NetworksDana Gardner
 
[Report] Power to the People: Identify and Empower Your Mobile Workforce, by ...
[Report] Power to the People: Identify and Empower Your Mobile Workforce, by ...[Report] Power to the People: Identify and Empower Your Mobile Workforce, by ...
[Report] Power to the People: Identify and Empower Your Mobile Workforce, by ...Altimeter, a Prophet Company
 
Next Generation Enterprise Technology Strategy Moves Beyond the 'Professional...
Next Generation Enterprise Technology Strategy Moves Beyond the 'Professional...Next Generation Enterprise Technology Strategy Moves Beyond the 'Professional...
Next Generation Enterprise Technology Strategy Moves Beyond the 'Professional...Dana Gardner
 
For Dell’s Quest Software, BYOD Puts Users First with IT’s Blessing
For Dell’s Quest Software, BYOD Puts Users First with IT’s BlessingFor Dell’s Quest Software, BYOD Puts Users First with IT’s Blessing
For Dell’s Quest Software, BYOD Puts Users First with IT’s BlessingDana Gardner
 
Trust Factory Slides (2015)
Trust Factory Slides (2015)Trust Factory Slides (2015)
Trust Factory Slides (2015)Timothy Holborn
 
Focus on Data, Risk Control, and Predictive Analysis Drives New Era of Cloud-...
Focus on Data, Risk Control, and Predictive Analysis Drives New Era of Cloud-...Focus on Data, Risk Control, and Predictive Analysis Drives New Era of Cloud-...
Focus on Data, Risk Control, and Predictive Analysis Drives New Era of Cloud-...Dana Gardner
 
Wk11 the innovation development process
Wk11 the innovation development processWk11 the innovation development process
Wk11 the innovation development processWaldenForest
 
Data foundation for analytics excellence
Data foundation for analytics excellenceData foundation for analytics excellence
Data foundation for analytics excellenceMudit Mangal
 
A Tale of Two IT Departments, or How Governance is Essential in the Hybrid Cl...
A Tale of Two IT Departments, or How Governance is Essential in the Hybrid Cl...A Tale of Two IT Departments, or How Governance is Essential in the Hybrid Cl...
A Tale of Two IT Departments, or How Governance is Essential in the Hybrid Cl...Dana Gardner
 
Akamai Offers Situational Approach to Addressing Challenges Raised by Complex...
Akamai Offers Situational Approach to Addressing Challenges Raised by Complex...Akamai Offers Situational Approach to Addressing Challenges Raised by Complex...
Akamai Offers Situational Approach to Addressing Challenges Raised by Complex...Dana Gardner
 
Digital strategy a 5 point approach
Digital strategy   a 5 point approachDigital strategy   a 5 point approach
Digital strategy a 5 point approachVed Sen
 
Mission Critical Use Cases Show How Analytics Architectures Usher in an Artif...
Mission Critical Use Cases Show How Analytics Architectures Usher in an Artif...Mission Critical Use Cases Show How Analytics Architectures Usher in an Artif...
Mission Critical Use Cases Show How Analytics Architectures Usher in an Artif...Dana Gardner
 
Work from Anywhere: The Secret to Unlocking Once-Hidden Productivity and Crea...
Work from Anywhere: The Secret to Unlocking Once-Hidden Productivity and Crea...Work from Anywhere: The Secret to Unlocking Once-Hidden Productivity and Crea...
Work from Anywhere: The Secret to Unlocking Once-Hidden Productivity and Crea...Dana Gardner
 

Semelhante a Enterprise Mobile Management Demands Rethinking Work and Productivity (20)

HP Simplifies Foundation Care Services to Deliver Just-in-Time Pan-IT Support
HP Simplifies Foundation Care Services to Deliver Just-in-Time Pan-IT Support HP Simplifies Foundation Care Services to Deliver Just-in-Time Pan-IT Support
HP Simplifies Foundation Care Services to Deliver Just-in-Time Pan-IT Support
 
Platform 3.0 Ripe to Give Standard Access to Advanced Intelligence and Automa...
Platform 3.0 Ripe to Give Standard Access to Advanced Intelligence and Automa...Platform 3.0 Ripe to Give Standard Access to Advanced Intelligence and Automa...
Platform 3.0 Ripe to Give Standard Access to Advanced Intelligence and Automa...
 
Big Data Pushes Enterprises into Data-Driven Mode, Makes Demands for More App...
Big Data Pushes Enterprises into Data-Driven Mode, Makes Demands for More App...Big Data Pushes Enterprises into Data-Driven Mode, Makes Demands for More App...
Big Data Pushes Enterprises into Data-Driven Mode, Makes Demands for More App...
 
App Stores -- They're Not Just for Consumers Any More, as More Enterprises Ad...
App Stores -- They're Not Just for Consumers Any More, as More Enterprises Ad...App Stores -- They're Not Just for Consumers Any More, as More Enterprises Ad...
App Stores -- They're Not Just for Consumers Any More, as More Enterprises Ad...
 
Exploring the Business Decision to Use Cloud Computing
Exploring the Business Decision to Use Cloud ComputingExploring the Business Decision to Use Cloud Computing
Exploring the Business Decision to Use Cloud Computing
 
Tag-Team of Workshops Provides Proven Path of Data Center Transformation, Ass...
Tag-Team of Workshops Provides Proven Path of Data Center Transformation, Ass...Tag-Team of Workshops Provides Proven Path of Data Center Transformation, Ass...
Tag-Team of Workshops Provides Proven Path of Data Center Transformation, Ass...
 
The Rise of Business Networks
The Rise of Business NetworksThe Rise of Business Networks
The Rise of Business Networks
 
[Report] Power to the People: Identify and Empower Your Mobile Workforce, by ...
[Report] Power to the People: Identify and Empower Your Mobile Workforce, by ...[Report] Power to the People: Identify and Empower Your Mobile Workforce, by ...
[Report] Power to the People: Identify and Empower Your Mobile Workforce, by ...
 
Next Generation Enterprise Technology Strategy Moves Beyond the 'Professional...
Next Generation Enterprise Technology Strategy Moves Beyond the 'Professional...Next Generation Enterprise Technology Strategy Moves Beyond the 'Professional...
Next Generation Enterprise Technology Strategy Moves Beyond the 'Professional...
 
For Dell’s Quest Software, BYOD Puts Users First with IT’s Blessing
For Dell’s Quest Software, BYOD Puts Users First with IT’s BlessingFor Dell’s Quest Software, BYOD Puts Users First with IT’s Blessing
For Dell’s Quest Software, BYOD Puts Users First with IT’s Blessing
 
Trust Factory Slides (2015)
Trust Factory Slides (2015)Trust Factory Slides (2015)
Trust Factory Slides (2015)
 
Focus on Data, Risk Control, and Predictive Analysis Drives New Era of Cloud-...
Focus on Data, Risk Control, and Predictive Analysis Drives New Era of Cloud-...Focus on Data, Risk Control, and Predictive Analysis Drives New Era of Cloud-...
Focus on Data, Risk Control, and Predictive Analysis Drives New Era of Cloud-...
 
Wk11 the innovation development process
Wk11 the innovation development processWk11 the innovation development process
Wk11 the innovation development process
 
Data foundation for analytics excellence
Data foundation for analytics excellenceData foundation for analytics excellence
Data foundation for analytics excellence
 
A Tale of Two IT Departments, or How Governance is Essential in the Hybrid Cl...
A Tale of Two IT Departments, or How Governance is Essential in the Hybrid Cl...A Tale of Two IT Departments, or How Governance is Essential in the Hybrid Cl...
A Tale of Two IT Departments, or How Governance is Essential in the Hybrid Cl...
 
Akamai Offers Situational Approach to Addressing Challenges Raised by Complex...
Akamai Offers Situational Approach to Addressing Challenges Raised by Complex...Akamai Offers Situational Approach to Addressing Challenges Raised by Complex...
Akamai Offers Situational Approach to Addressing Challenges Raised by Complex...
 
A data powered future
A data powered futureA data powered future
A data powered future
 
Digital strategy a 5 point approach
Digital strategy   a 5 point approachDigital strategy   a 5 point approach
Digital strategy a 5 point approach
 
Mission Critical Use Cases Show How Analytics Architectures Usher in an Artif...
Mission Critical Use Cases Show How Analytics Architectures Usher in an Artif...Mission Critical Use Cases Show How Analytics Architectures Usher in an Artif...
Mission Critical Use Cases Show How Analytics Architectures Usher in an Artif...
 
Work from Anywhere: The Secret to Unlocking Once-Hidden Productivity and Crea...
Work from Anywhere: The Secret to Unlocking Once-Hidden Productivity and Crea...Work from Anywhere: The Secret to Unlocking Once-Hidden Productivity and Crea...
Work from Anywhere: The Secret to Unlocking Once-Hidden Productivity and Crea...
 

Último

Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessPixlogix Infotech
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 

Último (20)

Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 

Enterprise Mobile Management Demands Rethinking Work and Productivity

  • 1. Enterprise Mobile and Client Management Demands a Rethinking of Work, Play and Productivity, Says Dell Executive Transcript of a Briefings Direct podcast on the new landscape sculpted by the increasing use of mobile and BYOD and how Dell is helping companies navigate that terrain. Listen to the podcast. Find it on iTunes. Sponsor: Dell Software Dana Gardner: Hi, this is Dana Gardner, Principal Analyst at Interarbor Solutions, and you’re listening to BriefingsDirect. Today, we present a sponsored podcast discussion on how the recent and rapid evolution of mobile and client management requirements and approaches have caused considerable complexity and confusion. We’ll examine how the incomplete solutions and a lack of a clear pan-client strategy have hampered that move to broader mobile support at enterprises and mid-market companies alike. The state of muddled direction has put IT in a bind, while frustrating users who are eager to gain greater productivity, flexibility in their work habits, and device choice. To share his insights on how to better prepare for a mobile-enablement future that quickly complements other IT imperatives such as cloud, big data, and even more efficient data centers, we’re pleased to welcome our special guest Tom Kendra, Vice President and General Manager, Systems Management at Dell Software. Welcome, Tom. How are you? Tom Kendra: Hey, Dana. I am doing very well, and with that intro, it sounds like you’ve pretty much got the answers, my friend. Gardner: Well, we have the questions, Tom. The answers are what people are looking for. Kendra: I think that you’ve laid it out quite well in your opening comments. There is an enormous amount of conversation in this area and it’s moving very, very rapidly. Similar to many of your listeners, I imagine, the number of invitations we get to attend a conference on mobility or bring your own device (BYOD), is off the charts. Every day my inbox is filled with new invites. So there’s a lot of conversation around it. Part of that, Dana, is around the fact that this is an evolving space. There are a lot of moving parts, and hopefully, in the next few minutes, we’ll be able to dive into some of those.
  • 2. Gardner: I suppose, Tom, looking at this from a historical perspective, people have been dealing with a fast-moving client environment for decades. Things have changed rapidly with the client. We went through the Web transition and client-server. We’ve seen all kinds of different ways of getting apps to devices. It’s always been a fast-moving target. I wonder, from your perspective, what’s different about the mobile and BYOD challenges today? I suppose it’s more of a change, rather than just a gradual shift. Speed and agility Kendra: Our industry is characterized by speed and agility. Right now, the big drivers causing the acceleration can be put into three categories: the amount and type of data that’s available, all the different ways and devices for accessing this data, as well as the evolving preferences and policies for dictating who, what, and how data is shared. For example, training videos, charts and graphs versus just text, and the ability to combine these assets and deliver them in a way that allows a front-line salesperson, a service desk staffer or anyone else in the corporate ecosystem to satisfy customer requests much more efficiently and rapidly. The second area is the number of devices we need to support. You touched on this earlier. In yesterday’s world -- and yesterday was a very short time ago -- mobility was all around the PC. Then, it was around a corporate-issued device, most likely a business phone. Now, all of a sudden, there are many, many, many more devices that corporations are issuing as well as devices people are bringing into their work environment at a rapid pace. We’ve moved from laptops to smartphones that were corporate issued to tablets. Soon, we’ll get more and more wearables in the environment and machine-to-machine communications will become more prevalent. All of these essentially create unprecedented opportunities, yet also complicate the problem. The third area that’s driving change at a much higher velocity is the ever-evolving attitude about work and work-life balance. And, along with that, privacy. Employees want to use what they’re comfortable using at work and they want to make sure their information and privacy rights are understood and protected. These three items are really driving the acceleration. Gardner: And the response to this complexity so far, Tom, has been some suite, some mobile device management (MDM) approaches, trying to have multiple paths to these devices and supporting multiple types of infrastructure behind that. Why have these not yet reached a point where enterprises are comfortable? Why have we not yet solved the problem of how to do this well? Kendra: When you think about all the different requirements, you realize there are many ways to achieve the objectives. You might postulate that, in certain industries, there are regulatory
  • 3. requirements that somewhat dictate a solution. So a lot of organizations in those industries move down one path. In industries where you don’t have quite the same regulatory environment, you might have more flexibility to choose yet another path. The range of available options is wide, and many organizations have experimented with numerous approaches. Now, we’ve gotten to the point where we have the unique opportunity, today and over the next couple of years, to think about how we consolidate these approaches into a more integrated, holistic mobility solution that elevates data security and mobile workforce productivity. None of them are inherently good or bad. They all serve a purpose. We have to ask, “How do I preserve the uniqueness of what those different approaches offer, while bringing together the similarities?” More efficient How can you take advantage of similarities, such as the definition of roles or which roles within the organization have access to what types of data. The commonalities may be contextual in the sense that I’m going to provide this kind of data access if you are in these kinds of locations on these kinds of devices. Those things we could probably pull together and manage in a more efficient way. But we still want to give companies the flexibility to determine what it means to support different form factors, which means you need to understand the characteristics of a wearable device versus a smartphone or an iPad. I also need to understand the different use cases that are most prevalent in my organization. If I’m a factory worker, for example, it may be better to have a wearable in the future, rather than a tablet. In the medical field, however, tablets are probably preferred over wearables because of the need to enter, modify and view electronic medical records. So there are different tradeoffs, and we want to be able to support all of them. Gardner: Looking again at the historical perspective, in the past when IT was faced with a complexity, too many moving parts, too many variables, they could walk in and say, “Here’s the solution. This is the box we’ve put around it. You have to use it this way. That may cause you some frustration, but it will solve the bigger problem.” And they could get away with that. Today, that’s really no longer the case. There’s shadow IT. There’s consumerization of IT. There are people using cloud services on their own volition without even going through any of the lines of business. It's right down to the individual user. How does IT now find a way to get some control, get the needed enterprise requirements met, but recognize that their ability to dictate terms is less than it used to be?
  • 4. Kendra: You’re bringing up a very big issue. Companies today are getting a lot of pressure from individuals bringing in their own technology. One of the case studies you and I have been following for many months is Green Clinic Health System, a physician-owned community healthcare organization in Louisiana. As you know, Jason Thomas, the CIO and IT Director, has been very open about discussing their progress -- and the many challenges -- encountered on their BYOD journey.  As part of Green Clinic’s goal to ensure excellent patient care, the 50 physicians started bringing in different technologies, including tablets and smartphones, and then asked IT to support them. This is a great example of what happens when major organizational stakeholders -- Green Clinic’s physicians, in this case -- make technology selections to deliver better service. With Green Clinic, this meant giving doctors and clinicians anytime, anywhere access to highly sensitive patient information on any Internet-connected device without compromising security or HIPAA compliance requirements.  In other kinds of businesses, similar selection processes are underway as line-of-business owners are coming forward to request that different employees or organizational groups have access to information from a multitude of devices. Now, IT has to figure out how to put the security in place to make sure corporate information is protected while still providing the flexibility for users to do their jobs using preferred devices. Shadow IT often emerges in scenarios where IT puts too many restrictions on device choice, which leads line-of-business owners and their constituents to seek workarounds. As we all know, this can open the door to all sorts of security risks. When we think about the Green Clinic example, you can see that Jason Thomas strives to be as flexible as possible in supporting preferred devices while taking all the necessary precautions to protect patient privacy and HIPAA regulations. Similar shift Gardner: When we think about how IT needs to approach this differently, perhaps embracing and extending what's going on, while also being mindful of those important compliance risk and governance issues, we’re seeing a similar shift from the vendors. I think there’s such a large opportunity in the market for mobile, for the data center, for the management of the data and the apps out to these devices, that we are seeing a rapid dashboard and virtualization in some cases. Vendor models are shifting, and we’re seeing acquisitions happening quite a bit. What's different this time from the vendor perspective? When you’re trying to bring a solution, I suppose, like IT, you don’t have the same ability to just plop down a product and say, “Here’s what you do. Here’s how you buy it.” Is this is something that’s closer to an ecosystem or solution type of approach?
  • 5. Kendra: An excellent point again. The types of solutions Dell is bringing to the market embrace what’s needed today while being flexible enough to accommodate future applications and evolving data access needs. The goal is to leverage customers’ existing investments in their current infrastructures and find ways to build and expand on those with foundational elements that can scale easily as needs dictate. You can imagine a scenario in which an IT shop is not going to have the resources, especially in the mid-market, to embrace multiple ways of managing, securing, granting access, or all of these things. The industry has to move from a position of providing a series of point solutions to guiding and leading with a strategy for pulling all these things together. Again, it comes down to giving companies a plan for the future that keeps pace with their emerging requirements, accommodates existing skill sets and grows with them as mobility becomes more ingrained in their ways of doing business. That’s the game -- and that’s the hard part. We were at MobileCON two months ago in San Jose and we spoke about how companies need to think through this as they move forward. There are a couple of important points we think need to be taken into consideration. First of all, it is not just a line-of-business, IT, legal, security, or HR discussion. It's getting all those teams together to think about their current and future requirements. These conversations are critical and they need to happen in context with what’s happening across the business while taking into account the intersections and correlations with the various stakeholders. Line of business has to step forward and say, “This is what I think allows me to drive customer value. This is what I think I need to do.” HR needs to think about it and have a say in giving employees what they need to achieve ideal work-life balance while ensuring that policies address the impact on current and future employees, contractors and consultants. And IT needs to say, “Here is how I have to leverage the investments we’re making.” That conversation has to happen, and it happens in some organizations at a much more rapid rate than others. Long-term affair Gardner: That’s why I think this is easily going to be a three- to five-year type of affair. Perhaps it will be longer, because we’re not just talking about plopping in a mobile device management capability. We’re really talking about rethinking processes, business models, productivity, and how you acquire working skills. We’re no longer just doing word processing instead of using typewriters. We’re not just repaving cow paths. We’re charting something quite new. And there is that interrelationship between the technology capabilities and the work. I think that’s something that hasn’t been thought out. Companies were perhaps thinking, “We'll just add
  • 6. mobile devices onto the roster of things that we support.” But that’s probably not enough. How does the vision from that aspect work, when you try to do both a technology shift and a business transformation? Kendra: You’ve hit again on a really important point. You used the term “plop in a MDM solution.” It's important to understand that the efforts and the initiatives that have taken place have all been really valuable. We’ve learned a lot. The issue is, as you are talking about, how to evolve this strategy and why. Equally important is having an understanding of the business transformation that takes place when you put all these elements together.—it’s much more far-reaching than simply “plopping” in a point solution for a particular aspect. In yesterday's world, I might have had the right or ability to wipe entire devices. Let’s look at the corporate-issued device scenario. The company owns the device and therefore owns the data that resides or is accessed on that device.  Wiping the device would be entirely within my domain or purview. But in a BYOD environment, I’m not going to be able to wipe a device. So, I have to think about things much differently than I did before. As companies evolve their own mobility strategies, it’s important to leverage their learnings, while remaining focused on enhancing their users’ experiences and not sacrificing them. That’s why some of the research we’ve done suggests there is a very high reconsideration rate in terms of people and their current mobility solutions. They’ve tried various approaches and point solutions and some worked out, but others have found these solutions lacking, which has caused gaps in usability, user adoption, manageability, etc. Our goal is to address and close those gaps. Gardner: Let's get a little bit more detailed about what needs to happen. It seems to me that containerization has come to the fore, a way of accessing different types of applications, acquiring those applications perhaps on the fly, rather than rolled out for the entire populace of the workforce over time. Tell us a little bit more about how you see this working better, moving toward a more supported, agile, business-friendly and user-productivity vision or future for mobility? Kendra: Giving users the ability to acquire applications on the fly is hugely important as users, based on their roles, need to have access to applications and data, and they need to have it served up in a very easy, user-friendly manner. The crucial considerations here are role-based, potentially even location based. Do I really want to allow the same kinds of access to information if I’m in a coffee house in China as I do if I am in my own office? Does data need to be resident on the device once I’m offline? Those are the kinds of considerations we need to think about.
  • 7. Seamless experience What’s needed to ensure a seamless offline experience is where the issue of containerization arises. There are capabilities that enable users to view and access information in a secure manner when they’re connected to an Internet-enabled device. But what happens when those same users are offline? Secure container-based workspaces allow me to take documents, data or other corporate information from that online experience and have it accessible whether I’m on a plane, in a tunnel or outside a wi-fi area. The container provides a protected place to store, view, manage and use that data. If I need to wipe it later on, I can just wipe the information stored in the container, not the entire device, which likely will have personal information and other unrelated data. With the secure digital workspace, it’s easy to restrict how corporate information is used, and policies can be readily established to govern which data can go outside the container or be used by other applications. The industry is clearing moving in this direction, and it’s critical that we make it across corporate applications. Gardner: If I hear you correctly, Tom, it sounds as if we’re going to be able to bring down the right container, for the right device, at the right time, for the right process and/or data or application activity. That’s putting more onus on the data center, but that’s probably a good thing. That gives IT the control that they want and need. It also seems to me that, when you have that flexibility on the device and you can manage sessions and roles and permissions, this can be a cost and productivity benefit to the operators of that data center. They can start to do better data management, dedupe, reduce their storage costs, and do backup and recovery with more of a holistic, agile or strategic approach. They can also meter out the resources they need to support these workloads with much greater efficiency, predict those workloads, and then react to them very swiftly. We’ve talked so far about all how difficult and tough this is. It sounds like if you crack this nut properly, not only do you get that benefit of the user experience and the mobility factor, but you can also do quite a bit of a good IT blocking and tackling on the backend. Am I reading that correctly or am I overstating that? Kendra: I think you’re absolutely on the money. Take us as individuals. You may have a corporate-issued laptop. You might have a corporate-issued phone. You also may have an iPad, a Dell tablet, or another type of tablet at home. For me, it’s important to know what Tom Kendra has access to across all of those devices in a very simple manner. I don’t want to set up a different approach based on each individual device. I want to set up a way of viewing my data, based on my role, permissions and work needs. Heretofore, it's been largely device-centric and management-centric, as opposed to user productivity role-centric.
  • 8. Holistic manner The Dell position -- and where we see the industry going -- is consolidating much of the management and security around those devices in a holistic manner, so I can focus on what the individual needs. In doing so, it’s much easier to serve the appropriate data access in a fairly seamless manner. This approach rings true with many of our customers who want to spend more resources on driving their businesses and facilitating increased user productivity and fewer resources on managing a myriad of multiple systems. Gardner: It also sounds that by bringing the point of management, the point of power, the point of control and enablement back into that data center, you’re also able to link up to your legacy assets much more easily than if you had to somehow retrofit those legacy assets out to a specific device platform or a device's format. Kendra: You’re hitting on the importance of flexibility. Earlier, we said the user experience is a major driver along with ensuring flexibility for both the employee and IT. Reducing risk exposure is another crucial driver and by taking a more holistic approach to mobility enablement, we can address policy enforcement based on roles across all those devices. Not only does this lower exposure to risk, it elevates data security since you’re addressing it from the user point of view instead of trying to sync up three or four different devices with multiple user profiles. Gardner: And if I am thinking at that data center level, it will give me choices on where and how I create that data center, where I locate it, how I produce it, and how I host it. It opens up a lot more opportunity for utilizing public types of cloud services or a combination that best suits my needs and that can shift and adapt over time. Kendra: It really does come down to freedom of choice, doesn’t it? The freedom to use whatever device in whichever data center combination that makes the most sense for the business is really what everyone is striving for. Many of Dell’s customers are moving toward environments where they are taking both on-premise and off-premise compute resources. They think about applications as, “I can serve them up from inside my company or I can serve them up from outside my company.” The issue comes down to the fact that I want to integrate wherever possible. I want to serve up the data and the applications when needed and how needed, and I want to make sure that I have the appropriate management and security controls over those things. Gardner: Okay, I think I have the vision much more clearly now. I expect we’re going to be hearing more from Dell Software on ways to execute toward that vision, but before we move on to some examples of how this works in practice, why Dell? What is it about Dell now that you think puts you in a position to deliver the means to accomplish this vision?
  • 9. Kendra: Dell has relationships with millions of customers around the world. We’re a very trusted brand, and companies are interested in what Dell has to say. People are interested in where Dell is going. If you think about the PC market, for example, Dell has about an 11.9 percent worldwide market share. There are hundreds and hundreds of millions of PCs used in the world today. I believe there were approximately 82 million PCs sold during the third quarter of 2013. The point here is that we have a natural entrée into this discussion and the discussion goes like this: Dell has been a trusted supplier of hardware and we’ve played an important role in helping you drive your business, increase productivity and enable your people to do more, which has produced some amazing business results. As you move into thinking about the management of additional capabilities around mobile, Dell has hardware and software that you should consider. Now, given that we’ve been a trusted supplier for a long time, when getting into the discussion of our world-class technology around hardware, software and services, most people are willing to listen. So we have a natural advantage for getting into the conversation. World-class technologies Once we’re in the conversation, we can highlight Dell’s world-class technologies, including end-user computing, servers, storage, networking, security, data protection, software, and services. As a trusted brand with world-class technologies and proven solutions, Dell is ideally suited to help bring together the devices and underlying security, encryption, and management technologies required to deliver a unified mobile enablement solution. We can pull it all together and deliver it to the mid-market probably better than anyone else. So the Dell advantages are numerous. In our announcements over the next few months, you’ll see how we’re bringing these capabilities together and making it easier for our customers to acquire and use them at a lower cost and faster time to value. Gardner: One of the things that I'd like to do, Tom, is not just to tell how things are, but to show. Do we have some examples of organizations -- you already mentioned one with the Green Clinic -- that have bitten the bullet and recognized the strategic approach, the flexibility on the client, leveraging containerization, retaining control and governance, risk, and compliance requirements through IT, but giving those end-users the power they want? What's it like when this actually works? Kendra: When it actually works, it's a beautiful thing. Let’s start there. We work with customers around the world and, as you can imagine, given people's desire for their own privacy, a lot of them don't want their names used. But we’re working with a major North American bank that has the problems that we have been discussing.
  • 10. They have 20,000-plus corporate-owned smartphones, growing to some 35,000 in the next year. They have more than a thousand iPads in place, growing rapidly. They have a desktop virtualization (VDI) solution, but the VDI solution, as we spoke about earlier, really doesn't support the offline experience that they need. They are trying to leverage an 850-person IT department that has worldwide responsibilities, all the things that we spoke about earlier. And they use technology from companies that haven’t evolved as quickly as they should have. So they're wondering whether those companies are going to be around in the future. This is the classic case of, “I have a lot of technology deployed. I need to move to a container solution to support both online and offline experiences, and my IT budget is being squeezed.” So how do you do this? It goes back to the things we talked about. First, I need to leverage what I have. Second, I need to pick solutions that can support multiple environments rather than a point solution for each environment. Third, I need to think about the future, and in this case, that entails a rapid explosion of mobile devices. I need to mobilize rapidly without compromising security or the user experience. The concept of an integrated suite of policy and management capabilities is going to be extremely important to my organization going forward. Mobile wave This reminds me of some information we reviewed from a Lopez Research report. In their “Mobile Management: A Foundation for the New Mobile Ecosystem,” Maribel Lopez shared that more than half the firms interviewed as part of custom CIO research plan to mobile-enable business apps and processes. The mobile wave is coming and it’s coming fast. This large financial institution fits that profile. They're moving rapidly. They’re thinking about how to give greater access to applications and data and they need streamlined ways to accomplish that. It’s a typical customer scenario that we are seeing these days. Gardner: Tom, who gets to do this faster, better, cheaper? The large enterprise that's dragging a long legacy and has a thousand IT people to either help them or hinder them or the mid-size organization that can look to a myriad of sourcing options and wants to get out of the data center or facilities business? Is there some sort of a natural advantage, in some way -- a leapfrog type of an effect -- for those mid-market organizations with this? Kendra: The mid-market has the advantage of not having giant deployments and huge teams, which gives them a certain advantage in being able to move fast and nimbly. On the flip side, the mid-market organization often is resource constrained in terms of budget and skills. Let’s face it, a 10-person IT shop will likely have deep skills in certain areas, but they have to have more generalized experiences.
  • 11. For them, finding solutions that address multiple problems quickly is an absolute imperative, so they can rollout simple solutions while maximizing economies of scale to the fullest extent. That’s not to say that large enterprises don’t have similar priorities, but they often have complex legacy issues that exacerbate their issues. Dell is equally adept at helping those organizations work through those issues and devise a plan for what to move, when and how without losing sight of longer-term plans and business directions. There are advantages and disadvantages with each. Both need agile solutions and want to leverage their resources to the fullest extent. Both are striving to lower costs and eliminate risks. Both groups are interested in very much the same things but often take different approaches to achieving those goals. Gardner: It certainly sounds as if Dell is approaching this enterprise mobility manager market with an aggressive perspective, recognizing a big opportunity in the market and an opportunity that they are uniquely positioned to go at. There’s not too much emphasis on the client alone and not just emphasis on the data center. It really needs to be a bridging type of a value-add these days. Can you tease us a little bit about some upcoming news? What should we expect next? Kendra: The solutions we announced in April essentially laid out our vision of Dell’s evolving mobility strategies. We talked about the need to consolidate mobility management systems and streamline enablement. We focused on the importance of leveraging world-class security, including secure remote access and encryption. And the market has responded well to Dell's point of view. As we move forward, we have the opportunity to get much more prescriptive in describing our unified approach that consolidates the capabilities organizations need to ensure secure control over their corporate data while still ensuring an excellent user experience. You’ll see more from us detailing how those integrated solutions come together to deliver fast time to value. You'll also see different delivery vehicles, giving our customers the flexibility to choose from on premise, software-as-a-service (SaaS) based or cloud-based approaches. You'll see additional device support, and you'll see containerization. Leverage advantages We plan to leverage our advantages, our best-in-class capabilities around security, encryption, device management; this common functionality approach. We plan to leverage all of that in upcoming announcements. As we take the analyst community through our end-to-end mobile/BYOD enablement plans, we’ve gotten high marks for our approach and direction. Our discussions involving Dell’s broad OS support, embedded security, unified management and proven customer relationship all have been well received.
  • 12. Our next step is to make sure that, as we announce and deliver in the coming months, customers absolutely understand what we have and where we're going. We think they're going be very excited about it. We think we're in the sweet spot of the mid-market and the upper mid-market in terms of what solutions they need to ease their mobile enablement objectives. We also believe we can provide a unique point-of-view and compelling technology roadmaps for those very large customers who may have a longer journey in their deployments or rollout. We're very excited about what we're doing. The specifics of what we're doing play out in early December, January, and beyond. You'll see a rolling thunder of announcements from Dell, much like we did in April. We’ll lay out the solutions. We’ll talk about how these products come together and we’ll deliver. Gardner: Very good. I’m afraid we'll have to leave it there. You have been listening to a sponsored BriefingsDirect podcast discussion on how the recent rapid evolution of mobile and client management requirements and approaches have caused complexity and confusion, but we have now heard Dell's vision for how mobile enablement should be able to quickly complement other IT imperatives and allow for the IT department do what it does best and for end-users to innovate and do what they do best as well. So a big thank you to our guest, Tom Kendra, Vice President and General Manager Systems Management at Dell Software. Thanks so much, Tom. Kendra: Thank you, Dana. Gardner: And also a big thank you to our audience for joining this insightful discussion. This is Dana Gardner, Principal Analyst at Interarbor Solutions, thanks again for listening, and come back next time. Listen to the podcast. Find it on iTunes. Sponsor: Dell Software Transcript of a Briefings Direct podcast on the new landscape sculpted by the increasing use of mobile and BYOD and how Dell is helping companies navigate that terrain. Copyright Interarbor Solutions, LLC, 2005-2013. All rights reserved. You may also be interested in: • • • • BI and Big Data Analytics Force an Overdue Reckoning Between IT and Business Interests BYOD Trend Brings New Security Challenges for IT: Allowing Greater Access While Protecting Networks Dell updates virtualization suite, makes VMware support a priority Want a Data-Driven Culture? Start Sorting Out the BI and Big Data Myths Now
  • 13. • • • Data complexity forces need for agnostic tool chain approach for information management, says Dell Software executive Dell's Foglight for Virtualization update extends visibility and management control across more infrastructure For Dell's Quest Software, BYOD Puts Users First and with IT's Blessing