Transcript of a BriefingsDirect podcast on how Quest, a Dell company, leverages BYOD and VDI to improve user productivity, application support, and security.
Transcript of a BriefingsDirect podcast on how a major law firm has adopted desktop virtualization and BYOD to give employees more choices and flexibility.
How Unisys and Microsoft Team Up To Ease Complex Cloud Adoption For Governmen...Dana Gardner
A discussion how public and private sector IT organizations can ease cloud adoption using cloud-native apps, services modernization, automation, and embedded best practices.
The UNIX Evolution: An Innovative History reaches a 20-Year MilestoneDana Gardner
Transcript of a sponsored discussion on how UNIX has evolved in the 20-year history of UNIX and the role of The Open Group in maintaining and updating the standard.
How Big Data Generates New Insights into What’s Happening in Tropical Ecosyst...Dana Gardner
This document summarizes a podcast discussion about how the TEAM Network at Conservation International is using big data analytics to study biodiversity in tropical rainforests. The TEAM Network collects sensor and camera trap data from protected areas worldwide and analyzes the data using Bayesian models on HP Vertica to monitor species populations and detect trends. Their end-to-end system brings field data into a central repository for analysis and shares results through a dashboard. They are working to expand monitoring to more countries and species using cloud deployment and advanced analytics that leverage hardware processing power.
The document discusses how Loyola Marymount University is transforming its IT department in response to emerging technologies. It addresses how consumerization, cloud computing, outsourcing, and social media are replacing traditional IT infrastructure, functions, and communication. The university embraces these replacement technologies by developing strategies for a service catalog, cloud storage, virtualization, social CRM, and collaboration technologies. It focuses on improving communications and empowering users through social IT initiatives. The transformation aims to better meet user needs and compete with consumer technology options.
Transcript of a BriefingsDirect podcast on how a major law firm has adopted desktop virtualization and BYOD to give employees more choices and flexibility.
How Unisys and Microsoft Team Up To Ease Complex Cloud Adoption For Governmen...Dana Gardner
A discussion how public and private sector IT organizations can ease cloud adoption using cloud-native apps, services modernization, automation, and embedded best practices.
The UNIX Evolution: An Innovative History reaches a 20-Year MilestoneDana Gardner
Transcript of a sponsored discussion on how UNIX has evolved in the 20-year history of UNIX and the role of The Open Group in maintaining and updating the standard.
How Big Data Generates New Insights into What’s Happening in Tropical Ecosyst...Dana Gardner
This document summarizes a podcast discussion about how the TEAM Network at Conservation International is using big data analytics to study biodiversity in tropical rainforests. The TEAM Network collects sensor and camera trap data from protected areas worldwide and analyzes the data using Bayesian models on HP Vertica to monitor species populations and detect trends. Their end-to-end system brings field data into a central repository for analysis and shares results through a dashboard. They are working to expand monitoring to more countries and species using cloud deployment and advanced analytics that leverage hardware processing power.
The document discusses how Loyola Marymount University is transforming its IT department in response to emerging technologies. It addresses how consumerization, cloud computing, outsourcing, and social media are replacing traditional IT infrastructure, functions, and communication. The university embraces these replacement technologies by developing strategies for a service catalog, cloud storage, virtualization, social CRM, and collaboration technologies. It focuses on improving communications and empowering users through social IT initiatives. The transformation aims to better meet user needs and compete with consumer technology options.
Slides from my keynote this afternoon in Paris at the Enterprise 2.0 SUMMIT. Overview of where social business is, what the macro trends are, and the story about consumerization, big data, analytics, and much more.
Internet of Things Brings On Development Demands That DevOps Manages, Say Exp...Dana Gardner
Transcript of a BriefingsDirect discussion on how continuous processes around development and deployment of applications impact and benefit the Internet of Things trend.
How HTC Centralizes Storage Management to Gain Visibility, Reduce Costs and I...Dana Gardner
Transcript of a Briefings Direct podcast on why bringing a common management view in to play improves problem resolution and automates resource allocation more fully.
DevOps and Security, a Match Made in HeavenDana Gardner
Transcript of a Briefings Direct discussion on the relationship between DevOps and security and exploring the impact of security on compliance, risk, and auditing.
Enterprise 2.0 involves bringing Web 2.0 principles into businesses by enhancing enterprise applications and processes with social software, user participation, and service orientation. It aims to improve user experience, harness collective intelligence, and increase flexibility through techniques like social tagging, user authorship, and signaling updates. However, fully realizing Enterprise 2.0 also requires cultural changes in management and a shift to more bottom-up, outside-in thinking.
Clouds of connection sept2011 acm aitpPeter Coffee
This document provides a summary of key trends and developments in information technology based on research from various organizations. It discusses emerging technologies like silicon photonics, memristors, and metamaterials that could enable faster and more energy efficient computing. It also covers trends toward more formally verified and permission-based operating systems for improved security. Large-scale data analysis and improved algorithms are allowing organizations to gain new insights. Social networking usage is surpassing email and mobile apps are being used more than web browsers. This represents a shift to a more social and mobile era of computing.
How INOVVO Delivers Analysis that Leads to Greater User Retention and Loyalty...Dana Gardner
Transcript of a sponsored discussion on how advanced analytics drawing on multiple data sources provides wireless operators improved interactions with their subscribers and enhances customer experience through personalized insights.
Presentation given by Dion Hinchcliffe at Enterprise 2.0 San Francisco 2009. Focused on climbing the maturity curve of process and methods for enterprise social computing.
How can social media and collaborative technology increase productivity, improve decision-making and strengthen business teams? Introductory presentation by Tom Purves, Enterprise 2.0, Nov 7, 2006
This document provides case studies and information from Prescient Digital, a company that specializes in intranet strategy, design, and implementation. It includes case studies of intranets developed for Unisys, IBM, BT, Cisco, and summaries of their approaches, technologies used, and business outcomes. Key lessons highlighted include the importance of executive support, funding, planning, change management, and starting with a few initial steps to drive adoption of new intranet tools and behaviors.
Internal presentation for the Enterprise 2.0 Observatory (October 2007). Topics: Enterprise 2.0, Open Innovation, Mobility, Crowdsourcing, Social Network, and more...
DevOps by Design -- Practical Guide to Effectively Ushering DevOps into Any O...Dana Gardner
Transcript of a Briefings Direct discussion on some powerful best practices on making DevOps an accelerant to broader business goals, but at the level of a multigenerational IT activity.
Big Data and Content Management. SkyDox and the European Court of Human Righ...SkyDox LTD
SkyDox Business Development Director, Josh Gilbertson & Head of IT at the ECHR John Hunter, discuss how SkyDox cloud-enabled file collaboration platform has improved the content management at the ECHR at Info360 in New York.
The Role of Cloud Computing In Your Data Center StrategyVISIHOSTING
The document discusses cloud computing trends and options for moving an organization's data center to the cloud. It provides an overview of public versus private cloud, outlines factors to consider when evaluating a cloud migration, and presents a maturity model for data center services from basic colocation to fully outsourced cloud solutions. The key benefits of public cloud include scalability, pay-per-use pricing, and reduced costs, while private cloud offers dedicated resources and more control but requires capital investment and management overhead.
Creative Solutions in Healthcare Improves Client Services and Saves Money wit...Dana Gardner
Transcript of a Briefings Direct podcast on how a major healthcare provider is improving internal operations and patient care with a hybrid cloud model.
Tietos is mobilizing its workforce to improve information worker productivity and collaboration. This presentation is from the Digital Workplace & Social Collaboration Forum in Stockholm February 1-2 2012.
This document discusses the opportunities and considerations for using cloud computing in learning and development. It begins by defining cloud computing as a model that provides on-demand access to shared, configurable IT resources over the internet. The document then explores how cloud computing could impact L&D by enabling mobile, just-in-time learning and providing a richer, more personalized experience at a lower cost. However, the document also notes potential threats like data security and loss of control. It concludes by providing tips for developing a successful cloud-based L&D strategy.
We looked at the data. Here’s a breakdown of some key statistics about the nation’s incoming presidents’ addresses, how long they spoke, how well, and more.
The document discusses how startup entrepreneurs think and operate. It notes that startups like Airbnb and Uber were started due to identifying shortages or problems. It emphasizes that startups focus on providing customer benefit, eliminating waste, and creating value. It also highlights that startups operate with speed, embracing failure fast and pivoting quickly, with transparency and by breaking rules. Startups succeed by moving rapidly, with minimal processes and instead prioritizing speed above all else.
Slides from my keynote this afternoon in Paris at the Enterprise 2.0 SUMMIT. Overview of where social business is, what the macro trends are, and the story about consumerization, big data, analytics, and much more.
Internet of Things Brings On Development Demands That DevOps Manages, Say Exp...Dana Gardner
Transcript of a BriefingsDirect discussion on how continuous processes around development and deployment of applications impact and benefit the Internet of Things trend.
How HTC Centralizes Storage Management to Gain Visibility, Reduce Costs and I...Dana Gardner
Transcript of a Briefings Direct podcast on why bringing a common management view in to play improves problem resolution and automates resource allocation more fully.
DevOps and Security, a Match Made in HeavenDana Gardner
Transcript of a Briefings Direct discussion on the relationship between DevOps and security and exploring the impact of security on compliance, risk, and auditing.
Enterprise 2.0 involves bringing Web 2.0 principles into businesses by enhancing enterprise applications and processes with social software, user participation, and service orientation. It aims to improve user experience, harness collective intelligence, and increase flexibility through techniques like social tagging, user authorship, and signaling updates. However, fully realizing Enterprise 2.0 also requires cultural changes in management and a shift to more bottom-up, outside-in thinking.
Clouds of connection sept2011 acm aitpPeter Coffee
This document provides a summary of key trends and developments in information technology based on research from various organizations. It discusses emerging technologies like silicon photonics, memristors, and metamaterials that could enable faster and more energy efficient computing. It also covers trends toward more formally verified and permission-based operating systems for improved security. Large-scale data analysis and improved algorithms are allowing organizations to gain new insights. Social networking usage is surpassing email and mobile apps are being used more than web browsers. This represents a shift to a more social and mobile era of computing.
How INOVVO Delivers Analysis that Leads to Greater User Retention and Loyalty...Dana Gardner
Transcript of a sponsored discussion on how advanced analytics drawing on multiple data sources provides wireless operators improved interactions with their subscribers and enhances customer experience through personalized insights.
Presentation given by Dion Hinchcliffe at Enterprise 2.0 San Francisco 2009. Focused on climbing the maturity curve of process and methods for enterprise social computing.
How can social media and collaborative technology increase productivity, improve decision-making and strengthen business teams? Introductory presentation by Tom Purves, Enterprise 2.0, Nov 7, 2006
This document provides case studies and information from Prescient Digital, a company that specializes in intranet strategy, design, and implementation. It includes case studies of intranets developed for Unisys, IBM, BT, Cisco, and summaries of their approaches, technologies used, and business outcomes. Key lessons highlighted include the importance of executive support, funding, planning, change management, and starting with a few initial steps to drive adoption of new intranet tools and behaviors.
Internal presentation for the Enterprise 2.0 Observatory (October 2007). Topics: Enterprise 2.0, Open Innovation, Mobility, Crowdsourcing, Social Network, and more...
DevOps by Design -- Practical Guide to Effectively Ushering DevOps into Any O...Dana Gardner
Transcript of a Briefings Direct discussion on some powerful best practices on making DevOps an accelerant to broader business goals, but at the level of a multigenerational IT activity.
Big Data and Content Management. SkyDox and the European Court of Human Righ...SkyDox LTD
SkyDox Business Development Director, Josh Gilbertson & Head of IT at the ECHR John Hunter, discuss how SkyDox cloud-enabled file collaboration platform has improved the content management at the ECHR at Info360 in New York.
The Role of Cloud Computing In Your Data Center StrategyVISIHOSTING
The document discusses cloud computing trends and options for moving an organization's data center to the cloud. It provides an overview of public versus private cloud, outlines factors to consider when evaluating a cloud migration, and presents a maturity model for data center services from basic colocation to fully outsourced cloud solutions. The key benefits of public cloud include scalability, pay-per-use pricing, and reduced costs, while private cloud offers dedicated resources and more control but requires capital investment and management overhead.
Creative Solutions in Healthcare Improves Client Services and Saves Money wit...Dana Gardner
Transcript of a Briefings Direct podcast on how a major healthcare provider is improving internal operations and patient care with a hybrid cloud model.
Tietos is mobilizing its workforce to improve information worker productivity and collaboration. This presentation is from the Digital Workplace & Social Collaboration Forum in Stockholm February 1-2 2012.
This document discusses the opportunities and considerations for using cloud computing in learning and development. It begins by defining cloud computing as a model that provides on-demand access to shared, configurable IT resources over the internet. The document then explores how cloud computing could impact L&D by enabling mobile, just-in-time learning and providing a richer, more personalized experience at a lower cost. However, the document also notes potential threats like data security and loss of control. It concludes by providing tips for developing a successful cloud-based L&D strategy.
We looked at the data. Here’s a breakdown of some key statistics about the nation’s incoming presidents’ addresses, how long they spoke, how well, and more.
The document discusses how startup entrepreneurs think and operate. It notes that startups like Airbnb and Uber were started due to identifying shortages or problems. It emphasizes that startups focus on providing customer benefit, eliminating waste, and creating value. It also highlights that startups operate with speed, embracing failure fast and pivoting quickly, with transparency and by breaking rules. Startups succeed by moving rapidly, with minimal processes and instead prioritizing speed above all else.
32 Ways a Digital Marketing Consultant Can Help Grow Your BusinessBarry Feldman
How can a digital marketing consultant help your business? In this resource we'll count the ways. 24 additional marketing resources are bundled for free.
This document discusses how emojis, emoticons, and text speak can be used to teach students. It provides background on the origins of emoticons in 1982 as ways to convey tone and feelings in text communications. It then suggests that with text speak and emojis, students can translate, decode, summarize, play with language, and add emotion to language. A number of websites and apps that can be used for emoji-related activities, lessons, and discussions are also listed.
Artificial intelligence (AI) is everywhere, promising self-driving cars, medical breakthroughs, and new ways of working. But how do you separate hype from reality? How can your company apply AI to solve real business problems?
Here’s what AI learnings your business should keep in mind for 2017.
Study: The Future of VR, AR and Self-Driving CarsLinkedIn
We asked LinkedIn members worldwide about their levels of interest in the latest wave of technology: whether they’re using wearables, and whether they intend to buy self-driving cars and VR headsets as they become available. We asked them too about their attitudes to technology and to the growing role of Artificial Intelligence (AI) in the devices that they use. The answers were fascinating – and in many cases, surprising.
This SlideShare explores the full results of this study, including detailed market-by-market breakdowns of intention levels for each technology – and how attitudes change with age, location and seniority level. If you’re marketing a tech brand – or planning to use VR and wearables to reach a professional audience – then these are insights you won’t want to miss.
Growing BYOD Trend Brings New Security Challenges for IT in Allowing Greater ...Dana Gardner
Transcript of a BriefingsDirect podcast on how Dell Software is helping to bring standardized and flexible approaches to making BYOD a positive new force to enterprise productivity.
New Managed Paths to Private Cloud Deployments Allow for Swifter Adoption at ...Dana Gardner
The document discusses new approaches to private cloud deployments that allow for faster adoption at lower risk. It highlights that effective management is essential for productive cloud computing adoption. Business service automation (BSA) capabilities must bring together previously separate forms of management to mutually support public, private, and hybrid cloud approaches. The podcast guests from HP Software & Solutions discuss how increased automation and proven reference models for cloud management can help enterprises progress toward cloud benefits more quickly and at lower cost. They emphasize the importance of standardized platforms, automation, and preconfigured applications and templates provided by recent acquisitions like Stratavia.
Enterprise Mobile and Client Management Demands a Rethinking of Work, Play an...Dana Gardner
Transcript of a Briefings Direct podcast on the new landscape sculpted by the increasing use of mobile and BYOD and how Dell is helping companies navigate that terrain.
The State of Mobile Security and How Identity Advancement Plays an Essential ...Dana Gardner
Transcript of a BriefingsDirect podcast on establishing identity and authentication in the face of a growing reliance on mobile devices in the enterprise.
A BYOC program enables the use of employee-owned smartphones, tablets, and laptops for business use. The growing popularity and use of personal devices, such as the iPad, is challenging IT to develop a position on their use in the workplace.
This storyboard explores:
•The objectives for a successful BYOC deployment: reducing cost and complexity of desktop management; improving agility and accessibility; and ensuring that security is not sacrificed in achieving those goals.
•Building out the four pillars of capability to prepare your environment for BYOC: infrastructure, security, operations & support, and policy development.
•Refocusing efforts in the last mile by developing a clear communications strategy to manage expectations and prepare for change.
Success in BYOC can be achieved. Rather than just saying no, focus on how to drive positive, secure change in the desktop environment.
Transcript of a BriefingsDirect podcast on how a major telecom company has improved its IT performance to deliver better experiences and payoffs for its businesses and end users alike.
A Tale of Two IT Departments, or How Governance is Essential in the Hybrid Cl...Dana Gardner
Transcript of a Briefings Direct discussion on how two organizations have been improving their application’s performance via total performance monitoring and metrics.
How a Minnesota Law Firm Brings Mission Critical Security To Myriad Mobile De...Dana Gardner
Transcript of a discussion on how a Minnesota law firm puts the power of diverse mobility to widespread use and keeps confidential and regulated data under strict control.
App Stores -- They're Not Just for Consumers Any More, as More Enterprises Ad...Dana Gardner
This document summarizes a podcast discussion about how enterprise app stores are emerging as a way for businesses to manage mobile applications and devices. Some key points:
- Enterprise app stores can help businesses deal with the influx of mobile devices and applications by providing a self-service model for application delivery and management.
- They allow for centralized control over application access, updates, security and policy enforcement.
- Successful enterprise app stores will go beyond just distribution to also handle license management, automatic updates, and potentially economic metrics like cost tracking and chargebacks.
The Evolution of Data Center Infrastructure Has Now Ushered in The Era of Dat...Dana Gardner
A discussion on how intelligent data center designs and components are delivering what amounts to data centers-as-a-service to SMBs, enterprises, and public sector agencies.
Dark Side of Cloud Adoption: People and Organizations Unable to Adapt and Imp...Dana Gardner
Transcript of a discussion on how cloud adoption is not reaching its potential due to outdated behaviors and persistent dissonance between what businesses can do and will do with cloud model strengths.
Similar to For Dell’s Quest Software, BYOD Puts Users First with IT’s Blessing (20)
Digital Marketing Trends in 2024 | Guide for Staying AheadWask
https://www.wask.co/ebooks/digital-marketing-trends-in-2024
Feeling lost in the digital marketing whirlwind of 2024? Technology is changing, consumer habits are evolving, and staying ahead of the curve feels like a never-ending pursuit. This e-book is your compass. Dive into actionable insights to handle the complexities of modern marketing. From hyper-personalization to the power of user-generated content, learn how to build long-term relationships with your audience and unlock the secrets to success in the ever-shifting digital landscape.
5th LF Energy Power Grid Model Meet-up SlidesDanBrown980551
5th Power Grid Model Meet-up
It is with great pleasure that we extend to you an invitation to the 5th Power Grid Model Meet-up, scheduled for 6th June 2024. This event will adopt a hybrid format, allowing participants to join us either through an online Mircosoft Teams session or in person at TU/e located at Den Dolech 2, Eindhoven, Netherlands. The meet-up will be hosted by Eindhoven University of Technology (TU/e), a research university specializing in engineering science & technology.
Power Grid Model
The global energy transition is placing new and unprecedented demands on Distribution System Operators (DSOs). Alongside upgrades to grid capacity, processes such as digitization, capacity optimization, and congestion management are becoming vital for delivering reliable services.
Power Grid Model is an open source project from Linux Foundation Energy and provides a calculation engine that is increasingly essential for DSOs. It offers a standards-based foundation enabling real-time power systems analysis, simulations of electrical power grids, and sophisticated what-if analysis. In addition, it enables in-depth studies and analysis of the electrical power grid’s behavior and performance. This comprehensive model incorporates essential factors such as power generation capacity, electrical losses, voltage levels, power flows, and system stability.
Power Grid Model is currently being applied in a wide variety of use cases, including grid planning, expansion, reliability, and congestion studies. It can also help in analyzing the impact of renewable energy integration, assessing the effects of disturbances or faults, and developing strategies for grid control and optimization.
What to expect
For the upcoming meetup we are organizing, we have an exciting lineup of activities planned:
-Insightful presentations covering two practical applications of the Power Grid Model.
-An update on the latest advancements in Power Grid -Model technology during the first and second quarters of 2024.
-An interactive brainstorming session to discuss and propose new feature requests.
-An opportunity to connect with fellow Power Grid Model enthusiasts and users.
Your One-Stop Shop for Python Success: Top 10 US Python Development Providersakankshawande
Simplify your search for a reliable Python development partner! This list presents the top 10 trusted US providers offering comprehensive Python development services, ensuring your project's success from conception to completion.
Ivanti’s Patch Tuesday breakdown goes beyond patching your applications and brings you the intelligence and guidance needed to prioritize where to focus your attention first. Catch early analysis on our Ivanti blog, then join industry expert Chris Goettl for the Patch Tuesday Webinar Event. There we’ll do a deep dive into each of the bulletins and give guidance on the risks associated with the newly-identified vulnerabilities.
Monitoring and Managing Anomaly Detection on OpenShift.pdfTosin Akinosho
Monitoring and Managing Anomaly Detection on OpenShift
Overview
Dive into the world of anomaly detection on edge devices with our comprehensive hands-on tutorial. This SlideShare presentation will guide you through the entire process, from data collection and model training to edge deployment and real-time monitoring. Perfect for those looking to implement robust anomaly detection systems on resource-constrained IoT/edge devices.
Key Topics Covered
1. Introduction to Anomaly Detection
- Understand the fundamentals of anomaly detection and its importance in identifying unusual behavior or failures in systems.
2. Understanding Edge (IoT)
- Learn about edge computing and IoT, and how they enable real-time data processing and decision-making at the source.
3. What is ArgoCD?
- Discover ArgoCD, a declarative, GitOps continuous delivery tool for Kubernetes, and its role in deploying applications on edge devices.
4. Deployment Using ArgoCD for Edge Devices
- Step-by-step guide on deploying anomaly detection models on edge devices using ArgoCD.
5. Introduction to Apache Kafka and S3
- Explore Apache Kafka for real-time data streaming and Amazon S3 for scalable storage solutions.
6. Viewing Kafka Messages in the Data Lake
- Learn how to view and analyze Kafka messages stored in a data lake for better insights.
7. What is Prometheus?
- Get to know Prometheus, an open-source monitoring and alerting toolkit, and its application in monitoring edge devices.
8. Monitoring Application Metrics with Prometheus
- Detailed instructions on setting up Prometheus to monitor the performance and health of your anomaly detection system.
9. What is Camel K?
- Introduction to Camel K, a lightweight integration framework built on Apache Camel, designed for Kubernetes.
10. Configuring Camel K Integrations for Data Pipelines
- Learn how to configure Camel K for seamless data pipeline integrations in your anomaly detection workflow.
11. What is a Jupyter Notebook?
- Overview of Jupyter Notebooks, an open-source web application for creating and sharing documents with live code, equations, visualizations, and narrative text.
12. Jupyter Notebooks with Code Examples
- Hands-on examples and code snippets in Jupyter Notebooks to help you implement and test anomaly detection models.
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...Jeffrey Haguewood
Sidekick Solutions uses Bonterra Impact Management (fka Social Solutions Apricot) and automation solutions to integrate data for business workflows.
We believe integration and automation are essential to user experience and the promise of efficient work through technology. Automation is the critical ingredient to realizing that full vision. We develop integration products and services for Bonterra Case Management software to support the deployment of automations for a variety of use cases.
This video focuses on integration of Salesforce with Bonterra Impact Management.
Interested in deploying an integration with Salesforce for Bonterra Impact Management? Contact us at sales@sidekicksolutionsllc.com to discuss next steps.
Best 20 SEO Techniques To Improve Website Visibility In SERPPixlogix Infotech
Boost your website's visibility with proven SEO techniques! Our latest blog dives into essential strategies to enhance your online presence, increase traffic, and rank higher on search engines. From keyword optimization to quality content creation, learn how to make your site stand out in the crowded digital landscape. Discover actionable tips and expert insights to elevate your SEO game.
Dive into the realm of operating systems (OS) with Pravash Chandra Das, a seasoned Digital Forensic Analyst, as your guide. 🚀 This comprehensive presentation illuminates the core concepts, types, and evolution of OS, essential for understanding modern computing landscapes.
Beginning with the foundational definition, Das clarifies the pivotal role of OS as system software orchestrating hardware resources, software applications, and user interactions. Through succinct descriptions, he delineates the diverse types of OS, from single-user, single-task environments like early MS-DOS iterations, to multi-user, multi-tasking systems exemplified by modern Linux distributions.
Crucial components like the kernel and shell are dissected, highlighting their indispensable functions in resource management and user interface interaction. Das elucidates how the kernel acts as the central nervous system, orchestrating process scheduling, memory allocation, and device management. Meanwhile, the shell serves as the gateway for user commands, bridging the gap between human input and machine execution. 💻
The narrative then shifts to a captivating exploration of prominent desktop OSs, Windows, macOS, and Linux. Windows, with its globally ubiquitous presence and user-friendly interface, emerges as a cornerstone in personal computing history. macOS, lauded for its sleek design and seamless integration with Apple's ecosystem, stands as a beacon of stability and creativity. Linux, an open-source marvel, offers unparalleled flexibility and security, revolutionizing the computing landscape. 🖥️
Moving to the realm of mobile devices, Das unravels the dominance of Android and iOS. Android's open-source ethos fosters a vibrant ecosystem of customization and innovation, while iOS boasts a seamless user experience and robust security infrastructure. Meanwhile, discontinued platforms like Symbian and Palm OS evoke nostalgia for their pioneering roles in the smartphone revolution.
The journey concludes with a reflection on the ever-evolving landscape of OS, underscored by the emergence of real-time operating systems (RTOS) and the persistent quest for innovation and efficiency. As technology continues to shape our world, understanding the foundations and evolution of operating systems remains paramount. Join Pravash Chandra Das on this illuminating journey through the heart of computing. 🌟
Have you ever been confused by the myriad of choices offered by AWS for hosting a website or an API?
Lambda, Elastic Beanstalk, Lightsail, Amplify, S3 (and more!) can each host websites + APIs. But which one should we choose?
Which one is cheapest? Which one is fastest? Which one will scale to meet our needs?
Join me in this session as we dive into each AWS hosting service to determine which one is best for your scenario and explain why!
Programming Foundation Models with DSPy - Meetup SlidesZilliz
Prompting language models is hard, while programming language models is easy. In this talk, I will discuss the state-of-the-art framework DSPy for programming foundation models with its powerful optimizers and runtime constraint system.
GraphRAG for Life Science to increase LLM accuracyTomaz Bratanic
GraphRAG for life science domain, where you retriever information from biomedical knowledge graphs using LLMs to increase the accuracy and performance of generated answers
Generating privacy-protected synthetic data using Secludy and MilvusZilliz
During this demo, the founders of Secludy will demonstrate how their system utilizes Milvus to store and manipulate embeddings for generating privacy-protected synthetic data. Their approach not only maintains the confidentiality of the original data but also enhances the utility and scalability of LLMs under privacy constraints. Attendees, including machine learning engineers, data scientists, and data managers, will witness first-hand how Secludy's integration with Milvus empowers organizations to harness the power of LLMs securely and efficiently.
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slackshyamraj55
Discover the seamless integration of RPA (Robotic Process Automation), COMPOSER, and APM with AWS IDP enhanced with Slack notifications. Explore how these technologies converge to streamline workflows, optimize performance, and ensure secure access, all while leveraging the power of AWS IDP and real-time communication via Slack notifications.
Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...Tatiana Kojar
Skybuffer AI, built on the robust SAP Business Technology Platform (SAP BTP), is the latest and most advanced version of our AI development, reaffirming our commitment to delivering top-tier AI solutions. Skybuffer AI harnesses all the innovative capabilities of the SAP BTP in the AI domain, from Conversational AI to cutting-edge Generative AI and Retrieval-Augmented Generation (RAG). It also helps SAP customers safeguard their investments into SAP Conversational AI and ensure a seamless, one-click transition to SAP Business AI.
With Skybuffer AI, various AI models can be integrated into a single communication channel such as Microsoft Teams. This integration empowers business users with insights drawn from SAP backend systems, enterprise documents, and the expansive knowledge of Generative AI. And the best part of it is that it is all managed through our intuitive no-code Action Server interface, requiring no extensive coding knowledge and making the advanced AI accessible to more users.
Energy Efficient Video Encoding for Cloud and Edge Computing Instances
For Dell’s Quest Software, BYOD Puts Users First with IT’s Blessing
1. For Dell’s Quest Software, BYOD Puts Users First with IT’s
Blessing
Transcript of a BriefingsDirect podcast on how Quest, a Dell company, leverages BYOD and
VDI to improve user productivity, application support, and security.
Listen to the podcast. Find it on iTunes. Sponsor: Quest Software
Dana Gardner: Hi, this is Dana Gardner, Principal Analyst at Interarbor Solutions, and you're
listening to BriefingsDirect.
Today, we present a sponsored podcast discussion on the growing acceptance of
bring your own device (BYOD) at enterprises. We will examine why the users’
personal use, ownership and maintenance of the computing and mobile devices of
their choosing is making more sense for more organizations. We'll learn about
how and why through the example of a company that has begun supporting
BYOD, even with the full blessing of IT.
We'll see how this has had benefits far beyond just the users’ sense of empowerment, in terms of
meaningful IT advancements along the lines of centralized applications, control and support,
virtual desktop infrastructure (VDI) use, better disaster recovery (DR) practices, even better data
protection and more. [Disclosure: Quest Software is a sponsor of BriefingsDirect podcasts.]
Here to share insights into how BYOD can work well at Quest Software, and even into their new
corporate owner Dell, we are joined by Carol Fawcett, the CIO of Dell Software and the former
long-term CIO of Quest Software. Welcome, Carol.
Carol Fawcett: Thank you, Dana.
Gardner: Good to have you with us. I'm really intrigued with this BYOD thing. Just a year or
two ago, people were saying, "What?" and scratching their heads, saying, "Are you kidding?
You're going to let your users choose their device?" But as this has been put into place and some
of the implications have been thought through, it seems to be an interesting possible benefit set.
So let me start with where you began. What were the challenges, or what were the forces or
trends at work, that got you at Dell Software involved with BYOD at all?
Fawcett: Great question, Dana. I don’t think that we actually started down the path of a BYOD
project, because as many listening will know, this started years ago. We started a project where
we said we wanted to enable our users to access applications and data on a select set of devices,
which for us started with the obvious, the iPad. Then came the Android smartphones, and the list
continued on.
2. This list will continue to grow as time goes on and new devices are brought in. The good news is
that there are product offerings now in the marketplace that are helping with that
demand and helping IT departments everywhere.
So instead of looking at it as BYOD, it’s now turned into a BYOX phenomena
that the C-level started. And as everyone in an organization saw them bringing
different devices into meetings, of course, they all wanted to jump on the
bandwagon. Slowly but surely, the wave began, and that's how we got where we
are today.
Gardner: This is interesting. There is a sort of direction from the user side, which is to say, they
probably like the choice and they had some personal preferences, or they've been able to be
productive in their personal lives using certain technologies.
Then there has also been this direction from the enterprise, which is to say, they like the idea of
centralizing, controlling apps and data, and delivering those out to devices (like with VDI) can be
a way of encouraging this control. It’s almost like a confluence of two forces -- VDI and BYOD
-- that make a whole greater than the sum of the parts, and we don’t see that very often in IT.
Pull it together
Fawcett: It’s one where you have to pull the needs and the demands of an IT organization
together with what the users want to go to, and that’s just what we're seeing out everywhere in
the industry. You definitely have to pull it together, try to satisfy the IT governance and the
policies that we set up, and balance that against what the users are saying: "I have to have this in
order to get my job done."
Gardner: As we learn more about how you've done this there, let’s also explain to our listeners
that Dell recently acquired Quest Software, and you were at Quest before that. So tell me a little
bit about how the confluence of these two companies also comes to bear on this issue of BYOD?
Fawcett: Absolutely. Let’s start with Quest Software. Where our sweet spot was, and still is, was
that we are the IT management software provider that offers a broad selection of software
solutions to simplify and solve the most common and most challenging IT problems for all areas
of an IT environment, from infrastructure, to applications, front-end to back-end, physical or
virtual, or even out in the cloud, for that matter.
Dell was looking for a company whose tools could and would complement and expand their own
software product offerings in the four strategic areas that they were focused on, which Quest
obviously aligned with. Those were systems management, security, business intelligence (BI)
and applications.
So you can really see why the partnership between Quest and Dell is such a great partnership and
offers so much to the industry.
3. Gardner: Let’s go back to how this came about and learn some lessons from your example, sort
of a use case perspective. If I were a CIO at another firm and I wanted to learn something from
your experience about moving to the support of multiple devices, what’s something that you
might offer in terms of what to think about early on, or some 20/20 hindsight insights that you
have?
Fawcett: As you approach the subject you have to really level-set with the team that this is not
about devices that an individual will want to use, but instead it's about individuals that are using
different devices accessing a set of applications inside your data center or under your control.
This individual, obviously, should have only one set of access rights across all the environments,
based on what that person's role is within the company. The different devices that they use should
really be an afterthought. Regardless of the device, their access rights need to remain consistent.
If I'm on a desktop, a laptop, or I bring in a tablet, or if I'm using my phone to get email, it
shouldn't matter. I should have that same, consistent UI and the same, consistent security rights
to get where I need to go to do my job.
Don't get me wrong -- and we know this; we hear it at every conference we go to -- IT will
struggle with the management of the many devices, no doubt. The only thing I can really suggest
there is something we did.
Different devices
We took that gigantic list that's out there and we said, "Where are we going to offer different
devices?" We're going to pick maybe 10 or 20 different devices, the most common ones that
people are bringing in, to support going forward, with the hope that you will be able to satisfy
about 80 percent of the employed population.
It does, however, all go to the user experience. You have to keep coming back to that, making
sure they have the ability to get to the right data and the right applications, with the correct
security rights for their job.
Gardner: It sounds as if some of the basic principles and benefits of VDI come to play here.
That is to say, the provisioning, the control, the access management. So there is, I guess, a
fortuitous intersection of where VDI was entering into more and more organizations, particularly
those that want to control for security or regulatory purposes or intellectual property (IP) control,
that sort of thing, with this idea of multiple devices, multiple panes of glass, full mobility.
Did that play a role there too? Were you already going down a VDI track or trajectory and this
helped you get to BYOD quicker and better?
4. Fawcett: We started down the VDI path. In fact, many companies did years ago, when we
started to do more with offshore resources. We wanted to have offshore resources, we wanted to
give them desktops, but we wanted to make sure they were secure. That was the first introduction
of where VDI makes a lot of sense, where you want to secure data, have folks doing coding, but
knowing they can’t take code with them. That’s the way it started.
But then you start to find other use cases for VDI that really start to benefit the rest of the user
community. VDI is one of those things that started a while back and now has slowly grown into
this BYOD solution.
Gardner: Did you know how much BYOD was going on there? How did you find out and how
would it become something you could control?
Fawcett: That’s the question of the hour. I'd love to be able to say that we knew exactly how
many people were bringing in what kinds of devices, but the reality is, we are a technology
company, so some of our policies may be more relaxed than the policies of companies outside
our realm.
For example, in a bank or in the government, you can pretty much lock down an environment,
and every employee coming in knows it's going to be locked down because of who they are and
who they work for.
Our organization is made up of technologists located around the world. You know some of them
are looking for ways around the fences. It’s just built into their nature. It's almost like a
competition for them, "Can I figure this out?" Now add in the remote and traveling users and you
can see how this expands the challenge as time goes on.
Story of adoption
Gardner: Let’s hear a little bit about the story of adoption. You decided that this Pandora's box
was already open, no going back. BYOD is apparently here to stay, and we've got some head
start with VDI models and processes. Tell me how this panned out and what were some of the
major problems that you found you needed to solve?
Fawcett: As I mentioned before, for us, it was not about the devices. We tried to turn that
around, and it was kind of handy, because the whole consumerization of IT started to come into
the industry more and more. So we started to piggyback on that.
Think about it. A device is simply a means of accessing the apps and the data. Our vision instead
turned into trying to figure out a way to provide employees with a world-class overall user
experience, from beginning to end, encouraging the culture of openness and innovation.
In the end, our goal is to offer our end-users that ability to use a flexible set of tools and toolsets
with a familiar interface that allows for secure access anywhere, anytime. We want them to be
5. comfortable with those tools, as this will make them obviously more productive at doing their
jobs.
Gardner: Back to that interface issue. There is also this intersection of technology, with HTML5
being prominent. Did you have to make some choices about native support for apps across some
of these major platforms and popular devices? Or did you say, "Let’s try to come out with the
technological approach that can suit more than going native, try to do write once and deploy
anywhere or be consumed anywhere?" How did that kind of pan out?
Fawcett: We pretty much have a standard set of packaged applications. So it wasn't like we were
going to start rewriting any of those applications, or even the front-end. The good news is that
these applications are staying up with the industry and we're serving them up, so multiple device
types can access the data and still provide that consistent UI to the end-user.
But you still have to go back too and ask what makes sense. What kind of device makes sense,
for example, in an AP data entry department? Do you really think you are ever going to see --
and maybe one day, who knows, we will -- but do you ever think you will see a data entry clerk
using a tablet to do rapid data entry? Probably not. They're pretty tied to the 10-key. They like
the feel of the keyboard itself.
So you kind of sit back. What everyone is beginning to accept is that there are different devices
for different types of roles inside an organization. That's pretty much the path that we've
continued down as well.
At Quest, we have some wonderful tools that help us understand this environment and help us
recognize who is bringing in devices and how they're being used. We're getting a better sense of
what's in our environment so that we can start answering these.
Gardner: Let's look at this through the lens of IT. You decided that you're going to support
BYOD with the blessing of IT. What does this get for you? Are there some additional benefits
other than empowering the end-user or giving them choice? What’s there for you in terms of
better support for your centralized operations, applications, data, and then some of those backup
and support functions that we all should be doing regularly?
Regular backups
Fawcett: One thing that really helps out IT is the thing you just mentioned, which is making
sure that laptops are being backed up on a regular basis. We know today, and I'm sure many of us
on this podcast are thinking, "How many of us actually back up our laptops on a regular basis?"
Those who do it are saying, "Well, doesn’t everyone do that?" But you could guess that inside of
a large organization, probably the majority are not responsible enough to do it, because it’s just
not in the forefront of their minds.
6. When you talk about VDI and having a desktop in the data center, it's a guaranteed thing,
because it's in the data center. Everything in the data center is backed up. That's one real positive
-- making sure that the data is secured. Obviously, when it comes to DR, we could quickly
recover an environment. So that's a great thing for IT. And I think that, in general, the end-users
would love that as well, as they get into this world more often.
Gardner: Looking a little bit to the future, more organizations are adopting software-as-a-
service (SaaS) applications for non-core business type applications. We're seeing more interest in
cloud, consuming applications from a public cloud environment or the hybrid environment,
whether it's public or private. Is there something about your support of applications as
centralized to multiple devices that will enable you to exploit SaaS, cloud and hybrid services to
a greater extent?
Fawcett: Most definitely. It goes back to the tools that you're using to assess, manage, and
govern and then support the end-users. IT has to make sure they have those tools in order to
make sure they're supporting the end-users regardless of where their data lives.
Certainly, the cloud and the SaaS environments are adding extra buzz in the industry. We're very
interested in how to capitalize on that. How do we make sure that we're looking at elastic
computing, and where can it benefit us? Everybody is scrambling to understand this new
technology trend better and how it can help an IT organization.
But it does go back to the tools that an IT organization has in order to match those three things
that we should always be doing, which is assessing what the users and the environment need,
managing it, making sure it's secure, and then making sure again that we're able to support those
end-users to their fullest and the way they expect to be supported.
Gardner: My thinking just a couple of years ago was that BYOD was going to be the exception,
not the rule. You would support some sort of a fringe category or two of your workers with this
capability, perhaps those out on the road, more often than not.
But now, as I hear you, it sounds that the direction that most IT is going to go in, hybrid services,
delivering and consumption and management, and a more centralized control over data, IP, and
management of apps and delivering desktops themselves as services, are all going to be making
BYOD, or at least the blocking and tackling that you would need to do anyway, something that
comes together in such a way that this might become more the norm than the exception. Do you
think that’s what’s happening?
Fawcett: Absolutely. It's like when virtualization was first there. There was a wave of “how
much could you virtualize inside your data center?” Fast forward, and now it's a given. It's a
given that inside your data center you have virtualized as much as possible, so that you can
ensure that your data center is being used the most it can be and the most efficiently.
7. The way it's going to be
This is the same way this is going to be. Just talk to your kids. Try to find a child walking down
the street and isn't texting or who doesn't have a tablet and can probably manage it better than
their parents.
I'm not talking about just young children but generations to come. I'm talking about the kids who
are coming in now, in their 20s and 30s. it's a given that they want to use whatever device they
choose in the corporate world, just like they do at home. It's a right. It's no longer considered a
luxury.
From that view, it will be up with the internal IT teams to ensure they have the access to
everything they need, with the right security in place to protect them, as well as protect the
company. That's why when you think about some of the tools that we've been using here, you
really want to make sure you bring in some of those tools, so that you can, in fact, assess,
manage and support the end-users to the best of their ability, for not only the end-user, but also
for the company.
Gardner: To that point about tools, I assume that you all drink your own champagne.
Fawcett: Absolutely.
Gardner: Was there anything in particular in the Quest Software portfolio that you think gave
you an on-ramp, perhaps a better return on investment (ROI) and even overall better control and
management, as you move towards this BYOD, support of many panes of glass, centralized IT
management direction?
Fawcett: Absolutely. Yes, we are drinking the champagne, and it all goes back to the beginning,
where you asked me, how I knew how much BYOD was actually in our environment? That's
where we started using one of the first phenomenal tools that we have, which is called
MessageStats. This is a great tool that reaches out and helps us track the trending within the
organization at a macro and micro level. We know which devices and OS versions are being
used, by whom, and at what time.
In fact, I asked my team just recently, when we first started talking, "Can you pull a list on all the
devices that I use, that are registered to me?" So I saw my own list of the devices and I was
shocked to see how they actually are tracked, right down to the level of when was the first time I
ever connected the device to the network, last successful sync, last policy update, what kind of
device was it.
It was so granular, and quite frankly, it was so very Big Brother-like, it kind of scared me. But
again, you can't make a solution for what you don't understand. So assessing with MessageStats
is the only way to go.
8. Then once we understood it, we said, "Now that the process is moving, let's figure out what type
of device is right for what type of user." And this is where we turned to vWorkspace, which
enabled us to determine which of the users and scenarios are best suited for the virtual desktops
in the data center.
In addition, it provided a critical insight as to which virtual desktop technologies provide the best
fit for each user, based on their needs. So vWorkspace allows us to not only put a desktop in the
data center, but it lets us do things like application streaming and publishing. It really enables us
to have that broad spectrum of functionality with just that one tool.
Once we were up and running, we stepped into the management and governance aspect of the
project. This can probably be one of the most problematic areas, when you think about the pure
nature of BYOD. Multiple devices for a given user, each acting very differently, and if not
managed, could destroy any governance policy put in place.
Understanding the individual
This is where we truly must raise the issue up from the device to the individual, understanding
that role of that person and understanding what security rights, regardless of the device they need
to have in place. And this is where Quest’s One Identity Management came into play.
It gave the IT team the ability to rely on one point of control for an individual and all their
devices. This is the product we count on to pass the audits, and most importantly, to ensure that
our employees have that right level of access needed to get their job done.
The final key point on this is that it takes IT out of the mix and automates that very cumbersome
process of provisioning, moving employees amongst departments, and then finally de-
provisioning, when that employee leaves.
This is a very powerful product that makes it so that in our environment, once an employee is
entered into the HR system, through automation, it automatically provisions them, gives them the
rights to applications, sets them up inside of those applications -- all without IT involved in that
process. So no more passing help-desk tickets.
One other piece that I wanted to touch on is a product called Webthority that we have been using,
not only for our internal users, but also during the M&A process. This is a great product, because
it provides a portal for the employees to come into. Once again, it's secured via that same
network log-on that they use when they walk in the door in the morning.
This is anywhere, any device. It's simply a portal. They come in, they use their network log on,
and bam, they're shown all the applications that they have visibility into and access to. They can
go in, without having to log on again, almost like a single sign-on effect, which allows them to
access the applications via two-factor authentication as well. It's a great product that helps out in
many ways.
9. And then that final aspect of an environment is, of course, the support and monitoring.
Remember, the key to any IT success is through the happiness and satisfaction of the customers.
We recognize that supporting and monitoring their experience and performance is most
important, especially when you talk about VDI, which is what you and I have been talking so
much about.
Our job is to ensure that the end-users are getting the same type of performance that they would
on a standalone PC or if their desktop was in the data center. Because without that consistently
great performance, your end-users will fight giving up their desktops every time.
For this, we turned to monitoring that user experience with Foglight for Virtual Desktops. Being
able to quickly determine which users are impacted by performance problems helps us to
proactively take action for those users, before the users feel the pain.
Understanding the trends in the virtual environment -- how many people are connecting at any
given time, what applications are they using, etc. -- helps us determine when we might need to
add additional servers to that server farm, and to meet the load. Or we can even look at a desktop
or an end-user and say, "You know what? I don't think these folks should be virtualized at all.
Perhaps they should go back to being physical" -- for whatever reason.
Empirical data
You can't correct what you don't know and you need that empirical data to make an educated
move. Foglight gives us that data, ensuring we are consistently improving the environment for
the end-users. It's a great set of products that touch on all three phases of an environment or a
team that's trying to solve this BYOD issue.
Gardner: It really strikes me too that this isn't really about devices, but it's about the data center,
the tools, the management, the governance, all of which are probably things that are good IT best
practices anyway. It almost sounds as if BYOD is forcing discipline, governance, automation;
some of the basics of good, advanced and modern IT. Is that sort of what you are seeing, is
BYOD a catalyst to better data-center management?
Fawcett: It can definitely be used that way, because it does all go back to how an individual in a
given role gets access to the applications they need to get their job done. It shouldn't matter
which device they are using. It's all about which application access they should have to get their
job done.
Gardner: Of course when you put in the best practices, when you have the backups and you
have the scheduling and the automation, this all will end up being an economic benefit as well,
because you won't suffer terrible outages, you won't have issues of discovery for data when you
need it and how you need it.
10. Of course, you can start to look at your total cost for your data center and tweak and manage for
energy facilities, capacity and utilization. It sounds as if not only is BYOD a catalyst for better
data center practices, but it could be some significant means of reducing your total cost of
operation.
Fawcett: Absolutely. We've always looked at containing IT budgets as a means to an end. When
you sit back and think about it, the only way to do that is through simplification, standardization
and automation.
If you don't have that last piece, that automation piece, and you're simply throwing heads to
solve an issue, your IT expenses are going to go through the roof. And you're going to have
unhappy customers in the end, because processes are going to be overcomplicated. It's all about
containing the IT budget through best practices and automation.
Gardner: Well, great. I'm afraid we are about out of time. You've been listening to a sponsored
BriefingsDirect podcast discussion on users’ personal use, ownership and even maintenance of
their own computing and mobile devices, and how that's actually making more sense, for more
organizations, for more reasons.
We have seen how this has benefits far beyond just the users’ sense of empowerment; we're
seeing that there are benefits to IT advancements along the lines of centralized application
support, data support, VDI implementations, better DR, data protection and even more.
Thank you so much. We've been talking about how BYOD impacts organizations, in particular
Quest Software, a Dell company, and we have been learning this from Carol Fawcett. She is the
CIO at Dell Software. Thanks so much.
Fawcett: Thank you.
Gardner: This is Dana Gardner, Principal Analyst at Interarbor Solutions. Thanks also to you,
our audience, for joining us. We hope you enjoyed this, and we hope you come back next time.
Listen to the podcast. Find it on iTunes. Sponsor: Quest Software
Transcript of a BriefingsDirect podcast on how Quest, a Dell company, leverages VDI and
BYOD to improve application support, backup, and disaster recovery. Copyright Interarbor
Solutions, LLC, 2005-2012. All rights reserved.
You may also be interested in:
• New Levels of Automation and Precision Needed to Optimize Backup and Recovery in
Virtualized Environments
• Ocean Observatories Initiative: Cloud and Big Data come together to give scientists
unprecedented access to essential climate insights
11. • Case Study: Strategic Approach to Disaster Recovery and Data Lifecycle Management
Pays Off for Australia's SAI Global
• Columbia Sportswear extends deep server virtualization to improved ERP operations,
disaster recovery efficiencies
• Virtualization Simplifies Disaster Recovery for Insurance Broker Myron Steves While
Delivering Efficiency and Agility Gains Too