|By Dana Gardner||
|December 13, 2013 10:15 AM EST||
The next BriefingsDirect innovator interview targets how the recent and rapid evolution of mobile and client management requirements have caused considerable complexity and confusion.
We’ll examine how incomplete solutions and a lack of a clear pan-client strategy have hampered the move to broader mobile support at enterprises and mid-market companies alike. This state of muddled direction has put IT in a bind, while frustrating users who are eager to gain greater productivity and flexibility in their work habits, and device choice.
To share his insights on how to better prepare for a mobile-enablement future that quickly complements other IT imperatives such as cloud, big data, and even more efficient data centers, we’re joined by Tom Kendra, Vice President and General Manager, Systems Management at Dell Software. The discussion is moderated by me, Dana Gardner, Principal Analyst at Interarbor Solutions. [Disclosure: Dell is a sponsor of BriefingsDirect podcasts.]
Here are some excerpts:
Kendra: There is an enormous amount of conversation now in this mobility area and it’s moving very, very rapidly. This is an evolving space. There are a lot of moving parts, and hopefully, in the next few minutes, we’ll be able to dive into some of those.
Gardner: People have been dealing with a fast-moving client environment for decades. Things have always changed rapidly with the client. We went through the Web transition and client-server. We’ve seen all kinds of different ways of getting apps to devices. What’s different about the mobile and BYOD challenges today?
Speed and agility
Kendra: Our industry is characterized by speed and agility. Right now, the big drivers causing the acceleration can be put into three categories: the amount and type of data that’s available, all the different ways and devices for accessing this data, as well as the evolving preferences and policies for dictating who, what, and how data is shared.
For example, training videos, charts and graphs versus just text, and the ability to combine these assets and deliver them in a way that allows a front-line salesperson, a service desk staffer or anyone else in the corporate ecosystem to satisfy customer requests much more efficiently and rapidly.
The second area is the number of devices we need to support. You touched on this earlier. In yesterday’s world -- and yesterday was a very short time ago -- mobility was all around the PC. Then, it was around a corporate-issued device, most likely a business phone. Now, all of a sudden, there are many, many, many more devices that corporations are issuing as well as devices people are bringing into their work environment at a rapid pace.
We’ve moved from laptops to smartphones that were corporate-issued to tablets. Soon, we’ll get more and more wearables in the environment and machine-to-machine communications will become more prevalent. All of these essentially create unprecedented opportunities, yet also complicate the problem.
The third area that’s driving change at a much higher velocity is the ever-evolving attitude about work and work-life balance. And, along with that ... privacy. Employees want to use what they’re comfortable using at work and they want to make sure their information and privacy rights are understood and protected. These three items are really driving the acceleration.
Gardner: And the response to this complexity so far, Tom, has been some suite, some mobile device management (MDM) approaches, trying to have multiple paths to these devices and supporting multiple types of infrastructure behind that. Why have these not yet reached a point where enterprises are comfortable? Why have we not yet solved the problem of how to do this well?
Kendra: When you think about all the different requirements, you realize there are many ways to achieve the objectives. You might postulate that, in certain industries, there are regulatory requirements that somewhat dictate a solution. So a lot of organizations in those industries move down one path. In industries where you don’t have quite the same regulatory environment, you might have more flexibility to choose yet another path.
The range of available options is wide, and many organizations have experimented with numerous approaches. Now, we’ve gotten to the point where we have the unique opportunity -- today and over the next couple of years -- to think about how we consolidate these approaches into a more integrated, holistic mobility solution that elevates data security and mobile workforce productivity.
None of them are inherently good or bad. They all serve a purpose. We have to ask, “How do I preserve the uniqueness of what those different approaches offer, while bringing together the similarities?”
How can you take advantage of similarities, such as the definition of roles or which roles within the organization have access to what types of data? The commonalities may be contextual in the sense that I’m going to provide this kind of data access if you are in these kinds of locations on these kinds of devices. Those things we could probably pull together and manage in a more efficient way.
But we still want to give companies the flexibility to determine what it means to support different form factors, which means you need to understand the characteristics of a wearable device versus a smartphone or an iPad.
I also need to understand the different use cases that are most prevalent in my organization. If I’m a factory worker, for example, it may be better to have a wearable in the future, rather than a tablet. In the medical field, however, tablets are probably preferred over wearables because of the need to enter, modify and view electronic medical records. So there are different tradeoffs, and we want to be able to support all of them.
Gardner: Looking again at the historical perspective, in the past when IT was faced with a complexity -- too many moving parts, too many variables -- they could walk in and say, “Here’s the solution. This is the box we’ve put around it. You have to use it this way. That may cause you some frustration, but it will solve the bigger problem.” And they could get away with that.
Today, that’s really no longer the case. There’s shadow IT. There’s consumerization of IT. There are people using cloud services on their own volition without even going through any of the lines of business. It's right down to the individual user. How does IT now find a way to get some control, get the needed enterprise requirements met, but recognize that their ability to dictate terms is less than it used to be?
Kendra: You’re bringing up a very big issue. Companies today are getting a lot of pressure from individuals bringing in their own technology. One of the case studies you and I have been following for many months is Green Clinic Health System, a physician-owned community healthcare organization in Louisiana. As you know, Jason Thomas, the CIO and IT Director, has been very open about discussing their progress -- and the many challenges -- encountered on their BYOD journey.
As part of Green Clinic’s goal to ensure excellent patient care, the 50 physicians started bringing in different technologies, including tablets and smartphones, and then asked IT to support them. This is a great example of what happens when major organizational stakeholders -- Green Clinic’s physicians, in this case -- make technology selections to deliver better service. With Green Clinic, this meant giving doctors and clinicians anytime, anywhere access to highly sensitive patient information on any Internet-connected device without compromising security or HIPAA compliance requirements.
In other kinds of businesses, similar selection processes are underway as line-of-business owners are coming forward to request that different employees or organizational groups have access to information from a multitude of devices. Now, IT has to figure out how to put the security in place to make sure corporate information is protected while still providing the flexibility for users to do their jobs using preferred devices.
Shadow IT often emerges in scenarios where IT puts too many restrictions on device choice, which leads line-of-business owners and their constituents to seek workarounds. As we all know, this can open the door to all sorts of security risks. When we think about the Green Clinic example, you can see that Jason Thomas strives to be as flexible as possible in supporting preferred devices while taking all the necessary precautions to protect patient privacy and HIPAA regulations.
Gardner: When we think about how IT needs to approach this differently -- perhaps embracing and extending what's going on, while also being mindful of those important compliance risk and governance issues -- we’re seeing a similar shift from the IT vendors.
I think there’s such a large opportunity in the market for mobile, for the modern data center, for the management of the data and the apps out to these devices, that we are seeing vendor models shifting, and we’re seeing acquisitions happening. What's different this time from the vendor perspective?
Kendra: The industry has to move from a position of providing a series of point-solutions to guiding and leading with a strategy for pulling all these things together. Again, it comes down to giving companies a plan for the future that keeps pace with their emerging requirements, accommodates existing skill sets and grows with them as mobility becomes more ingrained in their ways of doing business. That’s the game -- and that’s the hard part.
The types of solutions Dell is bringing to the market embrace what’s needed today while being flexible enough to accommodate future applications and evolving data access needs.
The goal is to leverage customers’ existing investments in their current infrastructures and find ways to build and expand on those with foundational elements that can scale easily as needs dictate. You can imagine a scenario in which an IT shop is not going to have the resources, especially in the mid-market, to embrace multiple ways of managing, securing, granting access, or all of these things.
Gardner: That’s why I think this is easily going to be a three- to five-year affair. Perhaps it will be longer, because we’re not just talking about plopping in a mobile device management capability. We’re really talking about rethinking processes, business models, productivity, and how you acquire working skills. We’re no longer just doing word processing instead of using typewriters. We’re not just repaving cow paths. We’re charting something quite new.
There is that interrelationship between the technology capabilities and the work. I think that’s something that hasn’t been thought out. Companies were perhaps thinking, “We'll just add mobile devices onto the roster of things that we support.” But that’s probably not enough. How does the vision from that aspect work, when you try to do both a technology shift and a business transformation?
Kendra: You used the term “plop in a MDM solution.” It's important to understand that the efforts and the initiatives that have taken place have all been really valuable. We’ve learned a lot. The issue is, as you are talking about, how to evolve this strategy and why.
Equally important is having an understanding of the business transformation that takes place when you put all these elements together—it’s much more far-reaching than simply “plopping” in a point solution for a particular aspect.
In yesterday's world, I might have had the right or ability to wipe entire devices. Let’s look at the corporate-issued device scenario. The company owns the device and therefore owns the data that resides or is accessed on that device. Wiping the device would be entirely within my domain or purview. But in a BYOD environment, I’m not going to be able to wipe a device. So, I have to think about things much differently than I did before.
As companies evolve their own mobility strategies, it’s important to leverage their learnings, while remaining focused on enhancing their users’ experiences and not sacrificing them. That’s why some of the research we’ve done suggests there is a very high reconsideration rate in terms of people and their current mobility solutions.
They’ve tried various approaches and point solutions and some worked out, but others have found these solutions lacking, which has caused gaps in usability, user adoption, and manageability. Our goal is to address and close those gaps.
Gardner: Let's get to what needs to happen. It seems to me that containerization has come to the fore, a way of accessing different types of applications, acquiring those applications perhaps on the fly, rather than rolled out for the entire populace of the workforce over time. Tell us a little bit more about how you see this working better, moving toward a more supported, agile, business-friendly and user-productivity vision or future for mobility.
Kendra: Giving users the ability to acquire applications on the fly is hugely important as users, based on their roles, need to have access to applications and data, and they need to have it served up in a very easy, user-friendly manner.
The crucial considerations here are role-based, potentially even location-based. Do I really want to allow the same kinds of access to information if I’m in a coffee house in China as I do if I am in my own office? Does data need to be resident on the device once I’m offline? Those are the kinds of considerations we need to think about.
What’s needed to ensure a seamless offline experience is where the issue of containerization arises. There are capabilities that enable users to view and access information in a secure manner when they’re connected to an Internet-enabled device.
But what happens when those same users are offline? Secure container-based workspaces allow me to take documents, data or other corporate information from that online experience and have it accessible whether I’m on a plane, in a tunnel or outside a wi-fi area.
The container provides a protected place to store, view, manage and use that data. If I need to wipe it later on, I can just wipe the information stored in the container, not the entire device, which likely will have personal information and other unrelated data. With the secure digital workspace, it’s easy to restrict how corporate information is used, and policies can be readily established to govern which data can go outside the container or be used by other applications.
The industry is clearing moving in this direction, and it’s critical that we make it across corporate applications.
Gardner: If I hear you correctly, Tom, it sounds as if we’re going to be able to bring down the right container, for the right device, at the right time, for the right process and/or data or application activity. That’s putting more onus on the data center, but that’s probably a good thing. That gives IT the control that they want and need.
It also seems to me that, when you have that flexibility on the device and you can manage sessions and roles and permissions, this can be a cost and productivity benefit to the operators of that data center. They can start to do better data management, dedupe, reduce their storage costs, and do backup and recovery with more of a holistic, agile or strategic approach. They can also meter out the resources they need to support these workloads with much greater efficiency, predict those workloads, and then react to them very swiftly.
We’ve talked so far about all how difficult and tough this is. It sounds like if you crack this nut properly, not only do you get that benefit of the user experience and the mobility factor, but you can also do quite a bit of a good IT blocking and tackling on the backend. Am I reading that correctly or am I overstating that?
Kendra: I think you’re absolutely on the money. Take us as individuals. You may have a corporate-issued laptop. You might have a corporate-issued phone. You also may have an iPad, a Dell tablet, or another type of tablet at home. For me, it’s important to know what Tom Kendra has access to across all of those devices in a very simple manner.
I don’t want to set up a different approach based on each individual device. I want to set up a way of viewing my data, based on my role, permissions and work needs. Heretofore, it's been largely device-centric and management-centric, as opposed to user productivity role-centric.
The Dell position -- and where we see the industry going -- is consolidating much of the management and security around those devices in a holistic manner, so I can focus on what the individual needs. In doing so, it’s much easier to serve the appropriate data access in a fairly seamless manner. This approach rings true with many of our customers who want to spend more resources on driving their businesses and facilitating increased user productivity and fewer resources on managing a myriad of multiple systems.
Gardner: By bringing the point of management -- the point of power, the point of control and enablement -- back into the data center, you’re also able to link up to your legacy assets much more easily than if you had to somehow retrofit those legacy assets out to a specific device platform or a device's format.
Kendra: You’re hitting on the importance of flexibility. Earlier, we said the user experience is a major driver along with ensuring flexibility for both the employee and IT. Reducing risk exposure is another crucial driver and by taking a more holistic approach to mobility enablement, we can address policy enforcement based on roles across all those devices. Not only does this lower exposure to risk, it elevates data security since you’re addressing it from the user point of view instead of trying to sync up three or four different devices with multiple user profiles.
Gardner: And if I am thinking at that data center level, it will give me choices on where and how I create that data center, where I locate it, how I produce it, and how I host it. It opens up a lot more opportunity for utilizing public cloud services, or a combination that best suits my needs and that can shift and adapt over time.
Kendra: It really does come down to freedom of choice, doesn’t it? The freedom to use whatever device in whichever data center combination that makes the most sense for the business is really what everyone is striving for. Many of Dell’s customers are moving toward environments where they are taking both on-premise and off-premise compute resources. They think about applications as, “I can serve them up from inside my company or I can serve them up from outside my company.”
The issue comes down to the fact that I want to integrate wherever possible. I want to serve up the data and the applications when needed and how needed, and I want to make sure that I have the appropriate management and security controls over those things.
Gardner: Okay, I think I have the vision much more clearly now. I expect we’re going to be hearing more from Dell Software on ways to execute toward that vision. But before we move on to some examples of how this works in practice, why Dell? What is it about Dell now that you think puts you all in a position to deliver the means to accomplish this vision?
Kendra: Dell has relationships with millions of customers around the world. We’re a very trusted brand, and companies are interested in what Dell has to say. People are interested in where Dell is going. If you think about the PC market, for example, Dell has about an 11.9 percent worldwide market share. There are hundreds and hundreds of millions of PCs used in the world today. I believe there were approximately 82 million PCs sold during the third quarter of 2013.
The point here is that we have a natural entrée into this discussion and the discussion goes like this: Dell has been a trusted supplier of hardware and we’ve played an important role in helping you drive your business, increase productivity and enable your people to do more, which has produced some amazing business results. As you move into thinking about the management of additional capabilities around mobile, Dell has hardware and software that you should consider.
Once we’re in the conversation, we can highlight Dell’s world-class technologies, including end-user computing, servers, storage, networking, security, data protection, software, and services.
As a trusted brand with world-class technologies and proven solutions, Dell is ideally suited to help bring together the devices and underlying security, encryption, and management technologies required to deliver a unified mobile enablement solution. We can pull it all together and deliver it to the mid-market probably better than anyone else.
So the Dell advantages are numerous. In our announcements over the next few months, you’ll see how we’re bringing these capabilities together and making it easier for our customers to acquire and use them at a lower cost and faster time to value.
Gardner: One of the things that I'd like to do, Tom, is not just to tell how things are, but to show. Do we have some examples of organizations -- you already mentioned one with the Green Clinic -- that have bitten the bullet and recognized the strategic approach, the flexibility on the client, leveraging containerization, retaining control and governance, risk, and compliance requirements through IT, but giving those end-users the power they want? What's it like when this actually works?
Kendra: When it actually works, it's a beautiful thing. Let’s start there. We work with customers around the world and, as you can imagine, given people's desire for their own privacy, a lot of them don't want their names used. But we’re working with a major North American bank that has the problems that we have been discussing.
They have 20,000-plus corporate-owned smartphones, growing to some 35,000 in the next year. They have more than a thousand iPads in place, growing rapidly. They have a desktop virtualization (VDI) solution, but the VDI solution, as we spoke about earlier, really doesn't support the offline experience that they need.
They are trying to leverage an 850-person IT department that has worldwide responsibilities, all the things that we spoke about earlier. And they use technology from companies that haven’t evolved as quickly as they should have. So they're wondering whether those companies are going to be around in the future.
This is the classic case of, “I have a lot of technology deployed. I need to move to a container solution to support both online and offline experiences, and my IT budget is being squeezed.” So how do you do this? It goes back to the things we talked about.
First, I need to leverage what I have. Second, I need to pick solutions that can support multiple environments rather than a point solution for each environment. Third, I need to think about the future, and in this case, that entails a rapid explosion of mobile devices.
I need to mobilize rapidly without compromising security or the user experience. The concept of an integrated suite of policy and management capabilities is going to be extremely important to my organization going forward.
Gardner: Dell is approaching this enterprise mobility manager market with an aggressive perspective, recognizing a big opportunity in the market and an opportunity that they are uniquely positioned to go at. There’s not too much emphasis on the client alone and not just emphasis on the data center. It really needs to be a bridging type of a value-add these days. Can you tease us a little bit about some upcoming news? What should we expect next?
Kendra: The solutions we announced in April essentially laid out our vision of Dell’s evolving mobility strategies. We talked about the need to consolidate mobility management systems and streamline enablement. We focused on the importance of leveraging world-class security, including secure remote access and encryption. And the market has responded well to Dell's point of view.
As we move forward, we have the opportunity to get much more prescriptive in describing our unified approach that consolidates the capabilities organizations need to ensure secure control over their corporate data while still ensuring an excellent user experience.
You’ll see more from us detailing how those integrated solutions come together to deliver fast time to value. You'll also see different delivery vehicles, giving our customers the flexibility to choose from on premise, software-as-a-service (SaaS) based or cloud-based approaches. You'll see additional device support, and you'll see containerization.
We plan to leverage our advantages, our best-in-class capabilities around security, encryption, device management; this common functionality approach. We plan to leverage all of that in upcoming announcements.
As we take the analyst community through our end-to-end mobile/BYOD enablement plans, we’ve gotten high marks for our approach and direction. Our discussions involving Dell’s broad OS support, embedded security, unified management and proven customer relationship all have been well received.
Our next step is to make sure that, as we announce and deliver in the coming months, customers absolutely understand what we have and where we're going. We think they're going be very excited about it. We think we're in the sweet spot of the mid-market and the upper mid-market in terms of what solutions they need to ease their mobile enablement objectives.
We also believe we can provide a unique point-of-view and compelling technology roadmaps for those very large customers who may have a longer journey in their deployments or rollout.
We're very excited about what we're doing. The specifics of what we're doing play out in early December, January, and beyond. You'll see a rolling thunder of announcements from Dell, much like we did in April. We’ll lay out the solutions. We’ll talk about how these products come together and we’ll deliver.
You may also be interested in:
- BI and Big Data Analytics Force an Overdue Reckoning Between IT and Business Interests
- BYOD Trend Brings New Security Challenges for IT: Allowing Greater Access While Protecting Networks
- Dell updates virtualization suite, makes VMware support a priority
- Want a Data-Driven Culture? Start Sorting Out the BI and Big Data Myths Now
- Data complexity forces need for agnostic tool chain approach for information management, says Dell Software executive
- Dell's Foglight for Virtualization update extends visibility and management control across more infrastructure
- For Dell's Quest Software, BYOD Puts Users First and with IT's Blessing
The Internet of Things (IoT) is going to require a new way of thinking and of developing software for speed, security and innovation. This requires IT leaders to balance business as usual while anticipating for the next market and technology trends. Cloud provides the right IT asset portfolio to help today’s IT leaders manage the old and prepare for the new. Today the cloud conversation is evolving from private and public to hybrid. This session will provide use cases and insights to reinforce the value of the network in helping organizations to maximize their company’s cloud experience.
Oct. 2, 2014 07:00 AM EDT Reads: 1,253
Disruptive macro trends in technology are impacting and dramatically changing the "art of the possible" relative to supply chain management practices through the innovative use of IoT, cloud, machine learning and Big Data to enable connected ecosystems of engagement. Enterprise informatics can now move beyond point solutions that merely monitor the past and implement integrated enterprise fabrics that enable end-to-end supply chain visibility to improve customer service delivery and optimize supplier management. Learn about enterprise architecture strategies for designing connected systems tha...
Oct. 2, 2014 07:00 AM EDT Reads: 1,125
Cultural, regulatory, environmental, political and economic (CREPE) conditions over the past decade are creating cross-industry solution spaces that require processes and technologies from both the Internet of Things (IoT), and Data Management and Analytics (DMA). These solution spaces are evolving into Sensor Analytics Ecosystems (SAE) that represent significant new opportunities for organizations of all types. Public Utilities throughout the world, providing electricity, natural gas and water, are pursuing SmartGrid initiatives that represent one of the more mature examples of SAE. We have s...
Oct. 2, 2014 06:00 AM EDT Reads: 1,064
IoT is still a vague buzzword for many people. In his session at Internet of @ThingsExpo, Mike Kavis, Vice President & Principal Cloud Architect at Cloud Technology Partners, will discuss the business value of IoT that goes far beyond the general public's perception that IoT is all about wearables and home consumer services. The presentation will also discuss how IoT is perceived by investors and how venture capitalist access this space. Other topics to discuss are barriers to success, what is new, what is old, and what the future may hold.
Oct. 1, 2014 10:00 PM EDT Reads: 1,832
Whether you're a startup or a 100 year old enterprise, the Internet of Things offers a variety of new capabilities for your business. IoT style solutions can help you get closer your customers, launch new product lines and take over an industry. Some companies are dipping their toes in, but many have already taken the plunge, all while dramatic new capabilities continue to emerge. In his session at Internet of @ThingsExpo, Reid Carlberg, Senior Director, Developer Evangelism at salesforce.com, to discuss real-world use cases, patterns and opportunities you can harness today.
Oct. 1, 2014 08:30 PM EDT Reads: 2,207
All major researchers estimate there will be tens of billions devices – computers, smartphones, tablets, and sensors – connected to the Internet by 2020. This number will continue to grow at a rapid pace for the next several decades. With major technology companies and startups seriously embracing IoT strategies, now is the perfect time to attend @ThingsExpo in Silicon Valley. Learn what is going on, contribute to the discussions, and ensure that your enterprise is as "IoT-Ready" as it can be!
Oct. 1, 2014 05:00 PM EDT Reads: 2,403
Noted IoT expert and researcher Joseph di Paolantonio (pictured below) has joined the @ThingsExpo faculty. Joseph, who describes himself as an “Independent Thinker” from DataArchon, will speak on the topic of “Smart Grids & Managing Big Utilities.” Over his career, Joseph di Paolantonio has worked in the energy, renewables, aerospace, telecommunications, and information technology industries. His expertise is in data analysis, system engineering, Bayesian statistics, data warehouses, business intelligence, data mining, predictive methods, and very large databases (VLDB). Prior to DataArcho...
Oct. 1, 2014 03:30 PM EDT Reads: 1,103
Software AG helps organizations transform into Digital Enterprises, so they can differentiate from competitors and better engage customers, partners and employees. Using the Software AG Suite, companies can close the gap between business and IT to create digital systems of differentiation that drive front-line agility. We offer four on-ramps to the Digital Enterprise: alignment through collaborative process analysis; transformation through portfolio management; agility through process automation and integration; and visibility through intelligent business operations and big data.
Sep. 30, 2014 10:30 AM EDT Reads: 1,610
There will be 50 billion Internet connected devices by 2020. Today, every manufacturer has a propriety protocol and an app. How do we securely integrate these "things" into our lives and businesses in a way that we can easily control and manage? Even better, how do we integrate these "things" so that they control and manage each other so our lives become more convenient or our businesses become more profitable and/or safe? We have heard that the best interface is no interface. In his session at Internet of @ThingsExpo, Chris Matthieu, Co-Founder & CTO at Octoblu, Inc., will discuss how thes...
Sep. 29, 2014 06:45 AM EDT Reads: 1,927
Last week, while in San Francisco, I used the Uber app and service four times. All four experiences were great, although one of the drivers stopped for 30 seconds and then left as I was walking up to the car. He must have realized I was a blogger. None the less, the next car was just a minute away and I suffered no pain. In this article, my colleague, Ved Sen, Global Head, Advisory Services Social, Mobile and Sensors at Cognizant shares his experiences and insights.
Sep. 28, 2014 09:45 AM EDT Reads: 1,570
We are reaching the end of the beginning with WebRTC and real systems using this technology have begun to appear. One challenge that faces every WebRTC deployment (in some form or another) is identity management. For example, if you have an existing service – possibly built on a variety of different PaaS/SaaS offerings – and you want to add real-time communications you are faced with a challenge relating to user management, authentication, authorization, and validation. Service providers will want to use their existing identities, but these will have credentials already that are (hopefully) ir...
Sep. 27, 2014 11:30 PM EDT Reads: 1,948
Can call centers hang up the phones for good? Intuitive Solutions did. WebRTC enabled this contact center provider to eliminate antiquated telephony and desktop phone infrastructure with a pure web-based solution, allowing them to expand beyond brick-and-mortar confines to a home-based agent model. It also ensured scalability and better service for customers, including MUY! Companies, one of the country's largest franchise restaurant companies with 232 Pizza Hut locations. This is one example of WebRTC adoption today, but the potential is limitless when powered by IoT. Attendees will learn rea...
Sep. 27, 2014 10:30 PM EDT Reads: 1,859
From telemedicine to smart cars, digital homes and industrial monitoring, the explosive growth of IoT has created exciting new business opportunities for real time calls and messaging. In his session at Internet of @ThingsExpo, Ivelin Ivanov, CEO and Co-Founder of Telestax, will share some of the new revenue sources that IoT created for Restcomm – the open source telephony platform from Telestax. Ivelin Ivanov is a technology entrepreneur who founded Mobicents, an Open Source VoIP Platform, to help create, deploy, and manage applications integrating voice, video and data. He is the co-founder ...
Sep. 27, 2014 10:30 PM EDT Reads: 2,323
The Internet of Things (IoT) promises to create new business models as significant as those that were inspired by the Internet and the smartphone 20 and 10 years ago. What business, social and practical implications will this phenomenon bring? That's the subject of "Monetizing the Internet of Things: Perspectives from the Front Lines," an e-book released today and available free of charge from Aria Systems, the leading innovator in recurring revenue management.
Sep. 27, 2014 09:45 PM EDT Reads: 2,545
The Internet of Things will put IT to its ultimate test by creating infinite new opportunities to digitize products and services, generate and analyze new data to improve customer satisfaction, and discover new ways to gain a competitive advantage across nearly every industry. In order to help corporate business units to capitalize on the rapidly evolving IoT opportunities, IT must stand up to a new set of challenges.
Sep. 27, 2014 08:45 PM EDT Reads: 2,426
There’s Big Data, then there’s really Big Data from the Internet of Things. IoT is evolving to include many data possibilities like new types of event, log and network data. The volumes are enormous, generating tens of billions of logs per day, which raise data challenges. Early IoT deployments are relying heavily on both the cloud and managed service providers to navigate these challenges. In her session at 6th Big Data Expo®, Hannah Smalltree, Director at Treasure Data, to discuss how IoT, Big Data and deployments are processing massive data volumes from wearables, utilities and other mach...
Sep. 27, 2014 01:00 PM EDT Reads: 2,091
P2P RTC will impact the landscape of communications, shifting from traditional telephony style communications models to OTT (Over-The-Top) cloud assisted & PaaS (Platform as a Service) communication services. The P2P shift will impact many areas of our lives, from mobile communication, human interactive web services, RTC and telephony infrastructure, user federation, security and privacy implications, business costs, and scalability. In his session at Internet of @ThingsExpo, Erik Lagerway, Co-founder of Hookflash, will walk through the shifting landscape of traditional telephone and voice s...
Sep. 26, 2014 11:45 PM EDT Reads: 1,616
While great strides have been made relative to the video aspects of remote collaboration, audio technology has basically stagnated. Typically all audio is mixed to a single monaural stream and emanates from a single point, such as a speakerphone or a speaker associated with a video monitor. This leads to confusion and lack of understanding among participants especially regarding who is actually speaking. Spatial teleconferencing introduces the concept of acoustic spatial separation between conference participants in three dimensional space. This has been shown to significantly improve comprehe...
Sep. 26, 2014 10:45 PM EDT Reads: 1,533
The Internet of Things is tied together with a thin strand that is known as time. Coincidentally, at the core of nearly all data analytics is a timestamp. When working with time series data there are a few core principles that everyone should consider, especially across datasets where time is the common boundary. In his session at Internet of @ThingsExpo, Jim Scott, Director of Enterprise Strategy & Architecture at MapR Technologies, will discuss single-value, geo-spatial, and log time series data. By focusing on enterprise applications and the data center, he will use OpenTSDB as an example...
Sep. 26, 2014 07:45 PM EDT Reads: 2,347
SYS-CON Events announced today that Gridstore™, the leader in software-defined storage (SDS) purpose-built for Windows Servers and Hyper-V, will exhibit at SYS-CON's 15th International Cloud Expo®, which will take place on November 4–6, 2014, at the Santa Clara Convention Center in Santa Clara, CA. Gridstore™ is the leader in software-defined storage purpose built for virtualization that is designed to accelerate applications in virtualized environments. Using its patented Server-Side Virtual Controller™ Technology (SVCT) to eliminate the I/O blender effect and accelerate applications Gridsto...
Sep. 26, 2014 06:15 PM EDT Reads: 1,730