Citrix CEO Shares 5 Digital Workplace Imperatives

At a recent US Citrix Industry Analysts Day, CEO Mark Templeton offered his vision of the future direction of Citrix and the evolution to the next mobile workspace solution – “Workspace as a Service” (any app, any device, any infrastructure).     In order to realise this vision, Templeton outlined five workspace imperatives that companies must respond to if they are to be successful going forwards:

1.       Design for what’s next – do you know? Your organisation will need a new approach and imagination to put this in place. Organisations need to be able to respond to the next device, app, location, employee, contractor, and re-organisations.
2.       Game over: consumerisation has won. Whether you call it BYOD (Bring Your Own Device), apps or identity, it’s a mindset change that is happening and needed.   IT is thinking about getting out of the ‘factory business’ and moving to design, experience and delivery.
3.       Secure what matters: apps, data and use. Device security gives a false sense of security. It could be a virtual desktop, VM container etc. Companies must understand usage and identity.
4.       Power of “any” in one infrastructure. A company wants to design once and re-use infrastructure. Today, companies buy technologies incrementally to address their needs in what Templeton calls an “If- Then infrastructure”.   With this approach, companies won’t get technology re-use. Companies must build the next infrastructure to be device agnostic where it can broker any set of apps and data while running it on your choice of infrastructure.
5.       Deliver for human and business outcom. Companies are moving from simply running infrastructure to providing technical innovations and outcomes. His view is that companies needs to derive an entire experience for the user, as well as an improved business outcome.

The Citrix CEO also identified the key priorities to help MSPs capitalise on this market transition with a strategy focusing on:

1. Enabling customer migration and transition to a new platform spanning premise, hybrid and cloud solutions.
2.       Companies need easier, faster and simpler ways to build application service delivery infrastructure.
3.       Increasing focus on industry sectors where secure app and delivery solutions deliver premium value.
4.       High-value integration across product lines for differentiation, automation and customer value.
5.       Innovations that drives adoption, differentiation and consumption out of core software infrastructure and increasing effectiveness and efficiencies of product development.

The takeaway from Citrix is that a mobility vendor can only be successful by providing an integrated portfolio of services that spans from mobility through the cloud in a cloud first and mobile first world.

The Integration of Everything for enterprise

internet-of-everything

With much of the discussion these days around homes or cars being the target for technology connectivity and integration through the future Internet of Things (IoT), Citrix are looking at an alternative definition, the ‘IoE’ – or Integration of Everything (IoE), as they seek to resolve problems for organisations and open up opportunities for businesses.

With most enterprises having complex combinations of legacy systems, SaaS services, innumerable devices, multiple sites and an ever changing set of requirements from the Board to expand revenues or cut costs, the ability to integrate and connect all these systems, services, people and things into automated workflows can make a lot of sense.

For IT managers, leveraging IoE represents an opportunity to improve a multitude of operations including:

  • Notifications of critical system status before business interruptions
  • Network security monitoring looking for anomalies
  • Automated diagnostics for error logging and support resolution
  • Datacentre operations for server operation and facilities
  • Big data analytics to understand and optimise operations

On the user side, IoE can make workspaces more productive and secure:

  • Application request, approval and deployment workflows
  • Conference room automation to eliminate wasted time at meetings
  • Workplace automation for enabling flexible open workstations
  • Enable multiple devices to share content and multi factor authentication
  • Beacon enabled app access and proximity security

Marketing Automation is an increasing business requirement for IT that IoE can help with:

  • CRM integration with legacy systems
  • Realtime twitter sentiment notifications analysis and workflows
  • Big data sales collection and analytics for revenue optimization
  • Automated support incident logging and response

There is clearly a lot for enterprise to take advantage of if they choose to review options around the IoE, but anything on such a scale of technical architecture and investment would require careful planning, not only in terms of execution, but embracing security alongside standardised communication interfaces to give it the best chance of success and any commercial outcomes.

 

 

Week’s technology news – 6th March 2015

Let’s get it on!  Top collaboration trends
A recent survey of over 500 organisations by an American industry analyst showed that whilst many companies have adopted collaboration tools, the difficulty for companies of all sizes is to find toolsets that meet ALL of their organisational needs.

1. 87% confirmed they used ‘distributed collaboration’ (where people can work with distance of time and space, collectively, often using complex information for a set goal or purpose) for some of their work.

2. 78% reported they were working on between two – seven projects simultaneously and most people are now part of three to five teams at work (with the larger the organisation and level of role, the greater the pull to collaborate on projects).

3. 40% advised they spent half their working time in non-decision making meetings, mainly around brainstorming or planning, with a high percentage involved in problem solving and project status meetings.

4. Top five meeting problems were:
a. No clear agenda communicated in advance
b. Stakeholders not prepared or didn’t attend
c. People bringing personal agendas to meeting
d. People re-hashing old topics and decisions + late arrivals
e. Straying from the agenda

5. No ‘behavioural metrics’ which could improve meeting value – here are the most requested metrics:
a. value for interpersonal interactions
b. number of decisions arising from meeting
c. percentage of time spent in the meeting

6. Collaboration leverage – using “the right technology for the right process at the right time with the right people” The top three processes to secure this were:

a. new product/service development
b. crisis management and decision support
c. effective sales /marketing.

7. The impact of these collaboration leverage processes sought to create the ‘ability to make better and faster decisions’ and to increase ‘the number and quality of decisions coming from meetings’.  Tools that support better, faster decision making to help meeting productivity include: Powernoodle, ThinkTank and Facilitate.com. Other tools like Clarizen, that focus on collaboration and project management, enable those in meetings to track the outcomes of their decisions and give feedback to the meeting participants.

8. 52% not happy with their collaboration tools as they failed to support physically distributed teams and project work.

9. Larger companies use more collaboration tools but need to review with users which work best for their workforce:

a. 86% of those surveyed use email (still most popular though decreasing with Apps)
b. 72% now using desktop video conferencing over room–based video conferencing (49%), revealing that mobile technology an increasing driver.
c. 72% use Chat/IM/Texting

Businesses can use all manner of collaboration tools.  There is no single panacea but if tools can improve teamwork interactions and communications between teams, organisations need to think about what will work best for their business in practice.  Review your collaboration techniques and technologies.  And for staff, seek to be more productive: go into meetings prepared, communicate properly, contribute meaningfully and succinctly – and finally don’t arrange a meeting if you don’t have to!

19203349_s

The evolution of unified authentication

Online authentication has evolved greatly since its original implementation through internet sites and services. On a basic level, each account you hold with a particular site would be isolated with your username, password and other details sitting in their database.

As the needs and expectations of online services have grown, so has the need for a more unified attempt at tying online authentication together and this prompted the definition of ‘Identity 1.0’ (also called digital identity, a set of methods for identity verification on the internet using emerging user-centric technologies).

Microsoft’s initial attempt to streamline login was a system called ‘Passport’ debuting in 1999.  Passport worked as a middleman, by providing established identities to users which sites could call upon to authenticate access and eliminate registering for additional accounts for sites which supported the Passport authentication method.  This also alleviated the users password being stored on the site’s database and instead a single, hopefully more trusted source being Microsoft.

Like many of Microsoft’s best plans the idea was solid but ultimately failed. This was partly due to several rebrands of the service confusing consumers alike as Passport changed to .NET  in 2001 which eventually morphed to the Windows LIVE ID in 2006 (and today is simply a Microsoft account). The other reason for the lack of success was a lack of incentive for third-parties to invest in the system, as the user would get the benefit of one less login but the service provider would lose any benefit of creating their own direct consumer database.

The next evolution of digital authentication called ‘Identity 2.0’ was based from the web 2.0 theory of the World Wide Web transition. An example of this in action is the Facebook login – a popular service, where you can login to other sites or application using your Facebook name and password. This implementation went far beyond Microsoft’s Passport.  Not only does it save users from having to remember yet another password, but the services are able to request information such as a user profile picture, address or contacts after user consent and display this natively on another site.   It also works the other way around where tasks done on the associated site could relay information back to facebook, such as ‘liking’ a page, setting a comment on your profile, or potentially most importantly sending information to your friend’s Facebook pages.

‘Identity 3.0’ was defined last year by the Global Identity Foundation and hopes to address the current concerns around digital authentication.  The new principles change it so that only one identity (which is unique and private) is needed, thus eliminating the need for a body to issue or record multiple identities. The identity of one entity to another remains cryptographically unique; negating the need for user-names or passwords and minimising the risk of too much personal information being aggregated.  Also the biometrics of the individual remain within their sole control, so biometric information will not be used, exchanged or stored outside the person’s control.

The principles outlined in Identity 3.0 show similarities to Apple’s approach to authentication with ‘Touch ID’ on the latest iPhones and iPads. Users are able to authenticate purchases direct from Apple with a fingerprint. Most importantly third-party software developers are also able to take advantage of this without compromising the biometric data.  Developers can write apps that use the individual’s fingerprint for authentication, be it a purchase or as a key to unencrypt emails, without the fingerprint data leaving the device, or without the user needing to enter a traditional password. Many such new devices linking user authentication with security access at work and crossing with personal lifestyle were reviewed in our blog dated 6th February.

With newly announced devices like this week’s Samsung Galaxy S6 sporting a similar, speedy fingerprint sensor to Apple’s Touch ID, it may not be long till most people have access to an alternative login like a finger print to alleviate entering passwords altogether.

Authentication has evolved significantly over the years, but depending on the devices and services you use, your own experience – and the amount of accounts you actively use – this will vary considerably. This in theory will only improve in the years to come, but the next big challenge in unified authentication could come from getting device and platform manufacturers to play nice with each other.  Whereas specific apps are available on only the most popular platforms like iOS and Android. This could turn out the same for login options. The market as always will ultimately go for the most simple and intuitive experience for the user.

32702648_s

New digital technology to stop blaggers unlawfully securing jobs
Who doesn’t want to appear better on paper?  Unfortunately according to Cifas, the UK’s fraud prevention service, 63% of all confirmed employment fraud in 2014 including CV fraud, related to people lying about their education, employment or qualifications.  So recruiting an honest, qualified employee may not be as easy as we thought.

The remedies in education are dealt with by universities subscribing to the Higher Education Degree Datacheck system. This logs the detail of degrees, diplomas etc. in subjects and levels achieved.  It also picks up bogus named establishments.

For businesses though, it is far more difficult, time consuming, costly and a considerable administrative task, involving checks on search engines and social networks. As a result, many organisations do their due diligence AFTER appointing someone, because to do so prior, would make the recruitment process literally grind to a halt, as most qualifications are not readily digitised (ie. mounted certificates).    The problems get particularly acute when dealing with jobs in fields such as finance and law that have a well-defined scheme of professional qualifications.  Inevitably though, with tough competition for jobs the final choice can rest on who has the best qualifications ‘on paper’.

Where technology steps in
Pearson have come up with a new digital solution called ‘Acclaim’.  Prospects get digital badges when they complete a particular course or project.  Neatly, the badge links back to the awarding body which can verify the person actually achieved that qualification. Additionally, metadata buried with the badge offers employers further insight into the qualifications.  Started in 2014, Pearson hope to issue 1 million digital badges in 2015.

The scheme has the buy-in from a number of professional organisations as well as trusted career sites such as LinkedIn. With signatories including Adobe, Microsoft’s Sales Academy, and IT consultancy Citrix, plus schools and colleges, it should start to level the playing field and create the necessary transparency especially in the IT and Technology field.  Happily for the IT industry, where a lot is achieved based on experience vs an academic qualification, the new Pearson system embraces this and career skills can be included in the new digital certificates.

Cifas report that the number of people being prosecuted for CV and qualification fraud is on the rise.  It is a crime – and people have been jailed for falsifying their education history.  It doesn’t seem worth it – but some small lies have led to very large cover ups.

Examples of CV Fraudsters ‘MOST WANTED’

• In 2012, former Yahoo boss Scott Thompson falsely claimed to have a computer science degree and had to step down once the truth was uncovered.
• Upping the ante even further was Marilee Jones, former dean of admissions at MIT, who claimed to have three University qualifications, two degrees and a doctorate, she had not earned. It took 28 years for the falsehoods to be unearthed. Ms Jones resigned soon after.
• Alison Ryan, would-be PR manager for Manchester United, claimed to have a first class degree from Cambridge. In fact, she got a second and had been banned from practising law. She was sacked from the £125,000 a year job at the football club in 2000.

14760864_s

Are Sony on solid ground?
Interviewed at this week’s Mobile World Congress, Kazuo Hirai CEO of Sony Pictures, was in an upbeat, honest mood despite being challenged on several fronts about the output from Sony recently.  When asked about the lack of impact with its Android phone, Hirai confessed Sony would keep a close eye on the profitability of its mobile phone arm, as the market was very volatile and carries many inherent risks.  If the ROI wasn’t still there, Hirai commented there were no guarantees of anything in the future – it was just the nature of the electronics business.

Neither has Sony stolen a march in the wearable technology field. Its smart ‘EyeGlass’ is clunky in comparison to its more slick rival, Google Glass.  Sony’s smartwatch and intelligent fitness bands are out there – but in a kind of ‘so what’ manner. Hirai acknowledged the market itself hadn’t yet decided what product most resonated with customers and was a challenge to all suppliers in this space – with everyone searching for the right feature and functionality set, form factor, convenience AND good battery life.

His reflections on the damage to Sony Pictures from the January cyber attack were robust but contemplative as he put the attack in context:  “The Government.. FBI’s enquiries told us that for 90% of companies, had they been attacked the way Sony Pictures were, they would also have been vulnerable, as it was not a run of the mill attack”.  Hirai added that cyber security and network security was a very high priority for them and had been for a long time since the Playstation attack several years ago.

sony_pictures_logo

 

Changes in the Air

VMWare and AirWatch have announced VMWare’s acquisition of the leading enterprise MDM and security management experts. In a deal expected to be around $1.175 billion in cash and $365 million in installation payments and unvested equity. With the top Airwatch board remaining at the table just with different reporting lines, the question will be how VMWare integrates AirWatch into their Horizon offering. With over 2 billion smart phones and tablets in the world and more than half of these touching enterprise, it is a sound business move – and could make the marketplace with competitor Citrix a good deal more interesting.