Mobile and BYOD Strategy
|
|
|
- Cecilia King
- 10 years ago
- Views:
Transcription
1 Mobile and BYOD Strategy Bring Your Own Device Danairat T. Certified Java Programmer, TOGAF Silver
2 Agenda Introduction to Mobile Technology Mobile Computing Bring Your Own Device Mobile Computing and BYOD Benefits Mobile Computing and BYOD Challenges Comprehensive Mobile & BYOD strategy Summary 2
3 Digital Trends Mainframe Client/Server Internet Mobile, Social, Big Data & the Cloud Every 60 seconds: 698,445 Google searches 695,000 status updates 217 new mobile web users 100,000 tweets 168 million+ s sent 11 million instant messages 3
4 Mobile Computing Mobile devices are shared more often Mobile devices have multiple personas Mobile devices are diverse. Mobile devices are used in more locations Mobile devices prioritize the user Personal phones and tablets shared with family Enterprise tablet shared with coworkers Social norms of mobile apps vs. file systems Work tool Entertainment device Personal organization Security profile per persona? OS immaturity for enterprise mgmt BYOD dictates multiple OSs Vendor / carrier control dictates multiple OS versions A single location could offer public, private, and cell connections Anywhere, anytime Increasing reliance on enterprise WiFi Conflicts with user experience not tolerated OS architecture puts the user in control Difficult to enforce policy, app lists 4
5 Security is the leading barrier to mobile adoption Drivers for Adopting Mobile Barriers to Adopting Mobile Base: Those who deployed/piloted/plan to adopt mobile, excluding don t know (n=1117) Base: Those who deployed/piloted/plan to adopt mobile, excluding don t know (n=1115) 5 October Tech Trends Report (Weighted by GMV IBM Proprietary) IBM Market Insights IBM Confidential 5
6 What is BYOD? A device utilized for communicative and informational purposes in the workplace and personal life. Some prominent examples include: Smartphone ipad Laptop Tablet 6
7 Enterprise Mobility Terms BYOD Enterprise Mobility Mobile Device Management (MDM) Mobile Application Management (MAM) Over the Air (OTA) Transmission Virtual Desktop Infrastructure (VDI) User Experience 7
8 Consumerization of IT is driving BYOD adoption According to Gartner, Tablet BYOD programs are in place at 47% of companies 8
9 Workforce mobility trends According to the GSA, telework delivers a % ROI through increased productivity, reduced absenteeism, lower real estate costs, and reducted recruitement needs Mobile Work Exchange April
10 Mobile Computing and BYOD Benefits Increased Productivity Employee Satisfaction Scalability ( Elasticity ) Business agility Data Messaging Business Applications Lower Capital Expense Improved user experience Innovation 10
11 Mobile Computing and BYOD Challenges Top Mobile Barriers Federal IT Executives Security 73% Budgets Policies Technical Leadership Culture 35% 30% 27% 42% 60% 0% 50% 100% Federal & corporate IT leaders are struggling with: C-Level pressure to act now Security of proprietary data and systems Technology integration Service performance Budgets / BYOD hidden costs Lack of corporate policies Top Cloud Barriers IT Leaders 46% 32% 25% Security Performance Integration Mobile Work Exchange Survey May 2013 Cultural adoption & training Rapid pace of technology change Large & growing # of vendors Regulatory & mandate compliance Supporting multiple OS / Plaforms CDW 2013 State of the Cloud Report Changes to organizational R&R 11
12 Software solutions exists to deal with some challenges Software Mobile Device Management (MDM) Mobile Application Management Mobile Application Development Platform Network Access Control (NAC) Virtual Desktop Infrastructure (VDI) Features Software that secures, monitors, manages and supports mobile devices deployed across mobile operators, service providers and enterprises. MDM functionality typically includes over the air (OTA) distribution of applications, data and configuration settings for all types of mobile devices This applies to both company-owned and employee-owned (BYOD) devices across the enterprise or mobile devices owned by consumers Software to add, remove, or update custom or 3 rd party applications in a centralized fashion. Includes user authentication, authorization, and grouping; over the air (OTA) application provisioning, automated application provisioning, automated application configuration, application updates, application back-up, application removal, application white list and black list management A comprehensive suite of products and services that enable development and deployment of mobile applications A networking solution used to define and implement a policy that describes how to secure access to network nodes by devices when they initially attempt to access the network. Aims to control access to a network with policies, i Hosting a desktop operating system within a virtual machine (VM) running on a hosted, centralized or remote server 12
13 Comprehensive Mobile & BYOD strategy Enterprise Strategy Enterprise strategy and vision Strategy Enterprise Strategy Workforce enablement Business processes Customer, suppliers & partners Marketing and adoption plans 13
14 Comprehensive Mobile & BYOD strategy Program Governance Portfolio management Performance measurement Strategy Governance Organizational structure Expense and asset management Corporate policies 14
15 Comprehensive Mobile & BYOD strategy Security Security Policies Risk Management Strategy Security Network access and control Device & application management 15
16 Comprehensive Mobile & BYOD strategy Applications Application strategy Strategy Applications Application architecture User experience and design IT capabilities & processes 16
17 Mobile and BYOD Assessment Tool Mobile Readiness & Maturity Score Card Category Evaluation Component Maturity Score Gaps & Summary Findings Enterprise Strategy Enterprise strategy & vision Workforce enablement Business processes Customers, suppliers, & partners Marketing & adoption plans Governance Portfolio management Performance measurement Organizational structure Expense & asset management Mobile policies Security Mobile security policies Risk management Network access & control Device & application management Applications Application strategy Application architecture User experience & design Capabilities & processes Level 0 - None Level 1 - Low Level 2 - Medium Level 3 High Level 0 - None Level 1 Low Level 2 - Medium Level 3 - High Level 0 None Level 1 Low Level 2 - Medium Level 3 - High Level 0 None Level 1 Low Level 2 - Medium Level 3 High Level 0 - None Level 1 Low 17
18 Mobile and BYOD Strategy Roadmap Initiative Enterprise Strategy Established Executive Steering Committee Define Mobile Vision Governance Webinars Product Reports 3 rd Party Research Develop Corporate Mobile Policies Security MDM Deployment NAC Upgrade Mobile Security Policies Applications HR Pilot App MEAP Vendor Evaluation Accounting / Finance Budget Approval Process Unified Communications RFP Workforce Training Sales and Marketing Team Business Unit 1 Team Accounting / Finance Team Sponsor PMO CIO / CMO HR VP Products R&D Legal / CIO CIO VP Eng. CSO HR / CIO CIO CFO / CIO CIO HR HR HR JUN JUL AUG SEPT OCT 18
19 Separate Work From Fun Make sure employees understand the rules and the risks. Work life and personal life should be kept separate. To get network access, employees must agree to acceptable use policies. IT should monitor activity. 20
20 References and Recommended Reports CDWs 2013 State of the Cloud Report Mobile Work Exchange Digital Government Strategy Report May 2013 Digital Government: Building a 21 st Century Platform to Better Serve the American People May
21 Thank you very much. 24
6 Things To Think About Before Implementing BYOD
6 Things To Think About Before Implementing BYOD Kimber Spradlin, CISA, CISSP 2012 IBM Corporation Mobile Devices: Unique Management & Security Challenges Mobile devices are shared more often Mobile devices
BRING YOUR OWN DEVICE
WHITE PAPER BRING YOUR OWN DEVICE This white paper from Stylusinc addresses on how to introduce BYOD programs in an enterprise and how an IT department can implement a practical and a secure strategy.
Mobile Device Management in the Systems Management Ecosystem. Katie Wiederholt, Dell Software
Mobile Device Management in the Systems Management Ecosystem Katie Wiederholt, The forces driving change in mobility Agenda The journey to MDM Where do we want to be and mobile security technologies 2
Desktops in the Cloud: Beyond the Hype
Desktops in the Cloud: Beyond the Hype Building the Next Generation of the Cloud Sumeet Sabharwal, GM, NaviSite 17 th June, 2014 Agenda Background context and opportunity Desktop virtualization overview
Managing Mobility in the BYOD Era:
Managing Mobility in the BYOD Era: New technology requires new thinking Clint Adams Director of Mobile Technology Services [email protected] BYOD is Accelerating 350 million employee-owned devices in
Enable a secure Digital Workspae in Your Enterprise Tuni Baraka Enterprise Account Executive VMware AirWatch
Enable a secure Digital Workspae in Your Enterprise Tuni Baraka Enterprise Account Executive VMware AirWatch 2016 VMware Inc. All rights reserved. A Leader in Enterprise Mobility Management & Security
The Virtual Workspace, the Next Phase of VDI
The Virtual Workspace, the Next Phase of VDI May 2012 Prepared by: Zeus Kerravala The Virtual Workspace, the Next Phase of VDI by Zeus Kerravala May 2012 º º º º º º º º º º º º º º º º º º º º º º º º
1 Executive Summary... 3. 2 Document Structure... 5. 3 Business Context... 6
Contents 1 Executive Summary... 3 2 Document Structure... 5 3 Business Context... 6 4 Strategic Response... 8 4.1 Platform... 8 4.2 Network... 10 4.3 Unified Communications... 11 5 Implementation status...
BT One. Analyst and consultant update, September 2012. BT One. Communications that unify 1
BT One Analyst and consultant update, September 2012 BT One. Communications that unify 1 BT One Agenda Introductions Neil Sutton Vice President Global Portfolio BT One Overview Andrew Small Vice President
Consumerization. Managing the BYOD trend successfully. Harish Krishnan, General Manager, Wipro Mobility Solutions WWW.WIPRO.COM
Consumerization Managing the BYOD trend successfully WWW.WIPRO.COM Harish Krishnan, General Manager, Wipro Mobility Solutions Employees dictate IT Enterprises across the world are giving in to the Consumerization
Secure Enterprise Mobility Management The system integrator point of view. www.unisystems.com
Secure Enterprise Mobility Management The system integrator point of view www.unisystems.com 1 Mobility is Top of Mind Mobility Is Top of Mind 50% of Companies Have Adopted Companywide Mobility Strategy*
Mobility Challenges & Trends The Financial Services Point Of View
Mobility Challenges & Trends The Financial Services Point Of View Nikos Theodosiou Cloud Computing Solutions Presales/Marketing Engineer The New World Agenda The Mobile World The Challenges The Solutions
From PC to Workplace. Productivity. Chris Ingle. Copyright IDC. Reproduction is forbidden unless authorized. All rights reserved.
From PC to Workplace Productivity Chris Ingle Copyright IDC. Reproduction is forbidden unless authorized. All rights reserved. Agenda How Did We Get Here? Evolving Employee Expectations Rapidly Developing
#mstrworld. Support BYOD with MicroStrategy Mobile to cut costs and deploy to 1000s
#mstrworld Support BYOD with MicroStrategy Mobile to cut costs and deploy to 1000s!! Ivar Ljungberg Principal Consultant, MicroStrategy Mobile Advisory Team, EMEA BYOD Agenda What is BYOD? Why BYOD? Challenges
4/28/2014. What's the Scoop on Cloud Computing. Agenda. Why you are here?
What's the Scoop on Cloud Computing and Virtualization? ation? April 30, 2014 Jason Wampler, Director of IT, Association Forum of Chicagoland Agenda History and Conceptual Overview of Virtualization &
CONSUMERIZATION OF IT BYOD and Cloud-based File Storage
CONSUMERIZATION OF IT BYOD and Cloud-based File Storage Moderator: John Payne, Principal Consultant, Pueblo Technology Group, Inc. Speakers: Royce Holden, Director of Information Technology, Greater Asheville
Taking Virtualization to the Next Level: Private Cloud and Bring Your Own Device (BYOD)
Taking Virtualization to the Next Level: Private Cloud and Bring Your Own Device (BYOD) Presented by: Barb Goldworm Founder, President & Chief Analyst, FOCUS Taking Virtualization to the Next Level Key
How to Turn the Promise of the Cloud into an Operational Reality
TecTakes Value Insight How to Turn the Promise of the Cloud into an Operational Reality By David Talbott The Lure of the Cloud In recent years, there has been a great deal of discussion about cloud computing
Mobile Device Management Underpins A Bring-Your-Own- Device (BYOD) Strategy
A Custom Technology Adoption Profile Commissioned By Sybase/SAP Mobile Device Management Underpins A Bring-Your-Own- Device (BYOD) Strategy July 2012 Forrester Surveys Show Surging Demand For Consumerization
BYOD(evice) without BYOI(nsecurity)
BYOD(evice) without BYOI(nsecurity) Dan Houser CISSP-ISSAP CISM Goran Avramov MCSE+M VCP4 Cardinal Health Session ID: HOT-107 Session Classification: Intermediate Agenda Drivers for Bring Your Own Device
GOVERNMENT USE OF MOBILE TECHNOLOGY
GOVERNMENT USE OF MOBILE TECHNOLOGY Barriers, Opportunities, and Gap Analysis DECEMBER 2012 Product of the Digital Services Advisory Group and Federal Chief Information Officers Council Contents Introduction...
VMware Horizon DaaS: Desktop as a Cloud Service (DaaS)
VMware Horizon DaaS: Desktop as a Cloud Service (DaaS) 1 43% of workforce using 3+ devices 74% of employees use consumer technologies, due to a lack of alternatives from IT 2010 The year the number of
Succeeding in your BYOD initiative with the MicroStrategy Mobile App Platform
Succeeding in your BYOD initiative with the MicroStrategy Mobile App Platform Bryan Kolburn, Sr. Director, Mobile Service Line MicroStrategy [email protected] The Mobile Service Line A commitment
Securing and Auditing Cloud Computing. Jason Alexander Chief Information Security Officer
Securing and Auditing Cloud Computing Jason Alexander Chief Information Security Officer What is Cloud Computing A model for enabling convenient, on-demand network access to a shared pool of configurable
AirWatch Solution Overview
AirWatch Solution Overview Marenza Altieri-Douglas - AirWatch Massimiliano Moschini Brand Specialist Itway 2014 VMware Inc. All rights reserved. Cloud Computing 2 BYOD 3 Device aziendali? 4 From Client/Server
EMPOWERING THE DYNAMIC WORKPLACE
EMPOWERING THE DYNAMIC WORKPLACE Matrix42 has been positioned in the visionary quadrant of the Gartner Magic Quadrant as the only vendor that enables organizations to manage physical, virtual and mobile
Hosted Virtual Desktops (VDI)
Hosted Virtual Desktops (VDI) Secure and cost-effective delivery of Windows desktops and applications as a cloud service, to any device, anywhere, with predictable costs Hosted by Powered by Features Hosted
Meet the BYOD, Computing Anywhere Challenge: Planning and License Management for Desktop Virtualization
Meet the BYOD, Computing Anywhere Challenge: Planning and License Management for Desktop Virtualization Barb Goldworm Founder, president & chief analyst, FOCUS, LLC [email protected] The
Page 2. Most Of The Information Workforce Now Works Remotely
The workplace landscape is changing rapidly as people walk into the office with the expectations and sometimes the tools they carry from home. The requirements for flexibility rise even higher as employees
How To Manage A Mobile Device Management (Mdm) Solution
Mobile Device Management Buyers Guide IT departments should be perceived as the lubricant in the machine that powers an organization. BYOD is a great opportunity to make life easier for your users. But
End User Computing - Cloud Client Computing
End User Computing - Cloud Client Computing Eduoard Lorrain, VMware David Angwin, Dell The Growing Complexity of Today Diverse Apps Data Everywhere Diverse Platform Diverse Devices Mobile Corporate Devices
McAfee Enterprise Mobility Management Versus Microsoft Exchange ActiveSync
McAfee Enterprise Mobility Management Versus Microsoft Secure, easy, and scalable mobile device management Table of Contents What Can Do? 3 The smartphone revolution is sweeping the enterprise 3 Can enterprises
Matthias Kuemmel, HP Imaging and Printing Group. Date: 24/05/2011
Cloud Services Threat or Chance? Matthias Kuemmel, HP Imaging and Printing Group Date: 24/05/2011 Agenda Cloud Computing what is it? HP Cloud Strategy and Solutions Cloud Printing current state Example:
trends and audit considerations
Bring your own device (BYOD) trends and audit considerations SIFMA IT audit session 4 October 2012 Disclaimer Ernst & Young refers to the global organization of member firms of Ernst & Young Global Limited,
Take Your Rocket U2 Apps Mobile with Rocket LegaSuite. Greg Mummah, Product Manager Rocket Software
Take Your Rocket U2 Apps Mobile with Rocket LegaSuite Greg Mummah, Product Manager Rocket Software Greg Mummah Product Manager Managed application modernization team at municipal government software vendor
Enterprise App Stores: An idea whose time has come?!
Enterprise App Stores: An idea whose time has come?! RSG Webinar " Jan 23, 2014" Kashyap Kompella @realstorygroup Hashtag #RSGWebinar A brief intro to Real Story Group We are a technology research & advisory
BYOD: Should Convenience Trump Security? Francis Tam, Partner Kevin Villanueva, Senior Manager
BYOD: Should Convenience Trump Security? Francis Tam, Partner Kevin Villanueva, Senior Manager 1 AGENDA Mobile Explosion Mobile Trends BYOD Benefits, Challenges and Threats BYOD Security BYOD Strategy
CREATING AN EFFECTIVE SUPPORT PLAN FOR BYOD: A BEST PRACTICE GUIDE
CREATING AN EFFECTIVE SUPPORT PLAN FOR BYOD: A BEST PRACTICE GUIDE Delivering The Connected Enterprise Workforce Enablement Asset Management Customer Engagement Network Infrastructure Introduction Bring
Applying System Thinking Concepts in Cyber Security Architectural Design of Enterprise Network Systems
MIT SDM Systems Thinking Webinar Series Applying System Thinking Concepts in Cyber Security Architectural Design of Enterprise Network Systems By Charles Iheagwara, Ph.D, SDM 10 Outline The traditional
Enabling IT Performance & Value with Effective IT Governance Assessment & Improvement Practices. April 10, 2013
Enabling IT Performance & Value with Effective IT Governance Assessment & Improvement Practices April 10, 2013 Today's Agenda: Key Topics Defining IT Governance IT Governance Elements & Responsibilities
BYOD & MOBILE SECURITY
2013 surve y results BYOD & MOBILE SECURITY Group Partner Information Security Sponsored by Symantec KPMG Zimbani MailGuard INTRODUCTION Welcome to the 2013 BYOD & Mobile Security Report! Bring Your Own
Andrej Zdravkovic Regional Vice President, Platform Solutions Intellinet
Andrej Zdravkovic Regional Vice President, Platform Solutions Intellinet Platforms Operations Process Productivity Alignment Marketplace What We Do Business Transformation Through Strategic. Technology-Enabled.
Cisco BYOD Smart Solution: Take a Comprehensive Approach to Secure Mobility
Solution Overview Cisco BYOD Smart Solution: Take a Comprehensive Approach to Secure Mobility What You Will Learn Whether you want to simply allow tablets on your network or transform business processes
Enterprise Mobility: The Impact of Changing Employee Behaviour
Enterprise Mobility: The Impact of Changing Employee Behaviour Richard Absalom, Principal Analyst, Enterprise Mobility [email protected] / @RichAbsalom 23 April 2015 1 About Ovum Leading independent
HDAA BYOD Workshops May 2013
HDAA BYOD Workshops May 2013 Discussion Mobility Trends in Australia BYOD and Consumerisation of IT Implications Checklist 2 Macro Trends GEOGRAPHIES Asia Pacific fastest growing Smart Mobile Device market
IBM Mobile Security DELIVERING CONFIDENCE. Vijay Dheap Global Product Manager, IBM Mobile Security Solutions IBM Master Inventor Twitter: @dheap
IBM Mobile Security DELIVERING CONFIDENCE Vijay Dheap Global Product Manager, IBM Mobile Security Solutions IBM Master Inventor Twitter: @dheap It s a (Smarter) Mobile World! In 2011 sales of smartphones
How to Execute Your Next Generation of Mobile Initiatives. Ian Evans Vice President and Managing Director- EMEA, AirWatch by VMware
How to Execute Your Next Generation of Mobile Initiatives Ian Evans Vice President and Managing Director- EMEA, AirWatch by VMware Company Facts 12000 1,800 employees 150 countries 17 languages 11 global
Generating leads with Meraki's Systems Manager. Partner Training"
Generating leads with Meraki's Systems Manager Partner Training Agenda Systems Manager overview Starting the conversation & uncovering opportunities Sales tools and collateral Systems Manager solution
What Is Cisco Mobile Workspace Solution?
Solution Overview Cisco Mobile Workspace Solution A Whole New Level of Worker Mobility Basic mobile connectivity for employees using personal devices has been around for a while, bringing both benefits
Extending the Power of Virtualization in End-User Computing Barry Flanagan End-User Computing Partner Strategy
Extending the Power of Virtualization in End-User Computing Barry Flanagan End-User Computing Partner Strategy 2014 VMware Inc. All rights reserved. IT Management Processes are Not Optimized For Change
Mobile Madness or BYOD Security?
Mobile Madness or BYOD Security? How to take control of your mobile devices By Barbara Hudson, Senior Product Marketing Manager The Bring Your Own Device paradigm has rapidly moved from novelty to near
Security and Compliance challenges in Mobile environment
Security and Compliance challenges in Mobile environment Emerging Technologies November 19, 2013 Bob Bastani Introductions Bob Bastani, Security & Compliance Program Manager, IBM, 301-803-6078, [email protected]
BYOD THE SMALL BUSINESS GUIDE TO BRING YOUR OWN DEVICE
BYOD THE SMALL BUSINESS GUIDE TO BRING YOUR OWN DEVICE INTRODUCTION The technological revolution has made us dependent on our mobile devices, whether we re at home, in the office, on the go or anywhere
How To Support Bring Your Own Device (Byod)
WHITE PAPER: EXPLOITING THE BUSINESS POTENTIAL OF BYOD........................................ Exploiting the business potential of BYOD (bring your own device) Who should read this paper This paper addresses
Answers to these questions will determine which mobile device types and operating systems can be allowed to access enterprise data.
Mobility options and landscapes are evolving quickly for the corporate enterprise. Mobile platform providers such as Apple, Google and Microsoft, and leading device hardware vendors are constantly updating
UNIFIED COMMUNICATIONS
UNIFIED COMMUNICATIONS DELIVERING ENTERPRISE PRODUCTIVITY, EFFICIENCY, AND BUSINESS VALUE By Debra Chin Senior Vice President Palmer Research TABLE OF CONTENTS Executive Summary.... Page 3 Unified Communications
Future Focus: What s Coming in Enterprise Mobility Management (EMM) FUTURE FOCUS. What s Coming in Enterprise Mobility Management.
1 FUTURE FOCUS What s Coming in Enterprise Mobility Management Whitepaper 2 Future Focus: What s Coming in Enterprise Mobility Management (EMM) There s far more power in modern smartphones and tablets
Hosted Desktop for Business
Your complete guide to Hosted Desktop Hosted Desktop for Business 1 Doc V1.0 Jan 2014 Table of Contents Hosted Desk- 3 Hosted Desktops today... 4 What is a hosted desktop? 4 How does it work? 6 How easy
Preparing your network for the mobile onslaught
IBM Global Technology Services Thought Leadership White Paper Preparing your network for the mobile onslaught How networks can overcome the security, delivery challenges posed by mobile devices 2 Preparing
BYOD Guidelines A practical guide for implementing a successful BYOD Management program in an organization of any size.
April 2014 BYOD Guidelines A practical guide for implementing a successful BYOD Management program in an organization of any size. Bring your own device (BYOD) refers to the policy of permitting employees
People-centric IT: Bedeutung für das Identity und Access Management. Uwe Lüthy Solution Sales Specialist Core Infrastructure Microsoft Schweiz Gmbh
People-centric IT: Bedeutung für das Identity und Access Management Uwe Lüthy Solution Sales Specialist Core Infrastructure Microsoft Schweiz Gmbh Cloud OS Vision Microsoft s vision of the unified platform
Network and Device Level Mobile Security Controls IT Considera-ons in the BYOD Era
Network and Device Level Mobile Security Controls IT Considera-ons in the BYOD Era Sco$ Gordon CISSP- ISSMP Vice President, ForeScout June 14, 2012 2012 ForeScout, Page 1 Bring Your Own Device BYOD Many
DEPLOYMENT. ASSURED. SEVEN ELEMENTS OF A MOBILE TEST STRATEGY. An Olenick & Associates White Paper
DEPLOYMENT. ASSURED. SEVEN ELEMENTS OF A MOBILE TEST STRATEGY An Olenick & Associates White Paper July 2013 Contents Executive Summary... 1 Mobile Vision... 3 QA Methodology and Process... 4 Deployment
2011 Forrester Research, Inc. Reproduction Prohibited
1 Developing A Successful Mobile Strategy Christian Kane Analyst Forrester Research May 31, 2012 2 2011 2009 Forrester Research, Inc. Reproduction Prohibited Agenda Workforce trends for supporting mobile
Providing a work-your-way solution for diverse users with multiple devices, anytime, anywhere
Solution Overview BYOD Smart Solution Providing a work-your-way solution for diverse users with multiple devices, anytime, anywhere 2012 Cisco and/or its affiliates. All rights reserved. This document
A Strawman Model. NIST Cloud Computing Reference Architecture and Taxonomy Working Group. January 3, 2011
A Strawman Model NIST Cloud Computing Reference Architecture and Taxonomy Working Group January 3, 2011 Objective Our objective is to define a neutral architecture consistent with NIST definition of cloud
Maximizing Your Desktop and Application Virtualization Implementation
Maximizing Your Desktop and Application Virtualization Implementation The Essentials Series sponsored by David Davis Article 1: Using Hosted Applications with Desktop Virtualization... 1 The State of Desktop
