Main
Log in

Infrastructure

The topic of Bring Your Own Device (BYOD) has resurfaced this year. While this is an important trend that needs to be examined by IT organisations, be careful to separate the facts from the hype. Here are the four most common myths that I keep hearing.

Conclusion: Creating a lightweight governance framework for mobility is essential in ensuring that mobility applications are developed quickly and effectively, and are aligned to organisational objectives. The ideal mobility governance framework provides an agile environment to enable solutions to be developed using shared architectures, and focuses on "what can be done" rather than "what can't be done.” The key is to ensure that the governance framework remains focused on decision-making, as opposed to restricting mobility “run-away mobility deployments”.

Related Articles:

"Coping with Mobility - Part 3: aligning generic use cases to application development approaches" IBRS, 2012-04-30 00:00:00

"Coping with Mobility - Part 2: First steps towards a holistic mobility strategy" IBRS, 2012-03-29 00:00:00

"Coping with Mobility - part 1: mobile architecture and the enterprise" IBRS, 2012-02-28 00:00:00

"Coping with mobility - part 5: developing the strategy" IBRS, 2012-10-28 00:00:00

"Coping with mobility Part 6: Work context" IBRS, 2013-06-26 00:00:00

Conclusion: The speed and disruptive effects of consumerisation in the mobile market surprised many organisations that were looking back, not forward. Even mobile providers have not anticipated rates of change and must invest millions to remain competitive.

Over the next three to four years the mobile market will face stark realities in a fully developed and oversupplied market. Providers will have to manage costs, improve service delivery and raise user revenue. That is not an easy set of objectives to achieve. The effect of raising revenues and cost management on users could be disruptive as users seek to maintain price and service levels they have enjoyed for some time. Organisations may have to manage another round of change when it comes.

Conclusion: IBRS has found that many organisations’ mobility needs can be covered by just one or two “generic use case” categories, thus many user demands for mobility can be met with just one or two development approaches.

Related Articles:

"Coping with Mobility - Part 2: First steps towards a holistic mobility strategy" IBRS, 2012-03-29 00:00:00

"Coping with Mobility - part 1: mobile architecture and the enterprise" IBRS, 2012-02-28 00:00:00

"Coping with mobility - part 4: governance" IBRS, 2012-05-31 00:00:00

"Coping with mobility - part 5: developing the strategy" IBRS, 2012-10-28 00:00:00

"Coping with mobility Part 6: Work context" IBRS, 2013-06-26 00:00:00

Conclusion: In spite of some benefits in security, remote access and speed of deployment, VDI has remained a niche product. This has largely been due to the higher complexity and much greater capital cost compared with a Full Desktop. However, as VDI infrastructure innovations continue to close the gap, the adoption of VDI will increase beyond this small base. Due to the risks and costs of switching from a well understood model to a relative unknown model, the adoption will increase at a moderate rate and there never will be a “year of VDI”.

Related Articles:

"Is this the year of VDI? (Part 1)" IBRS, 2012-02-29 00:00:00

Circa 1960: The “Hard theory of platforms”

In the early days of information technology, hardware was THE platform. Companies such as IBM and DEC provided the big iron. Business software was THE application. In those days even software was as hard as stone. The term application platform was unheard of.

Conclusion: No, and there never will be “the year of VDI”. However, now that the capital cost of VDI is close to that of a Full Desktop the adoption of VDI will begin to increase beyond its current small niche. The large capital cost and complexity of replacing the existing desktop fleet, the perceived risks in using to a new desktop approach, and a general lack of experienced staff will ensure adoption of VDI will proceed slowly.

For the next 5-7 years organisations will continue to use a range of desktop deployment techniques (such as Full Desktop, Laptop, Remote Desktop Services aka Terminal Server) with VDI being just one of many.

Related Articles:

"Is this the year of VDI? (Part 2)" IBRS, 2012-03-30 00:00:00

Conclusion: The foundation of any BYO device initiative is a robust BYO device policy. The policy must set the boundaries for acceptable use, costs and security. Ensure device security is driven by business stakeholders and is based on pragmatic risk analysis rather than technical concerns from IT staff, or FUD from vendors who are anxious to sell their wares.

Robust policy, strong corporate culture and proper training can be more effective than technology in securing corporate data and controlling costs and risk. Use policy, culture and training to drive compliance, minimising the need for complex and expensive technological controls.

Related Articles:

"BYO Devices (Part 1): Adoption in ANZ" IBRS, 2011-11-26 00:00:00

Conclusion: The forecast growth of data transmission over the Internet in the next decade means the role of content distribution networks will probably rise. As demands on bandwidth grow, efficient management of online data will be at the centre of many organisations’ online delivery strategy.

While it may seem that improved broadband and the arrival of the NBN (when that occurs) will solve the issues of speed, it will not because more users, richer media and more applications will fill the bandwidth. Consequently a content distribution network (CDN) strategy ought to be part of any organisation’s online planning.

Conclusion: The idea of Bring-Your-Own (BYO) Laptop has been bandied about for the last seven years, but it is not as common as implied by the press. Few ANZ organisations have BYO Laptops, however some have implemented BYO smartphones and many intend to do so in the next 18 months.

The driver of BYO device in the organisation is not avoidance of the capital costs but rather the need to accommodate users’ expectations of technology, which have been significantly increased by the consumerisation of IT, and largely driven by the iPhone and iPad.

Related Articles:

"BYO Devices (Part 2): Policy" IBRS, 2011-12-28 00:00:00

In the News

Managed security: a big gamble for Aussie IT providers - CRN - 02 August 2018

TechSci Research estimates the Australian managed security services (MSS) market will grow at a CAGR of more than 15 percent from 2018-23 as a result of the increased uptake of cloud computing and...
Read More...

Kids, Education and The Future of Work with Dr Joseph Sweeney - Potential Psychology - 25 July 2018

What is the future of work and how do we prepare our kids for it? Are schools and universities setting kids up for future success? Does technology in the classroom improve outcomes for kids? Should...
Read More...

PageUp starts rebuilding and looks to learn lessons after data breach nightmare - AFR - 27 June 2018

The timing couldn't have been worse for PageUp; two days before Europe's new data protection regime came into force the Melbourne-based online recruitment specialist's security systems detected...
Read More...

Australia is still in the cyber security dark ages - AFR - 28 June 2018

In terms of cyber security years, Australia is still in the dark ages, a period typified by a lack of records, and diminished understanding and learning. We're only a few months into practising...
Read More...

AMP does maths on infosec shortage - ITnews - 18th June 2018

Cyber security and risk advisor at analyst firm IBRS, James Turner, said the cyber skills shortage was prompting a wider rethink around the domain in terms of resourcing for the last few years....
Read More...

Subscribe to IBRS Updates

Invalid Input
Invalid Input
Please enter a valid email address
Please enter your mobile phone number
Invalid Input

Get in-context advice from our experts about your most pressing issues or areas of interest

Make an Inquiry

Sitemap

Already a subscriber?

Login to read your premium content.

        Forgot your password?
Recently Viewed Articles
Related Articles