Käyttäjien omat laitteet ja ohjelmistot työpaikoilla - Esa Aho 31.5.2012
-
Upload
etelae-pohjanmaan-kauppakamari -
Category
Business
-
view
935 -
download
2
description
Transcript of Käyttäjien omat laitteet ja ohjelmistot työpaikoilla - Esa Aho 31.5.2012
Esa Aho
Cloud Office
Fujitsu Finland
BYOD Shadow-it
Varjo-it TOLT
Kuluttajistuminen
Varjo-organisaatio
Valo synnyttää aina varjon
Varjo-it
Social-it EUAD EUGC BUAD
End-user-it
BYOD ILCS Consumer-it
Personal cloud
Consumerisation
Mobilisation
Social media
Cloud
Vendor consumerisation
4 Copyright 2012 FUJITSU
Really?
more to productivity
than corporate-it.
Over the last
3 years user-it
added …
Enterprise Social Software
** Atlassian Confluence
BroadVision ClearVale
Clarizen Work MGMT Solutions
Concursive Corp, open source
Cyn.in, open source
** Elgg, open source
eXo Platform
** Google+, Sites etc.
** IBM Lotus Connections
INgage Networks
** Jive Software
Jumper 2.0, open source
Knowledge Plaza
** Microsoft SharePoint
MindTouch, open source
** NewsGator Technologies
nGenera
Novell Pulse
omCollab, open source
Open Text
Oracle Beehive
Oracle WebCenter
Present.ly by Intridea
Qontext
Socialtext
Socialwok
Telligent Systems
Traction Software
Tiki Wiki CMS , open source
XWiki
** Yammer
Yoolinkpro
** Trainer’s house sydän
** Cisco Quad
** Liferay, Open source
** Salesforce Chatter
Osaamattomat käyttäjät?
2013 PC tai Windows ei enää ole valtaa
pitävä ympäristö, vaan mobiilit järjestelmät
2014 mennessä 60% it-yksiköistä hankkii
sovelluksensa privaateista appstoreista
Mobiilisovelluksia tuotetaan 4 kertaa
enemmän kuin pc-pohjaisia.
Velositor, US survey
Enterprise and tablet computing?
Cool
Trendy
I want one
Apple
Microsoft
Cloud
always included iCloud
Google, Drive, ? Live, Skydrive, ?
Who owns your data?
Where does it travel?
email, files, calendar…
Who follow your comms?
Support?
Virtualisation
Separated secure business
apps for communication and
document management.
No sensitive data in tablet.
Management and governance…
another story.
Cloud provides business innovations
Rapid
Elasticity
On
Demand
Out
Sourced
Faster
Start Up
Network
Access
Minimal
Management Pay As
You Go
No
Capex Lower
Cost
Self
Service
Resource
Pooling
Historical division: it and business Centralised it
Rigid it methodologies
Few vendors, few choices, ”usual suspects”
Functionality over efficiency
Functionality over architecture
“The more critical and important the application is, more
harder it is to use and learn” “SAP rekisteröintivariantti”
What causes shadow-it?
Access and security
Licensed and controlled
Cost and efficiency, productivity
Single optimized environment
Traditional business app – form based user interface
Development mentality (long, complex, best practices)
Vs. quickly something which is good enough and fun to use
with easy access from anywhere and anytime
It way
Key Expectations of End-users
Expectations
Luxury of Choice,
Any Device
Less Problems,
Personal Help Access Anywhere
Access Anytime
Easy Access to
Corporate
Documentation
24/7 Services
Copyright 2011 FUJITSU
Applications Make
My Work Easier
Placeless team working
Copyright 2012 FUJITSU
High level it decision drivers
Copyright 2012 FUJITSU
More then 1 year ago, Cisco IT moved from an environment where all devices were corporate-owned and controlled, towards an environment allowing end users to choose from a broad catalog of devices as well as use their own devices.
One year later Mobile device count grew 59% up to
more then 43.000 devices. iPhones take up 40% of those devices, BlackBerry 32% and Cisco IT now sees a rapidly growing community of Tablet users (15%), as well as Android device users (10%).
Copyright 2012 FUJITSU
Case Cisco
Citrix (2011): 94% of enterprises will
accept BYOD around 2013.
Savitz & Viveros (2011): some kind of
BYOD exists already in over 70%.
Recognize shadow IT
Users can and users do
Modern enterprise can’t avoid it
Impact can be positive
Monitor
Guide
Keep threats in mind and
control them
Copyright 2012 FUJITSU
What to do?
Standardization Means Creating Dynamic it
The one-size-fits-all model is
under strain from consumer it
Consumer technology is an
opportunity, not a threat
Organizations will remove
technology constraints, such as
fat clients or high-touch/silo apps
People use their own technology
in the workplace
Organizations will have to be
able to determine the best source
of any service at any given time
Governance and risk perception will change
Greater agility and empowerment of users
Support agile working and fast decision-
making
Self-service and consumer services will
become the norm
Measurement
Shadow-it is a thermometer If it isn’t working, something else, ie. shadow-it is
Evolution of end-user services
2008 2011 2014 2017
Locked & well
managed PCs
Hosted shared
desktops (VCS)
Reverse
apps
publishing
Synch. local
VM cache
Virtual desktops App
virt.
Personal
Cloud - SUI
Virtual profiles Context aware
provisioning
Corporate
cloud
Private
cloud App
repositories
Workspaces for
individuals, projects,
teams, expert networks
And discussion follows…
Esa Aho, Fujitsu Finland
Twitter: @esa100
Google+: esa aho
Web: www.technology-perspectives.com
Google Play: Technology Perspectives