Six Possible Emerging Roles in Future of IT

CEB published thoughts on the Future of IT they highlighted how the way we work is changing.

Specifically, how trends such as globalization, economic change, externalization, and consumerization have created a new work environment.

CEB have estimated that 97% of IT roles will undergo change by 2017, but less than 40% of organizations have a strategy to hire, develop,
and retain critical IT roles and skills as these changes occur.

As IT responds to these changes, 6 new roles are emerging:

Technology Broker

Cloud Integration Specialist

End-to-End IT Service Manager

User-Experience Guru

Information Insight Enabler

Collaboration and Social Media Evangelist


All major IT leadership roles will also see a change in focus.

Learn more about the changes expected for each IT executive role and a member of the team will be in touch to follow up.

 

Click for more at source

 

 

 

 

Advertisements

Stunning news the technology industry losses a pioneer – Ed Iacobucci (59) co-founder of Citrix dies of cancer


BOCA RATON, FL – June 21, 2013 – VirtualWorks Group cofounder and Chairman Edward E. Iacobucci passed away at his home this morning after a 16month battle
with pancreatic cancer. Iacobucci was a renowned technology pioneer and entrepreneur who co
founded Citrix.

Recipient of the 1998 Ernst & Young International Entrepreneur Award, Iacobucci was quoted assaying, “Every human being has his own vision of what’s happening
in the future. I was lucky in that what I thought would happen did happen. When we know we can do it and the rest of the world doesn’t – that’s when things get interesting.”

“Ed’s clear vision of the technological future is becoming more of a reality every day,” stated Erik Baklid,

VirtualWorks President and CEO. “His courage and entrepreneurial spirit were matched by his inclusive leadership style, warm heart and good humour.
Ed will be deeply missed by the many employees, customers, partners and friends whose lives he touched.”

“We are deeply saddened by the loss of Ed Iacobucci and we send our sincerest sympathies, thoughts and prayers to his family,” said Mark Templeton, President
and CEO of Citrix Systems. “Ed’s spirit of entrepreneurship, creativity, passion and persistence will always remain at the core of Citrix. We are proud to carry his wondrous
torch forward.”

Iacobucci was born on September 26, 1953 in Buenos Aires, Argentina to Dr Guillermo and Costantina Iacobucci. He is survived by his wife, Nancy Lee (Iacobucci); his
three children, Marianna (Eden), William (Iacobucci), and Michelle (Iacobucci); mother, Costantina (Iacobucci); brother, Billy (Iacobucci); and three grandchildren, Sophia,
Haven and Estelle.

For extensive background on Iacobucci’s 30yeartechnology career, please visit:

http://www.virtualworks.com/resources/downloads/backgrounder/EdwardIacobucciBiography.pdf

YOUTUBE ON THE HISTORY OF ED

 
 

Charles Aunger:

“All I can say is what an amazing gentleman, had the chance to speak with and work with in the early days of Citrix, stunning insight, visions, spirit and passion” Ed Iacobucci helped change and bring about an industry call Windows thin clients, VDI, Terminal Services, Cloud whole industry sectors that wouldn’t be here without this amazing person.”

 
 

Click more at source

Build a tower, to build a team : The Marshmallow Challenge

 

We have most likely during our careers had to attend a team building events and had to build a tower.

Tom Wujec presents some surprisingly deep research into the “marshmallow problem” – A simple team-building exercise that involves dry spaghetti,
one yard of tape and a marshmallow. Who can build the tallest tower with these ingredients? And why does a surprising group always beat the average?

Tom Wujec studies how we share and absorb information. He’s an innovative practitioner of business visualization — using design and technology to help
groups solve problems and understand ideas. He is a Fellow at Autodesk

Tom talk about some interesting and basic results that have an effect on outcomes of the Marshmallow Challenge.

The Marshmallow Challenge is a remarkably fun and instructive design exercise that encourages teams to experience simple but profound lessons in
collaboration, innovation and creativity.

 
 

The Marshmallow Challenge

 

The Marshmallow Challenge is a remarkably fun and instructive design exercise that encourages teams to experience simple but profound lessons in
collaboration, innovation and creativity.

 

The task is simple: in eighteen minutes, teams must build the tallest free-standing structure out of 20 sticks of spaghetti, one yard of tape, one yard of string,
and one marshmallow. The marshmallow needs to be on top.

 

Surprising lessons emerge when you compare teams’ performance. Who tends to do the worst? Why? Who tends to do the best? Why? What improves
performance? What kills it?

 

If you need to kick start a meeting, get a team into a creative frame of mind, or simply want to encourage your organization to think about what it takes to
dramatically increase innovation, invest 45 minutes to run a marshmallow challenge.

 

 

Click for more at source


 

VMware release a deploy guide for deploying VMware Horizon View 5.2 with Microsoft Lync 2013

Tony Huynh, Product Management End-User Computing posted that VMware has released a deployment guide for installation VMware Horizon View 5.2 with Microsoft Lync 2013

VMware are pleasured to announce that the VMware Horizon View 5.2 Microsoft Lync 2013 VDI Client Installation/Configuration Guide is now publicly available.

The document provides a step-by-step guide on how to deploy a Microsoft Lync 2013 client on a VMware Horizon View desktop along with a Lync VDI plugin on a Windows client.
By doing so, customers can leverage the power of the Lync VDI plugin to make rich voice-over-Internet-Protocol (VoIP) and videoconferencing calls without negatively affecting the datacenter server or network.

The document will help partners and customers understand and avoid some common mistakes when deploying the Microsoft Lync 2013 client and Lync VDI plugin with Horizon View desktops.

Some common pitfalls when deploying the Lync 2013 client and Lync VDI plugin include:

  • Knowing what is and is not supported
  • Downloading/installing the correct software
  • Misconfiguration of Lync 2013 server and client and Lync VDI plugin
  • Windows client misconfiguration

Follow up questions

If you have additional questions regarding the deployment of the Lync 2013 client and Lync VDI plugin with Horizon View 5.2 desktops, please post your questions to our community page.

Other Useful Links

Lync client qualified devices

Deploying Lync VDI Plugin

Lync VDI Troubleshooting

Lync VDI plugin (32-bit) download

Click for more at source

Frimley Park NHS deploys VDI for efficiency and BYOD

Frimley Park NHS deploys VDI for efficiency and BYOD.

When Frimley Park Hospital came under increasing pressure to make its IT budget go further, the IT team opted to deploy a virtual desktop infrastructure (VDI) in its A&E department. Desktop virtualisation did not just bring time and cost efficiencies but also led to better patient care and made its IT ready for a bring your own device (BYOD) programme.

The Surrey-based NHS foundation trust serves over 400,000 people across north-east Hampshire, west Surrey and east Berkshire. In addition to the main hospital site at Frimley, it runs outpatient and diagnostic services from Aldershot, Farnham, Fleet and Bracknell.

When the trust was redeveloping its emergency department, the IT team began thinking of ideas to generate extra revenue and to make its budget go further.

The department has over 100 desktop computers, which can all be used by all staff and each has exactly the same functionality. The team wanted a way to manage these desktops from one central location.

“Our emergency department desktops are all set up to have exactly the same functionality, with auto logging and the clinical functionality they need,” said Jon Petre, infrastructure lead at Frimley Park Hospital.

“But when it came to software upgrades or maintenance, each machine needed upgrading and monitoring individually, which was incredibly time consuming – especially if we needed to deploy a new brand new application or system.”

Using VDI technology for IT efficiency

The trust decided that virtual desktop infrastructure (VDI) would be the most appropriate technology to use across the emergency department.

One of the objectives for the IT team was to have the ability to manage its IT from one central location, while freeing its up workforce to concentrate on the development of strategic technology deployments.

With VDI’s ability to concentrate resources onto one platform and replicate software across an entire IT estate, Frimley’s staff could simply access the clinical applications required with the minimum of effort, while maintaining a consistent desktop delivered from the datacentre, according to Petre.

“With VDI, we could deploy multiple desktops in a short period of time and provide upgrades to existing software centrally with minimal effort,” he said.

The IT team picked VMware’s VDI product View over the more popular Citrix VDI productbecause of the licensing terms.

Unlike Citrix, VMware’s licensing is attributable to a client desktop, rather than a server operating system.

The trust then virtualised all its A&E department desktops using VMware View technologyand created an easy-to-manage unified system, which has helped it meet its main objectives in saving time and reducing energy bills.

The IT team will use the saved time to focus on more strategic operations, such as developing cloud services to the local area. “We can focus on the big picture now, planning for future deployments rather than upgrading desktops one at a time. We can work on a hundred computers at once, making all the necessary upgrades in a matter of hours,” Petre said.

The VDI deployment also helped improve security on-premise, as all of the data is held in the datacentre, rather than cached locally on users’ end-point devices.

“With VDI, we’ve managed to change the old into new overnight and with minimal disruption to the service we provide our staff and, in turn, patient care,” Petre said.

Making the hospital IT ready for BYOD

In the future, the team is looking to build on its VDI use by allowing staff to connect to the desktops from their personal tablets – helping them to keep abreast of information on the go.

“We get a lot of queries from the medical team about their personal devices and whether they could start using these on the ward soon. This is something we are already looking into and are confident of deploying bring your own device (BYOD) solution in the near future,” he said.

Having a BYOD strategy is beneficial for an organisation in many ways. It has the potential for cost savings because it allows employees to bring their own devices to work and save on corporate-issued devices. Another advantage of BYOD is that it supports a mobile and cloud-focused IT strategy. It also leads to a mobile workforce thereby increasing staff’s productivity. But there are also security and legal risks associated with BYOD policies.

click for more at source

Digital identities could help to improve enterprise BYOD

Digital identities could help to improve enterprise BYOD.

Allowing employees to use their own digital identity may reduce issues such as remembering multiple passwords and security reporting.

A lot of the talk around the consumerisation of IT focuses on employees using their own devices, installing their own apps and using social media

The trend to bring your own device (BYOD) is at best seen as employees being innovative in the way they use IT, and at worst a danger to an organisation’s digital assets that needs to be monitored, controlled or blocked.

While employers can exercise some level of control over what their employees do with IT systems, this is not the case with customers.

Recent Quocirca research shows the extent to which the BYOD trend is being exploited more and more by businesses in one particular area – bring your own identity (BYOID). The primary opportunity is the ease of engagement with consumers.

The driver for this is to solve one of the oldest issues in the pantheon of IT security issues – the problem of users having to manage multiple identities and remember many passwords. In effect, BYOID is outsourcing all the issues involved with establishing and managing identity to third parties.

The marketing push

Most providers of internet services want their regular users to create an account of some sort so the relationship can be deepened for marketing and other commercial purposes. Accounts need logins and that means establishing an identity. However, rather than getting users to create a new identity, many now turn to third-party social media sites that the user already has an account with; there are many to choose from: Facebook, Google, Yahoo, Twitter or PayPal for example.

Most of the major social media sites provide widgets and APIs that enable the use of the login credentials the user has for their site as a way of authenticating to another. This is convenient for the consumer as it allows them to register for a service more easily and then, of course, when they return at a later date, they are far more likely to remember their credentials if they are the ones they use for their favoured social media site. Indeed, many of their devices may be set to automatically log in to such services.

Cementing the relationship

It is good for the social media site as it cements its relationship with users too and raises its profile through exposure on hundreds of other sites. JustGiving, Spotify and The Economist are just a few examples of those offering social login. For the provider of a new online service, there will be whole series of questions about doing this, including the veracity of social identities, how to set up and manage them and how to authenticate the actual user behind the identity.

When it comes to veracity, some will worry more than others. A free media service that wants to capture identities for marketing purposes may not care if a few are not real. Users will like the convenience of using a social identity and will be more likely to create an account. Anyway, why would someone want to sign up for a free service in someone else’s name?

However, as soon as money starts changing hands, there is a need to be sure of whom you are dealing with. Using social identities actually reduces the problem, making up an identity on the spot is easier than creating a social identity expressly for the purpose. If it can be established that the account being used has been active for some time and has a history of activity that matches that of a genuine user, then it is arguably far better to be using social identities than ones created on the fly.

The good news is that social infrastructure services such as Gigya, Janrain and Loginradius are, among other things, designed to check the veracity of social logins. By looking at a given user’s history and activity on a given social media site they can verify that they are an established user with a track record. They also help with another obvious problem, which is that many users will want to use different social identities and this needs managing.

Acting as the middleman

Social infrastructure services act as brokers, managing the many-to-many relationship between the social media sites and those providing services that want to enable social login. Social infrastructure services enable a retailer, charity or media company for example, to establish a single view of their customers regardless of how they login – providing a basic form of customer relationship management (CRM).

Using such services, it is possible to establish a high level of confidence that a real person is being dealt with – far more so than if someone had just made up a username and password. The next question is when someone logs in with a social identity, how do you know that in this instance the user is the owner of that identity? Authentication is only as good as that offered by the social media site itself. Some now offer two-factor authentication as an option and have auto-log out settings. Remember, the competition here is ad hoc usernames and passwords scribbled on scraps of paper.

But such an approach is still focused primarily on the consumer. However, for many organisations the need to manage external identity goes well beyond this. There are also external business users, the employees of partners and customers – these are business-tobusiness relationships.

Quocirca’s research shows that in some cases social identities are being used here too. However, there are other sources of identity that come into play, including the other business’s own directories, the membership lists of professional bodies, government databases and so on. To manage all this requires a federated identity management system which can bring together identities from all sources and manage them via a single interface. This may include employees as well as third-party users, many of whom will access common applications (for example, supply chain systems). To this end, many of the big identity management providers such as CA, Oracle, IBM and Intel/ McAfee have adapted their systems to work from multiple identity sources.

A professional passport

Having a unified identity and access management system, regardless of the sources of identity, eases reporting for security and compliance purposes and makes it easier to implement single sign on (SSO) systems. SSO solves the business equivalent of the consumer problem described earlier, the user having to remember multiple usernames and passwords for different systems. SSO also helps solve another growing problem for businesses – controlling access to web-based services. The problem here is if a business uses Google Apps or Microsoft Office 365 for document management, Salesforce.com for CRM, SuccessFactors for HR and so on. Enabling every employee for each one and, perhaps more importantly, ensuring access is de-provisioned when they leave, is much easier if all access is provided via an SSO portal. This has led to the emergence of a host of new identity and access management suppliers including Ping Identity, Okta, SaaS-ID and Symplified (the last of which has a partnership with Symantec). Many of these are offering SSO and identity and access management as cloud-based services; if the users can be anywhere and the applications are in the cloud, why not the SSO system too? The big identity suppliers are adapting their products as well, for example CA’s CloudMinder can be deployed as a purely on-demand service or linked with existing on-premise systems creating a hybrid deployment.

Looking to the future, we can speculate that we may all get more ownership of our digital identities as time goes by. As consumers, we can already choose to use a favoured social identity and, with education, we can understand how to protect and harden it. Actually we are quite used to this in the offline world. Most people have a passport and understand the need to care for and protect that.

This raises an interesting point. A new employer does not issue you with a passport for business travel; you use your own. Perhaps in the future employees will provide employers with their favoured digital identities. It may not be long before you are accessing your employer’s IT systems and applications using your Facebook, LinkedIn or Twitter identity. When that happens the age of BYOID will truly have arrived.

Click for more at source

Bromium Introduces vSentry 2.0 for Endpoint Security

Impressive new start up Bromium co-founded by Simon Crosby – original founder and CTO of XenSource today released a new version of vSentry device security.


New version improves secure mobility, safe collaboration, and enterprise manageability

CUPERTINO, Calif., June 11, 2013 – Bromium, Inc., a pioneer in trustworthy computing, today announced the general availability of Bromium vSentry® 2.0. Powered by its Xen-based Bromium Microvisor™, vSentry 2.0 makes endpoints secure – by design, enabling enterprises to embrace key IT trends such as mobility and collaboration, without risk of attack from insecure networks, the web and malicious documents or media.

vSentry uses Intel® CPU features for virtualization and security to invisibly hardware-isolate each Windows® task that accesses the Internet or untrusted documents. Its architecture guarantees that all malware will be defeated and automatically discarded. In addition, vSentry automates live attack visualization and analysis – giving security operations teams unparalleled insight into attacks when they occur.

“The Intel 4th generation Core™ vPro™ platform offers enterprises a very secure endpoint architecture as well as a rich set of features that enhance endpoint security, including AES-NI, Data Execution Prevention (DEP) and Intel Platform Protection Technology with OS Guard,” said Rick Echevarria, vice president and general manager of Intel’s Business Client Platforms Division. “Bromium vSentry uses Intel VT-x, VT-d and EPT to hardware-isolate operating system tasks, and Intel AES-NI, DEP, and OS Guard to further protect the endpoint. Bromium vSentry advances endpoint security enabling enterprises to secure mobile endpoints and empowers employees to safely access networks and media.”

The enhancements in vSentry 2.0 focus on three important requirements for enterprise deployments – secure mobility, safe collaboration, and improved manageability. The new release also delivers improved overall performance and end user experience.

Secure Mobility

Mobile users need to access enterprise applications and the web from untrusted networks that could be used to attack the endpoint. vSentry 2.0 hardware-isolates each user task that accesses an untrusted network, blocking all attacks from captive portals, the web and untrusted content. It guarantees the security of mobile endpoints that are used to remotely access enterprise SaaS and web applications, and virtual desktops. User credentials and application data delivered to the endpoint are secure at all times.

Safe Collaboration

Employees need to securely interact and collaborate with content originating from both within and outside the enterprise, requiring them to access untrustworthy content from removable media, the web, email and social applications. This places endpoint security in the user’s hands by making them remove security restrictions from, or “trust” content before interacting with it. If a user mistakenly trusts a malicious document, an attacker can compromise the endpoint. vSentry 2.0 lets users access and edit content without ever having to trust it, enabling them to be productive without risk.

Improved Manageability

The Bromium Management Server (BMS) that comes with vSentry now provides granular monitoring of deployment progress of vSentry endpoint agents, as well as automated gathering of critical information – such as missing software pre-requisites and installation progress. BMS delivers centralized policy management – and now includes simplified policy creation, editing, and distribution, event aggregation and reporting, as well as dashboards for monitoring key metrics. These improvements help simplify and accelerate enterprise-wide deployments of vSentry.

Bromium vSentry 2.0 secures both 32- and 64 bit versions of Windows 7, and virtual desktops delivered with Microsoft Remote Desktop Services (including Citrix XenDesktop and VMware View). It is deployed as a standard MSI package, and configured via simple policies using Microsoft® Active Directory or using the Bromium Management Server. NYSE and BlackRock are among the growing number of enterprise customers planning to deploy vSentry enterprise-wide.

“vSentry 2.0 delivers on our goal to make endpoints fully protected from targeted attacks, by hardware-isolating all untrusted user tasks,” said Gaurav Banga, CEO and co-founder of Bromium Inc. “vSentry 2.0 addresses important use cases that further empower end users without compromising on enterprise security. It represents the industry’s most secure solution for enterprise mobility and gives users unparalleled flexibility and ease of use in collaborative environments.”

Interested parties may view a webcast covering the new features and functionality of vSentry 2.0 presented by Simon Crosby, CTO and co-founder of Bromium, athttp://learn.bromium.com/newin2_register.html

Bromium vSentry is licensed per-user, enterprise wide, and priced according to volume. For more information, contact sales@bromium.com.

About Bromium

Bromium, Inc., is transforming enterprise network security with innovative software solutions that solve endpoint security problems, while delivering unmatched visualization capabilities to IT security analysts. At the endpoint, Bromium vSentry combines micro-virtualization with hardware-enforced isolation to protect against advanced targeted attacks – including all APTs and zero-day attacks. This protection also empowers vSentry end users with total Internet freedom, without any impact on user experience. For security analysts, Bromium LAVA provides a detailed graphical view of complete malware attacks isolated and recorded by vSentry, enabling in-depth, automated analysis of unknown attacks. Learn more atwww.bromium.com.

Click for more at source

Disruptive technologies: Advances that will transform life, business, and the global economy

Disruptive technologies: Advances that will transform life, business, and the global economy

 

McKinsey Global Institute have published a new report on the top Disruptive Tech out there.

The relentless parade of new technologies is unfolding on many fronts. Almost every advance is billed as a breakthrough, and the list of “next big things” grows ever longer. Not every emerging technology will alter the business or social landscape—but some truly do have the potential to disrupt the status quo, alter the way people live and work, and rearrange value pools. It is therefore critical that business and policy leaders understand which technologies will matter to them and prepare accordingly.

Don’t Take Your Eyes off VDI – Cisco are Certainly Not!

 
Tony Paikeday of Cisco writes interesting article

This blog post promises to avoid telling you about all the fantabulous (I know that’s not a word) growth expected in the number of hosted virtual desktops to bedeployed by 2016.
  What I do want to share, is how Cisco is ramping up our investments in accelerating your path to virtual desktop success, and how we’re tapping into the fundamentals of our Unified Computing System (UCS) to deliver new VDI efficiencies; the same efficiencies that have made Cisco the 2nd most preferred x86  blade server vendor* worldwide, in just 4 years!  So why are so many organizations moving away from their legacy compute solution, and choosing UCS for VDI workloads and more?

Differentiated capabilities that address VDI pain points: TCO and Manageability

It’s no secret to anyone that VDI is not simple to deploy.  You essentially have to bring together multiple seemingly disparate solution elements (server, storage, virtualization, broker, network, security, etc.) and make them work in a cohesive manner, and then be certain that your implementation will scale from a small pilot of 50 users to hundreds, thousands, or more!  Clearly with such complexity, the last thing you need is a complex compute infrastructure underneath it all.  There are 3 key things at the heart of this, that speak to why UCS is better for VDI:

1.)    Server-resident flash.  Our “On-Board” Architecture for VDI intercepts the rapidly proliferating use of flash based storage solutions that offer expansive IOPS capacity and huge performance.  UCS takes it a step further by offering an integrated solution leveraging our partner Fusion-io.  We’ve additionally delivered reference architectures that extend the use cases and attractiveness of flash-based solutions with appliance approaches (that direct-connect the storage array to our fabric interconnect) as well as more traditional multi-tiered architectures.  More on that in a moment…

2.)    We’ve made it easier to provision and manage the hosts for your virtual desktop deployments.  UCS Service Profile Templates enable rapid deployment from bare metal, creating a zero-touch, mistake-proof, stateless operations model.  Now, when you add the On-Board, server-resident flash to the configuration, you extend the reach of this management model to include high-performance, economical storage, completely provisioned and managed as part of the blade configuration/profile!  No SAN or associated expertise required!  Perfect for floating, non-persistent desktops.

3.)    Granular visibility across the virtualized infrastructure.  With user desktops now running amidst other mission-critical workloads in the data center, there’s more reason than ever to ensure that you can impart QoS, security and manageability across the multitude of virtual machine traffic flows traversing the data center.  Cisco Virtual Machine Fabric Extender (VM-FEX) and Cisco Nexus 1000v provide the visibility and controls that make this possible, extending physical world policy and administration to virtual.

A Comprehensive Approach to Architectures and Ecosystem

In my recent post “Wristwatches, Bicycle Helmets, and VDI” I talked a little about how the days of One-Size-Fits-All are long gone, and how organizations like yours, need, demand… solution approaches for VDI that are tailor made to your specific IT environment’s scale, embedded resources, budget, etc.  As Cisco moves from a number 2 global position to the market share leader, it’s clear we’ll need to speak to customers of all sizes.  And that means having the solution set and ecosystem to match

1.)    We’ve introduced an expanded suite of solution architectures for VDI, that introduce not only the On-Board approach I mentioned earlier, but also the “Simplified” architecture (UCS Fabric direct-connected to storage appliance) and the “Scalable” architecture (traditional multi-tiered, with Cisco Nexus 5000 as intermediating switch fabric between storage and server).  Additionally we have our Converged Infrastructure models leveraging VCE vBlock and FlexPod that offer convenient, modularized packaging of the complete infrastructure needed to rapidly deploy VDI.

2.)    The architecture suite mentioned above would not be possible without a comprehensive portfolio of technology partners, especially where storage is concerned.  Cisco enjoys a strategic relationship with industry leaders CitrixVMwareNetApp and EMC, and together we’ve made VDI one of the top workloads deployed on UCS with over 1,200 VDI customers in place thus far.  As we expand our market reach, we’ve converged on a select group of technology partners who help us expand our value proposition, offering new exciting capabilities that intercept the flash-based trend, and with whom our customers have sought validated design guidance based on Cisco.  This group currently includes: Atlantis ComputingFusion-io,NexentaNimble StorageTegile, and more on the way!

Clearly there’s a lot going on here with Cisco UCS and VDI…  and with our commitment to anticipate and intersect meaningful technology trends, and the leading solution capabilities of our strategic partner ecosystem, we’re refusing to take our eyes off the VDI-ball, regardless of whether this is the Year of VDI, next year, or the year after that.

Lastly – are you going to Cisco Live at the end of the month?  If so, we’ll have some great news on desktop virtualization content to be had at the event, and how you can connect with helpful demos, sessions and expertise.  Stay tuned!

*Source:  IDC Worldwide Quarterly Server Tracker, Q1 2013 Revenue Share, May 2013

Click for Source

Journey to a Dynamic Data Center: Private Cloud


Journey to a Dynamic Data Center: Private Cloud – Data Center Transformation

To Transform : The Definition

In an organizational
context, a process of profound and radical change that orients an organization in a new direction and takes it to an entirely different level of effectiveness. Unlike turnaround‘ (which implies incremental progress on the same plane) transformation implies a basic change of character and little or no resemblance with the past configuration or structure.


Data Center Transform Definition: Why should it be any different

In a data center context, a process of profound and radical change that orients a data center in a new direction and takes it to an entirely different level of effectiveness. Unlike ‘turnaround‘ (which implies incremental progress on the same plane) transformation implies a basic change of data center environment and little or no resemblance with the past configuration or structure.

What should a cloud be?

  • As Open as possible Architecture
  • Reporting and management from Day 1
  • Business Centric / Support Consumerization (Self Service)
  • Adapt and absorb change not hold up change
  • Support high level of availability 99.95% +
  • Scale up and out very quickly
  • Automated, Supportable & Self-Healing
  • Secure from very edge to the core

All this above but without the high cost

Most of all it has to work for business not be a piece of technology

Click for more and PPT on the Journey