Digital Transformation Blogs - Bigdata, IoT, M2M, Mobility, Cloud

Transformation Of End- User Computing Journey

technology

End-user computing (EUC) has been around for longer than we think. In fact, Virtual Desktop Infrastructure was introduced in early 2000s and, PDAs can be considered the progenitors of smartphones and tablets. However, it is only over the last few years that personalized computing has infiltrated enterprise spaces; owing to faster networks, Wi-fi hotspots and a plethora of applications that have given our lives a complete overhaul. What began with virtualization of desktops, has stretched its wings way far beyond.

The question thus arises, how do enterprises deal with the challenges and also make the most out of this gazillion dollar opportunity! As we know, concepts of BYOD, BYOPC, Mobile Computing have proved to be both a boon and a bane for enterprises. On one hand, while EUC is helping evolve simplified, faster, standardized, streamlined and agile work places, on the other, enterprises are dealing with multifarious challenges of operational management, compliance and security, and cost of infrastructural changes. Nonetheless, a couple of years back we could have still debated on the uptake of EUC at an enterprise level. But at the close of 2014, there is no need mentioning that enterprise EUC journey is well on the move to assuming larger prominence globally. This means that over the next couple of years, IT organizations would have to diligently dispose the residue of static management methodologies that are changing the relationship between enterprise results, technology assets and how users work. Technology is now getting monetized at every level. Businesses are counting the bucks spent on technology and its real results. And consumerization of IT has made that money count.

In such a context, businesses have got to think beyond TCO and operational expenses to identify the money in EUC and its positive impact. Businesses need a strategy. And they need a radical shift in some of their thought processes.

First, the proliferation of devices call for a fundamental change in the operating and business model, to an environment that supports myriad devices for enterprise access. This requires specialized multi-device platform support that can keep the costs at all-time low.

Next, security and compliance are of paramount importance in the case of end-user computing. You cannot be letting just anyone get access to your business sensitive information. This is where Identity and Access Management solutions come to action.

Support and maintenance is also a concern that can be addressed with automated tools that allow end-users to securely self-onboard to the management platform with policy enforcement, device tracking and remote wiping of device.

Last but not the least, application development is an area that needs to be device agnostic, yet differentiable on consumer and corporate basis. Plus there is also data loss prevention that needs to be covered.

The transformation journey of end-user computing is becoming ever comprehensive and increasingly virtualized. It has got VDIs, tablets, PCs, mobile computing all on-board. Come 2015, we might as well begin to spot wearables in work places. And ready or not, this revolution is going to hit every enterprise at every level sooner than expected. Whether as a demand from the workforce or to keep up with the agile competition, enterprises will have to make way and modify themselves to accommodate for the ever-dynamic end-user computing landscape.

Post Liked   0

Archives

Categories