When The Cloud Meets Mobility: Heaven Or Headache?

When the Cloud Meets Mobility: Heaven or Headache?

The cloud and mobile computing have made an awful lot of promises to enterprise IT: reduced costs, higher productivity, jaw-dropping data analytics, rapid rollout, granular control over the IT solution stack. But have they delivered?  Unfortunately, that’s not easy to answer. In a recent Gartner survey of over 2,000 top CIOs, analytics and business intelligence, mobile technologies, and cloud computing ranked as their first three priorities (in the order).

These CIOs have high hopes for the next wave of cloud technologies.

Their ultimate goals include:

  • Allowing anywhere, anytime access to cloud-hosted data and applications on any device regardless of operating system.
  • Providing remote but secure access on any device to both private and public networks that automatically scale to meet demand.
  • Virtualizing as much IT infrastructure as possible to increase efficiency, elasticity, redundancy, and flexibility. (In other words, less stuff, more value.)

But, is this really happening? The same group of CIOs claimed that enterprises realize only 43 percent of the full business potential of the latest cloud and mobility technologies. And every CIO worth his or her salt is saying their enterprises can only leverage the full power of cloud and big data and mobility by taking an integrated, comprehensive approach. We’ve already learned what doesn’t work: a hodgepodge patchwork of SaaS solutions, API integrations, make-shift bridges, and another half-dozen workarounds.

So where do we go from here?

The technology already exists to address most of the interoperability and integration issues enterprises (as well as SMBs) have struggled with. So perhaps the better question is: Are we ready to accept them? You see, one of the biggest barriers to making the next leap in computing technology isn’t technological.

It’s not even operational. It’s cultural.

Almost every end user still associates their devices with their applications and their data. Ask 10 random people where a file is, and nine of them are likely to say, “My computer,” or “My iPad.”—not Google Drive. Not iCloud. And definitely not a data center in rural North Carolina.

For enterprises to truly embrace the full potential of mobility, business intelligence, and the cloud, they need to start moving users away from a device-centric mentality and towards a focus on hosted apps and data.

One real solution is virtualized desktop infrastructure.

With the advent of VDI, companies like Citrix have taken the complete end user solution stack and put it into the cloud. An entire virtual desktop—with all of a user’s data and apps—can be reduced to a data stream that data centers send to whatever device a user wants—desktop, laptop, tablet, or phone. The device falls into the background and the experience takes front-and-center.

With VDI, enterprises really can have the best of all worlds:

  • Complete control over apps and data, regardless of platform or device
  • Minimal integration concerns
  • Full-featured desktop apps delivered as a service over a private, public, or hybrid cloud

If CIOs really want to realize the full business potential of cloud technologies, then they need to get their end users ready for a major shift in thinking. Only once end users start thinking about their desktop as something that moves with them, from one device to another, will enterprises be in a position to capitalize on the promises the cloud IT world has made to them.

But what do you think? Is there another answer we’re missing? Let us know in the comments below.

By Robert Shaw

This post is brought to you by the Mobile Enterprise 360 Community and Citrix

About Robert

Robert Shaw was an early entrant into the cloud computing sector, working as a consultant for Accenture on server virtualization and software-as-a-service migration. He has also been a technical editor for eHow and other web properties and still provides local IT consulting services.

View All Articles

Sorry, comments are closed for this post.

Comic
Three Tips To Simplify Governance, Risk And Compliance

Three Tips To Simplify Governance, Risk And Compliance

Governance, Risk and Compliance Businesses are under pressure to deliver against a backdrop of evolving regulations and security threats. In the face of such challenges they strive to perform better, be leaner, cut costs and be more efficient. Effective governance, risk and compliance (GRC) can help preserve the business’ corporate integrity and protect the brand,…

The Annual Compliance & Ethics Institute:  Hot Topics – Cyber Security, Big Data, Privacy Breach Response

The Annual Compliance & Ethics Institute: Hot Topics – Cyber Security, Big Data, Privacy Breach Response

Cyber Security, Big Data, Privacy Breach Response MINNEAPOLIS, Aug. 30, 2016 /PRNewswire-USNewswire/ — Cyber security, social media, modern slavery, anti-corruption, export controls and sanctions, and privacy top the list of “Hot Issues” compliance and ethics professionals face each day. These and many other compliance and ethics concerns will be addressed at the 2016 Compliance & Ethics…

Top 5 Digital Health Trends

Top 5 Digital Health Trends

Digital Health Trends It is very important to keep up with the changing technology. However, it is also just as important to advance the consumer experience, care delivery methods and create opportunities for career development for the healthcare workforce. Five trends that are proven to be effective in winning in the digital age have been…

Technological Advances In The Healthcare Industry

Technological Advances In The Healthcare Industry

The Healthcare Industry The use of smart devices in healthcare is expanding, and according to a report by Technavio the global smart wearable healthcare device and services market will show a compounded annual growth rate of over 18%. Thanks to modern medicine, lifespans are increasing, resulting in aging populations and a higher frequency of chronic…

How Secure Is Your School Campus Network?

How Secure Is Your School Campus Network?

School Networks School related networks are one of the most attacked sectors today, coming in third worldwide to healthcare and retail. Because of the ever growing threat of cybercrime, IT professionals everywhere aren’t thinking in terms of “what if our network gets attacked?” Now, they think in terms of “when will our network be attacked?”…

Protecting Devices From Data Breach: Identity of Things (IDoT)

Protecting Devices From Data Breach: Identity of Things (IDoT)

How to Identify and Authenticate in the Expanding IoT Ecosystem It is a necessity to protect IoT devices and their associated data. As the IoT ecosystem continues to expand, the need to create an identity to newly-connected things is becoming increasingly crucial. These ‘things’ can include anything from basic sensors and gateways to industrial controls…

Despite Record Breaches, Secure Third Party Access Still Not An IT Priority

Despite Record Breaches, Secure Third Party Access Still Not An IT Priority

Secure Third Party Access Still Not An IT Priority Research has revealed that third parties cause 63 percent of all data breaches. From HVAC contractors, to IT consultants, to supply chain analysts and beyond, the threats posed by third parties are real and growing. Deloitte, in its Global Survey 2016 of third party risk, reported…

How Formal Verification Can Thwart Change-Induced Network Outages and Breaches

How Formal Verification Can Thwart Change-Induced Network Outages and Breaches

How Formal Verification Can Thwart  Breaches Formal verification is not a new concept. In a nutshell, the process uses sophisticated math to prove or disprove whether a system achieves its desired functional specifications. It is employed by organizations that build products that absolutely cannot fail. One of the reasons NASA rovers are still roaming Mars…

Four Keys For Telecoms Competing In A Digital World

Four Keys For Telecoms Competing In A Digital World

Competing in a Digital World Telecoms, otherwise largely known as Communications Service Providers (CSPs), have traditionally made the lion’s share of their revenue from providing pipes and infrastructure. Now CSPs face increased competition, not so much from each other, but with digital service providers (DSPs) like Netflix, Google, Amazon, Facebook, and Apple, all of whom…

Maintaining Network Performance And Security In Hybrid Cloud Environments

Maintaining Network Performance And Security In Hybrid Cloud Environments

Hybrid Cloud Environments After several years of steady cloud adoption in the enterprise, an interesting trend has emerged: More companies are retaining their existing, on-premise IT infrastructures while also embracing the latest cloud technologies. In fact, IDC predicts markets for such hybrid cloud environments will grow from the over $25 billion global market we saw…

Containerization: The Bold Face Of The Cloud In 2016

Containerization: The Bold Face Of The Cloud In 2016

Containerization And The Cloud “Right now, the biggest technology shift in the cloud is a rapid evolution from simple virtual machine (VM) hosting toward containerization’’ says the CTO of Microsoft Azure, Mark Russinovitch, a man who deals with the evolving cloud infrastructure every day. In his words, containerization is “an incredibly efficient, portable, and lightweight…

Cloud Computing Then & Now

Cloud Computing Then & Now

The Evolving Cloud  From as early as the onset of modern computing, the possibility of resource distribution has been explored. Today’s cloud computing environment goes well beyond what most could even have imagined at the birth of modern computing and innovation in the field isn’t slowing. A Brief History Matillion’s interactive timeline of cloud begins…

Low Cost Cloud Computing Gives Rise To Startups

Low Cost Cloud Computing Gives Rise To Startups

Balancing The Playing Field For Startups According to a Goldman Sachs report, cloud infrastructure and platform spending could reach $43 billion by 2018, which is up $16 billion from last year, representing a growth of around 30% from 2013 said the analyst. This phenomenal growth is laying the foundation for a new breed of startup…

12 Promising Business Intelligence (BI) Services For Your Company

12 Promising Business Intelligence (BI) Services For Your Company

12 Promising Business Intelligence (BI) Services Business Intelligence (BI) services have recently seen an explosion of innovation and choices for business owners and entrepreneurs. So many choices, in fact, that many companies aren’t sure which business intelligence company to use. To help offer you a solution, we’ve compiled a list of 12 Business Intelligence companies…

Cloud Infographic – Monetizing Internet Of Things

Cloud Infographic – Monetizing Internet Of Things

Monetizing Internet Of Things There are many interesting ways in which companies are looking to connect devices to the cloud. From the vehicles to kitchen appliances the internet of things is already a $1.9 trillion dollar market based on research estimates from IDC. Included is a fascinating infographic provided by AriaSystems which shows us some of the exciting…

Most Active Internet Of Things Investors In The Last 5 Years

Most Active Internet Of Things Investors In The Last 5 Years

Most Active Internet Of Things Investors A recent BI Intelligence report claimed that the Internet of Things (IoT) is on its way to becoming the largest device market in the world. Quite naturally, such exponential growth of the IoT market has prompted a number of high-profile corporate investors and smart money VCs to bet highly…