Sunday, October 4, 2015

4 improper techniques for the work environment management


Not anywhere where it says User Environment Management, also UEM's inside. Simon Townsend takes the four techniques "Profile Management", "User Environment Virtualization", "User Management Persona" and "Group Policy and Logo scripts" under the microscope, which are often used for UEM be sure but not suitable without restriction.


There are many techniques that promise improved desktop environment for users. Figuring out which of them actually keep this promise, is difficult. Many are also of the opinion that UEM merely a "Windows profile management" is and know the real benefits of a comprehensive user administration not.

First and foremost, UEM contributes to the optimization of user satisfaction. But this is not just for wallpapers or desktop icons, but rather to provide an improved working environment, the maximum productivity without compromising on cost, security or control permits. UEM simplified at the proper implementation of innovation, promotes the success of desktop projects, fixes annoying desktop problems, thereby reducing the capital and operating costs.

In order to decide which of the many UEM solutions best suited, it is important to understand how these solutions really work and which environments they are designed. We see here four techniques more closely, often referred to as a User Environment Management platform. We also examine their functions and deficits.

The reference architecture for Big Data

The IT department often puts in trouble when departments of their demand a Big Data solution.


Most stakeholders is not clear at the beginning of such projects for which the anticipated workloads infrastructure is to be aligned. This makes the trade-off between scalability and cost. A new approach on a reference architecture provides a remedy.

Anyone ordering a motor, should know to what this vehicle is used. Depending on the use of either a high-performance diesel or a petrol engine more quickly, or more recently, a more economical hybrid or electric drive is selected. Departments order being reinforced an engine - in other words: a new infrastructure - in the IT department, whose future application is largely unknown.

We are talking about the development and implementation of a business idea in the field of Big Data. A typical use case from the marketing, for example, the realization of a click-stream analysis. A distribution typical application is the creation of an after-sales analysis, which is expected by the IT to detect the systems that consolidates and analyzes, thus let himself be "predictive analytics" make forecasts for the future buying behavior of customers. Also in the production and in many other areas are increasingly the need developed for a variety of applications in the area of Big Data Analytics.

Terra Incognita

Essentially, three goals can recognize those who are persecuted by departments attended:

1. The optimization of existing business processes

2. The development of new products and services

3. The chance of an enhanced service orientation


As companies often do not know at the time of request, how an application is developed, are the IT department prior to insufficient information on how it is to align the infrastructure and what scalability is required. Nevertheless, from the department a sustainable solution "for all cases" expected.

Experton Group compares the best cloud provider

"The Battle of the system houses is in full swing", is one of the results of this year's "Cloud Vendor Benchmark" Experton Group, compares the provider and shows trends.


The steep upward curve shows the cloud investments, which are expected in 2015 in this country made. "No one would have thought that cloud computing is such a long-lasting trend. The theme is not hype, but rather inherent in the system ", Heiko Henkes, Cloud Lead Advisor explained in Experton Group and project leader of the cloud provider comparison in the sixth edition now.

Investment Motor hums

According to the forecast, the cloud expenditures of many companies, driven by Big Data, Mobility, UC, collaboration and the increasing digitization and networking of this year could be around nine billion euros. This would represent an increase of 37 % y.o.y. For the first time of the expenditure on cloud services (+ 39% to EUR 4.6 billion), the total spending on cloud technologies (+ 33% to EUR 2.9 billion) as well as consulting and integration services (+ 38% to 1.6 billion euros) over wings.

What remains for local system houses?


Looking at the top players, especially for IaaS in self-service Public Clouds to Experton however, asks whether "the great Hyperscaler as AWS, Microsoft and - remain Google in the highly standardized IT environment and thus - already relegated for the local system houses only the place is reserved in the managed service corner ". In this segment, there is therefore only a hoster or a system house that offers the great significant headwinds. Also generally roll the wave of consolidation among system vendors continue.

In addition, shrinking the traditional IT market. While traditional hardware and software expenditures stagnate or decline, what the classical ISVs sit among other under pressure, the "catch basin Services" climb to continue - through expenditures in cloud concepts. "The software market is as usual no longer exist," says Henke - and as many will be fond of perhaps faster. Experton estimates that in 2019 SaaS accepts the supremacy.

Digitization positive - but also brings stress and heavy workload

New technologies, communication platforms and constant accessibility: Digitization its way into everyday working life. Simultaneously, the stress increases, the line between work and leisure.


How to evaluate the employees? This and many other important questions after the current Edenred-Ipsos barometer to well-being and motivation of employees.

The result is causing a stir:
The impact of digital development is perceived by the workers for the most part positive. So are about nearly half of (47 %) of respondents said that the autonomy is improved when working through digitization. 45 % say that the collaboration between the teams of a company benefits from having closely followed by the quality of life at work (43 %).

In addition, can be derived from the study results, but also read that many workers still find no influence - neither positive nor negative. Only 16 % of survey participants confirm that the progressive digitization negative impact on their professional life.

Saturday, October 3, 2015

That's really into the business meetings


Smartphone usage in everyday work


The smartphone is for many a nice distraction in official meetings: Four out of ten professional’s smartphone users do with their mobile phones in meetings besides private things.

Surely you've ever wondered what makes your colleague when he busily looking at his cell phone during the meeting, right? The good news: The digital association Bitkom has now been found. The bad news: Your colleague is doing very likely nothing that has to do with the meeting.
Instead, he makes perhaps the Date for your evening out, playing solitaire or briefed on the latest sports results. And he is no exception. Almost half of all working-smartphone users do with their mobile phone during business meetings Private. 36 % steers itself "so every now and then" off 5 % even regularly!

Emails, WhatsApp or SMS

Who uses his smartphone during meetings for private things, read or answered mostly private messages such as email, WhatsApp messages or SMS (67 %). Around one in three (29 %) use social networks like Facebook or Twitter, one in four plays (27 %) or read the latest news on the net (23 %). 15 % inform yourself about sports results and 6 % buy their smartphones during the meeting on online shopping portals one.

5 tips for better opportunities in the online shop

Stronger sales presence through intelligent IT and presentation


Products and prices are not enough to compete against other applicants in the e-commerce. Seller on the internet can make many things wrong and right. The IT service provider and an expert on e-commerce solutions Nasdo provide 5 tips on how to go on sale and the efficiency can be increased:

1. Make your E-Shop Responsive: The clearest product page is useless if it is bad to consume on smartphones and tablets. Reactive e-Shop websites, which adapt to the respective terminal, increasing not only the shopping experience of customers. They are also SEO friendly. So Google lists Responsive websites since this spring preferably.

2. Sale Shop across: Many shop owners selling in different channels - on eBay, Amazon, and in our own online store. Thus, the inventory data will not care to click marathon, it is advisable to install automated solutions that connect all major online stores and marketplaces in a single enterprise resource planning.

See User Rights in Context

Many companies often underestimate the threat from organized cybercriminals and industrial espionage. Even risks that may arise from its own employees, have little presence.


Firewalls and perimeter security are now outdated in the distributed nature of many enterprise networks, in principle. New approaches, such as the Identity Relationship Management (IRM) can be a way out.

Hardly a day on which the press cannot report a blatant attack on the data security or cyber-attacks. One event after another: meetings may each. Recent cases like the pecking of Lufthansa Miles accounts of frequent flyers or bonus card users have brought clear once again into consciousness.

Many companies often underestimate the growing threat posed by organized crime and cyber economic espionage. Even the risks that may arise from its own employees, are not sufficiently present. Loss of data, the restoration costs, additional working hours and earnings and sales shortfalls pull cost billions of dollars by themselves. But the damage caused by industrial espionage calculates the VDI annually to approximately 100 billion euros. Is it any wonder that the data security is generally doubted, and consumers concerned remembers their past credit card purchases?

Including loss of confidence

Any breach of the data identity always attracts a loss of confidence in the trade mark concerned after themselves, not to mention the damaged customer confidence in the company and in the system in general. Both are extremely difficult to predict and may at worst jeopardize the economic survival of the company, or at least severely impair. Companies that react too late after an incident, have to reckon with substantial fines under certain circumstances. European companies are pressed for time when it comes to a proposal by the European Union for the end of 2015 the introduction of a General Data Protection Regulation (General Data Protection Regulation, GDPR) is, according to which uniform rules for the processing of personal data by private companies should be EU-wide.