Wednesday 28 March 2012

The Dawn of BYOD - VPN & The Cloud

There are two technologies in particular which are in themselves becoming integral to IT operations and that are subsequently supporting the growth in BYOD - they are cloud computing and Virtual Private Networks (VPNs). Whilst there are many technology trends that are pushing the adoption of BYOD policies, these two are providing businesses with the key tools they need to overcome some of the challenges that BYOD brings with it.

Connectivity and Interoperability
The key to BYOD’s success is also one of its biggest hurdles and that is the variety of devices and platforms that it introduces into the IT systems equation. Users will be hoping to connect from a broad range of devices such as laptops, tablets and smartphones, running all manner of operating systems including the more traditional Windows, Mac OS and Linux alongside the newer kids on the block in the mobile sphere: iOS, Android, Windows Mobile and Blackberry for example.

For organisations where the workers need to connect to the local network, VPN is the key. Tunnelling into a local area network across a VPN can allow users to access the files and/or control the applications on local (office) machines that they need for their daily work regardless of the device they are using, and their location, as long as they have an internet connection.

Although many applications have releases which support most operating systems it can be a real headache rolling out an application suit across such a variety of platforms. However, the all-conquering concept of cloud computing can offer a truly interoperable application solution. More specifically Software as a Service (SaaS) offerings, such a Google Docs or Microsoft Office 365, together with cloud storage, allow workers to operate within the cloud and therefore seamlessly between the office and on the go. Again, the only condition to use these services is that the user has an internet connection.

Security
Arguably the greatest challenge faced by organisations embracing BYOD is that of security; ensuring that personal devices aren’t compromised in themselves and don’t pose a security threat to the rest of the network. Allowing BYODs introduces many more vulnerabilities at various steps in the network and so there are many ways in which these risks can and need to be addressed.

The first step is to reduce the risk of the personal device being compromised in the first place. This is particularly pertinent where employees are bringing their own device in to connect to the businesses LAN. To achieve this, some organisations have conditions of use which require that the user’s device has specific anti virus and management software installed before it can be allowed onto the network. However, the risks can also be reduced by ensuring that personal devices are only allowed to connect to the local network via a VPN rather than a direct connection, even when the user is on site.

Using a VPN is a must for users in remote locations as the secure tunnel of a VPN prevents any information being intercepted in transit. It can be tempting for employees working off-site (or even on site) on personal devices to email documents, for example, backwards and forwards but the security of such communications can never be guaranteed.

What’s more that approach requires that at least some work data is stored locally on the personal device - a cardinal sin in terms of data protection. Again both VPNs and cloud solutions can negate the need to store local data. Using a VPN will allow the worker to operate on the local network, accessing, working on and storing everything they need on there, rather than on their own device. Secure cloud services on the other hand can be used to provide collaborative workspaces where users perform all their work in the cloud so that colleagues, wherever they are, can access it. However care should be taken to check the security measures used by cloud providers before signing up to such services whilst the user must also ensure that someone who misappropriates a device can’t then easily access their cloud account (through lack of device security and stored passwords etc).

All this, plus implementing measures such as improved secure wireless networks in the work place, may result in greater spending on IT security and connectivity, but this should, as mentioned above, easily be offset by the direct and indirect financial benefits experienced elsewhere across the IT budget and the business as a whole.

© Stuart Mitchell 2012
If you want to find out more about getting your organisation ready for a BYOD policy then visit VPN UK.

The Dawn of BYOD - The Reasons

For those working in business IT there is one term that is sure to be cropping up on your radar more and more frequently; for those who work outside of IT departments you’ll be familiar with the ideas behind it - in fact you may be responsible for its prominence - even though you may be less aware of its name. The concept is BYOD or Bring Your Own Device.

What is BYOD?
BYOD is the latest trend in workplace IT deployment and one that all businesses are going to have to address whether they embrace it or not. In short the term refers to an idea in which employees in businesses and organisations are permitted, or indeed encouraged in some cases, to make use of their own devices for their job, in place of any supplied by their employer. Recent surveys have suggested that as many as 80-90% of employees could already be using their personal devices - officially or not.

In practice, the idea can manifest itself in many ways; from workers actually bringing their own devices into the office workspace and accessing local networks on site, to workers using their devices outside of the local network (from home or on the move) utilising cloud services, such as email and cloud documents, or remoting onto the local networks using virtual private networks (VPNs).

The concept began life as BYOC (bring your own computer) but has broadened and gathered pace with the abundance of portable non-PC devices that are now commonplace amongst the general public. Meanwhile, the growth in cloud computing services and the prevalence of VPN services have provided the means by which these devices can connect and integrate with in house systems.

Why BYOD is Taking Off
The principle drivers behind this momentum in BYOD are the recent advances in high end mobile/portable technology and the availability or accessibility of this technology to the general public. There has been a very real trend in the last few years, arguably led by the proliferation of the iPhone, for high powered devices to be delivered in a way that makes them usable by less ‘tech-savvy’ members of the public, beyond just professionals in the work place and traditional ‘geeks’. The idea that your mum or your gran now has a smartphone and can take part in a video call wherever they are represents the way in which complex IT functionality is now omnipresent for so many of us. All of this power can be accessed on the move, in any location, as long as there is a 3G signal or a wireless network (of which there are now plenty), and with the growth of the smartphone and tablet markets this is only going to increase the private uptake of such technology. In short most people are in possession of devices which are not only far more powerful than ever before but are far more portable.

The effect that this has on the workforce is fairly profound as more and more people become increasingly aware of such technology and its possibilities. Although many may not necessarily understand the workings of the devices they use, they do fully understand the functionality they can access and the potential of this functionality within the context of their work place. As a result, they can become frustrated with the pace at which business can respond to and invest in these opportunities which they often have on tap at home.

Adopting BYOD not only allows employees to realise this potential to the benefit of their business but can also have the beneficial side effect of boosting those employees’ morale and motivation. They can be made to feel empowered and able to add greater value in their role - no longer held back by legacy IT policy. Moreover, users of BYOD will be more familiar with how to get the best out of their own devices and so are more likely to be able to hit the ground running without the need for extensive IT training.

Allowing staff to use their own devices, even where a business is prepared to invest in subsidies for them, can reduce the overall level of IT spend. Organisations will require less investment in their own hardware and devices where private devices can be used in their place and some firms may even find that they need to pay for and install less software as users can end up making use of their existing software more often.

The second part of this article, highlights some of the challenges faced by companies who are adopting BYOD policies and how Cloud Computing and VPN can help overcome these.

© Stuart Mitchell 2012
If you want to find out more about getting your organisation ready for a BYOD policy then visit VPN Provider.

Thursday 22 March 2012

Investing in a Gap Year Trip

The gap year cliché is one of middle class eighteen year-olds taking time out between leaving school and starting university to back pack around the world and ‘find themselves’ whilst they flourish into adulthood. In truth gap years are becoming more and more popular across the demographics and socio-economic groups in spite of the fact that there are more competing financial pressures on our young people than at any other time in recent memory.

Why Take a Gap Year Trip?
There is no doubt that extensive travelling provides not only a geographical perspective but also a mental and emotional one. From the experiences gained with different cultures, religions and economic classes, young people who do embark on a gap year trip often report that they come back as more rounded individuals with a greater empathy and understanding of the wider world. However, these trips also offer more practical life lessons in preparation for university and adulthood in general, such as the ability to manage finances and to get themselves from a to b. In both respects initiative is vital in getting work and consequently money to fund the adventure, as well as in fathoming the best ways to travel.

All youngsters that embark on a gap year trip should find that their soft skills improve drastically through exposure to strangers and strange situations, having to communicate effectively with those they encounter. However, gappers that go for a more structured trip that incorporates a work or volunteering placement will certainly develop their soft skills in more formalised contexts as a result of having to work with bosses (perhaps for the first time) and colleagues, speak in public, resolve conflicts and communicate with all manner of people they including children - particularly those who follow the popular path of teaching English as a foreign language (TEFL). What’s more, work placements are a great way to hone those other skills that are fundamental to success in the professional world such as time management and organisation.

All in all, a gap year should improve a youngster’s future career prospects as well as their ability to succeed in the rest of their education. Most importantly, employers seem to agree and place real value on the experiences through a gap year, believing that the experiences and skills mentioned above will have been enhanced through such trips.

How Much Will it Cost?
So, for those that do place value on the experiences garnered through gap year travel, the next question is how much can you or your child expect to pay for such an adventure. The first obvious point to make is that the price of a gap year trip will vary substantially according to where you go, what you do and how long you go for.

As a very rough guideline, a typical trip for 6 months could cost between £4k to £5k depending on which countries and parts of the world are on the itinerary. Trips to places like the US will cost considerable more than trips across Eastern Europe for example and this budget may only last 3 months in the States. Again using very rough approximations, those hoping to really push the lower end of a budget could look towards surviving on a meagre £15 a day (visiting cheaper countries, cutting costs on travel and accommodation) but other trips that don’t make these savings can easily double that figure. In addition, a round-the-world ticket for gappers who are organising their travel in advance can cost anywhere from just below £1k to £1,5k with the inclusion of various airport fees that may be incurred.

There are many techniques that seasoned gap year travellers will recommend to keep these costs down or to cover them as you travel. Buying tickets when your abroad rather than before you go will reduce the travel costs (albeit at the expense of some forward planning) whilst picking up paid work during the trip can help. Casual work, such as bar work, is only likely to bring in a little social money, but a popular solution is to organise a placement teaching English as a foreign language (TEFL) as that can bring in a little more to help with the costs whilst really strengthening those soft skills in the process.

Whichever way you or your child chooses to fund a gap year, there is no denying that it will cost a substantial amount of money at a time in their lives when they are also having to think about how they will afford university and/or adult life. However, there is also no denying that the experiences and skills they’ll gain can be immeasurable so it might be best to start putting some money aside as soon as possible.

© Stuart Mitchell 2012
If you want to find out more about saving in preparation for your child’s future adventures then visit Junior ISA.

Monday 19 March 2012

The Systems of Education in the UK - English & Welsh Year Groups

This diagram illustrates the school system in ...
Image via Wikipedia
In the first part of a series of articles looking at the education systems across the UK, the overarching structure of the school year for state funded schools in England and Wales will be considered. The structures and terms for schools under the Scottish, Northern Irish and Independent School systems differ again and will be looked at in future articles.

The type and range of schools through which children pass during their education may vary depending on which part of the UK they grow up in, the nature of the schools in their locale and their parents ability to fund their education. However, for any schools receiving state funding in England and Wales, the defined schools years, and the requirements for education in each of those years, is set by the UK government and the Welsh Assembly respectively.

The Year Groups
The school year in the England and Wales begins on 1 September and runs up until 31 August and is split into three terms: Autumn (up to Christmas), Spring (Christmas to Easter) and Summer (Easter onwards).

Although children will usually progress through the school years depending on their age(s) in between those dates every year, it is possible to both skip years or repeat years if there is a need; if a child’s performance is above or below the level expected at their current age.

Whilst it is not compulsory attendance for a child, the (state funded) school year system begins with the Nursery year for children who are three years old. The system ends with Year 13 (the 15th year in total) for children who turn 18 in the relevant timeframe. School attendance is only mandatory from the ages of 5-16 and so children are required to enter school at some stage during Reception (the 2nd year), if they haven’t already, whilst, at the other end of the system, they can then choose whether or not to pursue their education in Years 12-13 (Further Education) once they’ve turned 16.

The third year of education is termed Year 1 as it is the first full school year in which children are required to attend school having been introduced to it in Reception (if not Nursery).

The Key Stages
To provide a framework for teaching and examinations the National Curriculum (for state funded schools) in particular uses the following key stages to group these years together:

  • Foundation Stages:
    • Foundation 1 - Nursery
    • Foundation 2 - Reception
  • Key Stage 1 - Years 1 & 2
  • Key Stage 2 - Years 3 - 6
  • Key Stage 3 - Years 7 - 9
  • Key Stage 4 - Years 10 & 11 (ending in GCSEs)
  • Sixth Form/College - Years 12 & 13 (ending in A Levels or International Baccalaureate)

The Standard School Structure
The first Nursery year nearly always involves the child attending a designated Nursery school but after that the structure can vary. The most common structure for the schools that a child will progress through in the subsequent years is that of:

  • Infant School - Reception to Year 2 [Foundation Stage 2 & Key Stage 1]
  • Junior School - Years 3 - 6 [Key Stage 2]
  • Senior School - Years 7 - 11 [Key Stages 3 & 4]
  • Sixth Form/College - Years 12 & 13

Many schools, however, combine the functions above so that the structure is simplified into two levels to fit neatly with the idea of primary and secondary education:

  • Primary School - Infant School & Junior School
  • Secondary School - Senior School & Sixth Form

Some more traditional schools in the secondary education system still refer to the Years 7 through to 11 in the older notation as Years 1 to 5 (or First Form to Fifth Form) with the following Sixth Form (Years 12 and 13) split into the Lower and Upper Sixth.

The Alternative School Structure
A less common alternative structure sees a three tier system straddling primary and secondary education and the curriculum's Key Stages with:

  • First School - Reception to Year 4
  • Middle School - Years 5 - 8
  • Upper School - Years 9 - 13

Children can and do switch between schools following these structures according to the opportunities in their locality and it is particularly common, for example, for children to switch to a Secondary School for the rest of their secondary education once they have finished Middle School.

Ultimately, the year groups only provide a framework to determine how and when the National Curriculum and examinations should be implemented. There are therefore many varying types of schools even within the above definitions, from Faith Schools to Academies to Grammar Schools, depending on other factors such as selection criteria and funding.

© Stuart Mitchell 2012
I'm a small business owner. If you want to find out more about the systems of education in the UK, particularly if your school is considering academy status, then visit Academy Conversion.

Enhanced by Zemanta

What Is Cloud Hosting?

SOMF Cloud Computing Model
SOMF Cloud Computing Model (Photo credit: Wikipedia)
IT professionals and private consumers of technology alike will no doubt be aware of the term cloud computing. A term and a concept that appears to be consuming everything in its path as the future of the IT industry. The following article looks at one incarnation of the technology that offers great potential for enterprise, that of cloud hosting.

Cloud Computing
The concept of cloud computing is one that manifests itself in many ways and covers a broad array of applications and functions. In its simplest sense it refers to end users accessing computing resources they need from a cloud, i.e., a shared pool of IT resources from a remote location made available through the internet. Cloud services are characterised by the fact that they do not require data to be stored on, software installed on, or configuration and preferences to be set on end users’ devices. Instead users access resources that are maintained and managed in remote centralised locations by a specialist provider. They are therefore free of physical, geographical and technological constraints and can access the same cloud service wherever they are, across any device - mobile, desktop or tablet - as long as they have an internet connection.

The concept can also be thought of, and indeed referred to, as utility computing. The fact that computing resources, be it hardware or software (see below), are available as a service that can be tapped into on-demand rather than requiring local installations, is akin to a household utility. Indeed, a commonly used analogy is that of electricity. Electricity is generated in a series of centralised locations by specialist providers using advanced equipment and techniques (pooled with wider electricity resources) and accessed through the grid in contrast to a system whereby each consumer builds, installs and maintains their own generator, with each having a finite capacity. In cloud computing the internet is analogous to the electricity grid and the user accesses the computing utility rather than build, install and maintain their own computing resources. Therefore, as with centralised electricity production, it delivers economies of scale for the provider, and consequently cost savings for the user, as well as the ability to access what you need, when you need it; providing solutions that are scalable and responsive to demand.

Generally the end user has no involvement (or need to invest) in the installation and maintenance of the hardware and infrastructure underpinning a cloud service, which is all controlled by the third party provider, but they can have input into software installations and configuration depending on which service they sign up for. These cloud services can be broken down into three tiers:

IaaS - Infrastructure as a Service - offers access to physical computing resource, including disk space on virtual servers and networks whilst leaving the installation and configuration of operating systems and software to the client.
PaaS - Platform as a Service - a platform including physical resource and operating systems together with the software (e.g., a solution stack) required to run a particular computing environment.
SaaS - Software as a Service - the user simply has access to applications running on a cloud platform.

Cloud Hosting
Cloud Hosting is a form of cloud computing, more specifically either IaaS or PaaS, whereby the end user can get access to shared physical resources - servers, networks, bandwidth and supporting infrastructure (plus solution stacks on PaaS) - without the need to purchase, rent or install specific hardware themselves. Typically cloud hosting is employed to serve websites but it can support other enterprise functions and networks.

In essence it is a variant of the wider concept of shared hosting but instead of multiple websites, for example, sharing a single physical server (including a software installation), those multiple sites are hosted across a network of shared servers (and computing resources) managed using software partitions. Cloud Hosting therefore provides scalable on-demand hosting capacity (as the appropriate level of physical resources can be accessed in accordance with demand), where the client doesn’t have to worry about the specifics of hardware installations and need only pay for what they use.

VDC - Under the banner of cloud hosting a VDC, or a Virtual Data Center, is again an IaaS which offers enterprises the opportunity to utilise their own networks of servers from the cloud using servers which are defined by software partitions rather than being physically distinct (although the underlying hardware resource is ultimately located within physical data centers).

Whatever demands a website and a business’s propositions create, there is always a hosting solution to fit the purpose. For many that will be cloud hosting due to its ability to offer cost efficiencies alongside unparalleled flexibility.
Enhanced by Zemanta