Tuesday 16 July 2013

Using Technology to Achieve a Work-Life Balance - VPN & BYOD

The following article introduces some of the technologies that can be used to help us improve our work-life balance by being more efficient and flexible in what work we do and where we do it from. Many of the technologies help us to work from dynamic locations and make communications and the sharing of information speedier and more versatile - thus providing benefits to both employers and their employees with higher staff morale and higher productivity.

VPN
The term VPN, or Virtual Private Network, is used to describe scenarios and technologies that allow two disparate local computer networks (LANs) to be securely connected across public networks such as the internet. The exact technologies and protocols can vary with some VPNs using software programs and/or network configurations, but the basic principle is that the data that is transmitted between the two endpoints on each network or device is contained within encrypted packets, whilst each endpoint itself requires authentication to restrict access to authorised users. As the encrypted packets can only be decoded at these endpoints, the data cannot be intercepted as it travels across the public networks.

This secure system can be used, not to only connect two distinct LANs regardless of geographical location, but also to connect individual machines/devices to LANs. For businesses it can therefore be a valuable technology for connecting separate office sites or allowing employees to connect with centralised LANs when travelling or working from other locations. However, for individual employees looking to improve their work-life balance it can be a vital tool allowing them to work from home and still access all of the secure files and data stored on their office’s servers, as well as running programs, such as email clients as if they were sat at their usual desk. The flexibility that this offers can, where the employer is obliging, massively ease time and travel pressures, preventing work from encroaching excessively on personal time. Moreover, employers using VPN are more likely to be obliging when it comes to changing working locations due to the security VPN offers, as well as the continuity, with employees able to contribute and work at the same capacity as if they were on-site.

BYOD
BYOD, which stands for Bring Your Own Device, represents a fast growing trend in the workplace whereby employees are permitted, and sometimes encouraged, to use their own personal devices in place of those provided by their company. A BYOD policy has to tackle security concerns as ‘untrusted’ devices (with varying malware vulnerabilities and the potential to take private data off the network) are introduced to otherwise restricted workplace LANs. On the other hand, adoption can reduce a business’s IT spend, introduce more IT functionality to the workplace and make individual employees more productive - as they work on devices with which they are more familiar. The adoption of BYOD and its benefits therefore relies on technologies such as VPN (above) to provide secure connections between devices and LANs (without necessarily bringing the device directly onto the LAN behind the firewall).

BYOD helps to improve the work-life balance because it blurs further the boundary between working from the office, on the road or at home so that there is a seamless transition between each; reducing the need to travel/commute in many cases. It can also increase the period and efficiency of output which, in turn, can mean that the working day eats less into personal time. All of which means more personal time spent at home. Furthermore, it can’t be underestimated how a sense of morale at work affects the work-life dynamic and so using devices with which one is familiar, experienced and comfortable can be important.

To find out more about the uses of unified communications including VoIP and video conferencing in the workplace you can check out what’s on offer from an enterprise level provider of unified communications.
Enhanced by Zemanta

Monday 15 July 2013

The Need for Standardisation in Cloud Computing - The Issues

The second instalment in this couplet of articles looks at some of the issues that the standardisation of cloud computing, including the European Commission's potential initiative, will aim to tackle and clarify in order to drive the adoption of cloud computing forward, particularly within its ripest markets, such as amongst SMEs.

Control Over Data & Security
Arguably the primary area for concern for prospective cloud computing clients is that of data handling. In other words knowing and controlling where your data - personal details if you are a personal consumer, or client data etc for businesses - is stored (geographically and technologically) and how secure it is in that location. For on-site private clouds, for example, this is less of a concern, but where a client is signing up to a public cloud service, based upon shared server resources and public network connections, they may not fully understand, nevermind influence, where their data lives.

The cloud computing model means that a client’s data can ultimately be stored across national boundaries, across continents even and that raises many issues around the varying jurisdictions under which that data exists. It can lead to conflicts between the differing jurisdictions under which cloud providers operate and under which the data they control is stored. As an illustration of this, data held by US cloud providers must be supplied to the US government on request under the US’s Patriot Act, even when that data is physically hosted in another country. Consequently, as a UK resident signing up to a Microsoft Live account for example, a consumer may not in fact realise that their personal details, and who has access to them, are governed by US laws, despite understanding that Microsoft is a US based company. In many other scenarios, private and commercial users of cloud services may not be confident of the nationality of the provider in the first place, never mind the jurisdictions and legislation that govern their data.

Not only may this lack of transparency lead to concerns over who has access to and jurisdiction over data but it may also raise questions about what security measures are applied to safeguard that data against those who shouldn’t have access to it in any case, and against any kind of intentional corruption of that data. Security vulnerabilities can of course sit at many points in the cloud model but client perception and awareness of those at source - at server/data centre level - can be far less clear than of those at the access points with which the client interacts.

Interoperability
Presently, the primary driver for standardisation across the industry, whether amongst clients who feel they have a grasp of their data handling processes or not, is that of interoperability - that is being able to switch their IT functions from one provider’s platform to another compatible platform. The current cloud market raises many questions in this area for organisations: if it moves some of its functions to one cloud provider will it then be locked into that provider for its associated functions; can it integrate functions hosted with other providers; will this carry prohibitive costs; can it switch workloads between different cloud services seamlessly; will it be able to migrate away from its chosen provider if a more preferable solution comes along? From a commercial point of view these are some of the most pressing questions when choosing a cloud provider and so there is gathering momentum across the industry, not just in Europe, to establish open standards which free consumers to treat their cloud computing services more like the utility computing that the cloud has long promised to deliver. In other words, allowing clients to tap into different provider’s services as and when they need them, without lock-ins and without barriers.

There are many other aspects of a cloud proposition, in relation to performance, uptime, storage space etc, that clients can have difficulty understanding and comparing like for like. All of these issues demand clear and standardised SLAs to come into play in order to define the language and metrics in which information can be presented to clients. Form a client’s point of view, however, the key is to seek out reputable cloud providers, enquire about interoperability physical hosting locations, use recommendations from clients with established relationships where possible and steer well clear of ambiguities.

To find out more about accessing secure and transparent cloud based sevices across the EU you can check out this pan-European operator of virtual data centres.

Thursday 11 July 2013

Careers in IT Beyond Development and System Admin - Project Management

Project Management Lifecycle
Project Management Lifecycle (Photo credit: IvanWalsh.com)
There is no doubt that the for those looking to switch their career paths, the world of IT, or information technology, can provide an attractive option because of the basic fact that the world’s demand for IT solutions is only going to increase. Whether it's the production of computing devices and software for the personal retail market or the creation and maintenance of IT infrastructures within the enterprise space, the demand keeps rising as we become more and more dependent on technology to underpin every aspect of our personal and professional lives.

When many people think of IT careers they may well think of writing code for software programs, or maintaining the hardware on which those programs run, however, there are a myriad of essential jobs which don’t require you to touch a line of code or tinker with a server. The following piece highlights some of the primary but alternative skill areas that anyone looking to kickstart a career in IT should investigate.

Project Management
Perhaps the most salient example of an IT career beyond development is project management. Every IT project, for example the deployment of a new in-house administration system, the building of a new website or the release of a software package, requires the guiding hand of a Project Manager to:

  • bring all of the project members (developers, network administrators, testers, marketers) and other stakeholders (clients, company boards) together in collaboration
  • keep communication flowing
  • scope and plan the project - including project objectives, scheduling and defined completion criteria
  • track and report the progress of the project
  • manage risk
  • determine the methodologies and tools that the project will employ to meet its stated aims


Project Managers (PMs) are often required to become familiar with a variety of different technologies between projects however, they rarely need to be hands on with creating IT elements themselves. It is therefore beneficial to have experience in IT, but any suitable individual with the ability to learn quickly and build a good team around them - i.e., good interpersonal and other soft skills - will be able to succeed. It is often a lone role within a project team and therefore requires that the individual is capable of working effectively on their own as well as within a team; with the skills to organise (and lead) both themselves and their team. In short, it requires a multi faceted skill set incorporating and combining soft skills with a strong technical awareness.

One attractive benefit of a Project Management role is that the skills employed are largely transferable, especially between different areas of IT such as software developments and systems deployment, but also beyond the IT sphere into other areas of business. Often the only limiting factor will be the individual’s ability to pick up the specifics of their project’s subject matter, as mentioned above.

There are a number of other similar roles, which can take on the title of project management, but where some of the responsibilities and levels of control are diluted, including project administrators and facilitators. Sometimes these may work alongside a project manager and can present an opportunity to gain valuable experience about what the role can entail.

The next installment in this series of articles will look at testing/quality assurance roles in relation to both software and hardware.

To find out more about training and qualifying to become a project manager you can check out this organisation offering ISEB certification in London.
Enhanced by Zemanta

Wednesday 10 July 2013

The Need for Standardisation in Cloud Computing - Introduction

To many observers, cloud computing may appear to be spreading like wildfire with both enterprise and personal users jumping at the chance to take advantage of the cost effectiveness, scalability and flexibility that it offers. However, there is a strong debate amongst industry experts, and beyond, as to whether this uptake, however rapid, has been severely tempered by a lack of trust and understanding around cloud services from prospective clients.

The debate stems from the thought that there is a perceived lack of transparency caused by the multi-server approach to the creation of cloud platforms and the differing propositions put forward by individual cloud providers; and that this in turn is obscuring client understanding of what it is exactly that they are choosing to sign up to.

Moreover, it is argued that some of the markets that would benefit most from cloud adoption are made up of the same clients that are more predisposed to be reluctant to take on the perceived risk of signing up to cloud services. As a generalisation, large scale enterprises are perhaps more likely to possess the budgets to either host private cloud services internally or engage with third party providers to define exactly what they getting from their service, whilst private users perhaps only engage with the cloud at a lower level where they don’t have the inclination to analyse the performance and security issues at play. However, in between, SMEs (small to medium sized enterprises) are likely to be better informed as to both the benefits and risks of cloud computing platforms, but won’t necessarily have the budgets to bring IT functions in-house or employ dedicated professionals with the expertise themselves to procure the most suitable services. In other words, the likelihood is that SMEs are more reliant on third party suppliers, aware of the non-specific risks of each proposition but unable to control the specific vulnerabilities of the cloud.

Standardisation

Many propose that, as has been the case in many markets that have preceded cloud computing, the answer to client wariness is standardisation with the aim of delivering transparencies. In other words, create a market where a client can shop between multiple providers and judge their security levels, data handling, performance and service stability on comparable metrics.

One of the main driving forces behind standardisation in the European cloud computing market is the European Commission (the executive arm of the European Union) who are keen to implement a new set of standards across the 27 constituent members of the EU. The intention of these standards, alongside updated data protection rules, is to allow the consistent delivery of cloud services spanning national borders within the union - much like the commission has delivered with economic migration. Together they aim to build client trust that their data is handled and stored within the same legal frameworks whether it is physically hosted in Holland or the UK, for example. The policies would see the introduction of a certification scheme whereby cloud providers across the EU would be certified if they were shown to conform to the commission's standards on data handling, interoperability and security.

Perhaps at the crux of what the commission's policy would seek to clean up, however, is the topic of SLAs or Service Level Agreements. These are the documents that outline what it is exactly that the client is signing up for and what services they can expect from their cloud provider when they hand over their money. Standardising SLAs is key to building trust in the cloud computing market because it introduces the transparency for cloud clients when they are analysing their options. The subjects covered by SLAs are explored further in the second part of the article.

To find out more about accessing secure and transparent cloud based sevices across the EU you can check out this operator of pan-European virtual data centres.

Monday 8 July 2013

The Features of Mobile Tech and their Applications for Good Causes - Connectivity

The following two parted article examines the key features of mobile technology and how these features can be vital to those looking to use mobile devices for good causes; whether it be aid or health agencies employing them ‘in the field’ or charities rolling them out to disadvantaged individuals to improve their quality of life.

Wireless Connectivity
Perhaps the primary advantage of any portable device, in terms of its use for charities and aid agencies for example, is the factor that makes it portable in the first place - that is its wireless connectivity. There are a myriad of ways in which devices can connect with the rest of the world. When it comes to delivering basic communications, vast swathes of the developed and developing world are covered by mobile phone networks and, as the more basic mobile phones are becoming cheaper and cheaper, it has never been easier to make phone contact across disparate locations. Where mobile phone signals don’t exist yet (due to a lack of mobile phone base stations) there is still the option of using satellite phones which are potentially able to relay voice and simple data communications, using satellites, between any two locations across the planet.

However, the real advances in the last decade have gone beyond sharing one-to-one conversations in opening up the internet, and therefore the ability to share vast amounts of information, to portable devices such as notebooks, tablets and smartphones. Such devices, when connected to wireless (WiFi) hotspots or 3G (and increasingly 4G) cellular data networks, can give users access to the internet when they are away from fixed (home or office) locations, in transit or in the field to allow data sharing and collaboration. For any aid worker or health professional working in the field for example, this can be a vital means of immediately sharing information about patients or environments, with colleagues - perhaps back at a base - for further analysis and diagnosis.

Using the internet (on 3G for example) to carry data, mobile VPN (virtual private networks) can also provide a secure link between disparate locations so that any of this data/information which is private and sensitive can be shared with, and restricted to, trusted individuals and networks. Following on from the above example, but more specifically, health workers visiting patients off-site in their own homes can instantaneously update health records on secure centralised servers using mobile VPN technology, with no need to wait until they are back at base.

GPS
Most portable devices such as smartphones and tablets also come with GPS integrated within their connectivity options. GPS, or Global Positioning System, uses signals bounced from multiple satellites to identify where any device in the world is located. For individual consumers, it helps us to navigate maps and see what services and attractions are nearby, but for aid workers it can allow vital information concerning their context to be logged alongside other data they are sharing. If water samples, or photos are being captured for example, GPS functionality can add an automatic and accurate time (incorporating time zone) and place stamp, making the information far more complete, accurate and useful.

What’s more, for those actually carrying a portable device, the GPS functionality can prove life saving as allows their position to be tracked and picked up when they are in need of assistance. Whether it's a lost walker or an elderly individual who’s had a fall, their support and rescue can locate them without delay where GPS is utilised.

To find out more about how mobile devices are being used for good causes you can check out these videos from Vodafone's Mobile for Good Foundation, or get more information on the uses of VPN.
Enhanced by Zemanta