Comments
yourfanat wrote: I am using another tool for Oracle developers - dbForge Studio for Oracle. This IDE has lots of usefull features, among them: oracle designer, code competion and formatter, query builder, debugger, profiler, erxport/import, reports and many others. The latest version supports Oracle 12C. More information here.
Cloud Computing
Conference & Expo
November 2-4, 2009 NYC
Register Today and SAVE !..

2008 West
DIAMOND SPONSOR:
Data Direct
SOA, WOA and Cloud Computing: The New Frontier for Data Services
PLATINUM SPONSORS:
Red Hat
The Opening of Virtualization
GOLD SPONSORS:
Appsense
User Environment Management – The Third Layer of the Desktop
Cordys
Cloud Computing for Business Agility
EMC
CMIS: A Multi-Vendor Proposal for a Service-Based Content Management Interoperability Standard
Freedom OSS
Practical SOA” Max Yankelevich
Intel
Architecting an Enterprise Service Router (ESR) – A Cost-Effective Way to Scale SOA Across the Enterprise
Sensedia
Return on Assests: Bringing Visibility to your SOA Strategy
Symantec
Managing Hybrid Endpoint Environments
VMWare
Game-Changing Technology for Enterprise Clouds and Applications
Click For 2008 West
Event Webcasts

2008 West
PLATINUM SPONSORS:
Appcelerator
Get ‘Rich’ Quick: Rapid Prototyping for RIA with ZERO Server Code
Keynote Systems
Designing for and Managing Performance in the New Frontier of Rich Internet Applications
GOLD SPONSORS:
ICEsoft
How Can AJAX Improve Homeland Security?
Isomorphic
Beyond Widgets: What a RIA Platform Should Offer
Oracle
REAs: Rich Enterprise Applications
Click For 2008 Event Webcasts
In many cases, the end of the year gives you time to step back and take stock of the last 12 months. This is when many of us take a hard look at what worked and what did not, complete performance reviews, and formulate plans for the coming year. For me, it is all of those things plus a time when I u...
SYS-CON.TV
Can Virtual Desktop Infrastructure Improve BYOD Security Issues?
VDIs Can Solve Several Common BYOD Concerns

Bring Your Own Device policies have fascinated both the corporate world and the tech world for some time now. Part of the allure is the added productivity and the added ease of use for workers. But, that doesn't explain why there are thousands of tech pieces on BYOD policies, failings and warnings. The truth is, we're all fascinated by how it flawlessly bridges the gap between home and work life.

BYOD first sprung up as Millennials demanded more flexibility, more control. They wanted less of a barrier between work and home life, and working from their iPads while watching Netflix at home struck the perfect balance.

Then, there were the problems that inevitably followed. Companies realized that employees' devices are almost never as secure as corporate machines. When devices got stolen, there weren't many options to deal with the situation, and sensitive company information fell into strangers' hands.

Businesses tightened security on the devices that participated in the program, and employees began to realize what that means. Some BYOD policies began to include total remote wipe abilities and geo-locating capabilities. Employees pushed back, some sued and policies changed. Now, most offices have given up remote wipes and using the phone's GPS for any in-house apps.

The top thinkers in the tech space haven't quite found the magic bullet to alleviate all security and consistency concerns for the consumerization of IT yet, but there are signs they're getting closer. Stemming from these conflicting needs of security and privacy, more solutions were searched out. The best and the brightest came up with using Virtual Desktop Infrastructures. VDIs run virtual desktops right from the company servers, which the company is free to lock-down as much as they feel like they need to.

Traditional BYOD policies had two main concerns: Companies worried about security; employees worried about privacy. VDIs are almost perfectly suited to solve these BYOD issues.

Security Issues
Company data doesn't live on the employee device so remote wipes aren't necessary. If an employee loses their device, their account can simply be denied access. Firewalls are put in place on the company server side; not on the employee device. There are still some limited security concerns, but the practice has been deemed good enough to house medical records.

Privacy Issues
Employees are working on a virtual machine that doesn't require the permissions that an app might. There's no geo-locating need, since the company data is secure on the company servers. The company has no need to look at phone data, because nothing on the virtual server will be affected by it. In terms of employee privacy, it's as near a perfect solution as can be found with our current technology.

Incompatibility Issues
Kindle Fires, Nooks, Nexuses and iPads don't all run the same software. Sometimes programs aren't available for each device at all, other times employees just haven't invested in them. Instead of forcing the entire office to purchase mobile versions of Microsoft Office, access virtual machines on them so they can all have access to the same software they use at their desks. Of course, this means that they can still use the same firewall and security programs as well.

In a world where the only thing valued more than company security is individual privacy, tech experts are trying to find the perfect solution to the BYOD dilemma. Virtual Desktop Infrastructures have burst back onto the scene just in time to offer some glimmer of hope that everyone's priorities can be met.

About Amy Bishop
Amy Bishop works in marketing and digital strategy for a technology startup. Her previous experience has included five years in enterprise and agency environments. She specializes in helping businesses learn about ways rapidly changing enterprise solutions, business strategies and technologies can refine organizational communication, improve customer experience and maximize co-created value with converged marketing strategies.

Connect with Amy on Twitter, LinkedIn, Google+ or Pinterest.



SOA World Latest Stories
The explosion of new web/cloud/IoT-based applications and the data they generate are transforming our world right before our eyes. In this rush to adopt these new technologies, organizations are often ignoring fundamental questions concerning who owns the data and failing to ask for pe...
Containers and Kubernetes allow for code portability across on-premise VMs, bare metal, or multiple cloud provider environments. Yet, despite this portability promise, developers may include configuration and application definitions that constrain or even eliminate application portabil...
DevOps is often described as a combination of technology and culture. Without both, DevOps isn't complete. However, applying the culture to outdated technology is a recipe for disaster; as response times grow and connections between teams are delayed by technology, the culture will die...
If your cloud deployment is on AWS with predictable workloads, Reserved Instances (RIs) can provide your business substantial savings compared to pay-as-you-go, on-demand services alone. Continuous monitoring of cloud usage and active management of Elastic Compute Cloud (EC2), Relation...
Consumer-driven contracts are an essential part of a mature microservice testing portfolio enabling independent service deployments. In this presentation we'll provide an overview of the tools, patterns and pain points we've seen when implementing contract testing in large development ...
In his session at 19th Cloud Expo, Claude Remillard, Principal Program Manager in Developer Division at Microsoft, contrasted how his team used config as code and immutable patterns for continuous delivery of microservices and apps to the cloud. He showed how the immutable patterns hel...
Subscribe to the World's Most Powerful Newsletters
Subscribe to Our Rss Feeds & Get Your SYS-CON News Live!
Click to Add our RSS Feeds to the Service of Your Choice:
Google Reader or Homepage Add to My Yahoo! Subscribe with Bloglines Subscribe in NewsGator Online
myFeedster Add to My AOL Subscribe in Rojo Add 'Hugg' to Newsburst from CNET News.com Kinja Digest View Additional SYS-CON Feeds
Publish Your Article! Please send it to editorial(at)sys-con.com!

Advertise on this site! Contact advertising(at)sys-con.com! 201 802-3021


SYS-CON Featured Whitepapers
ADS BY GOOGLE