Welcome!

Microservices Expo Authors: Anders Wallgren, Martin Etmajer, Elizabeth White, Liz McMillan, Jason Bloomberg

Related Topics: Microservices Expo, Mobile IoT, Containers Expo Blog, @CloudExpo

Microservices Expo: Blog Feed Post

Why MDM May Save IT from Consumerization

Mobile convergence may drive demand for #VDI and other less invasive technologies

When you’re traveling you carry devices. I’ve got my smart phone, of course, to keep connected via e-mail and text and, if need be, voice. But I also carry my tablet and the old stand-by, my laptop. Because writing a blog post on my tablet or smart phone just isn’t my thing. While status updates and tweets are easy enough to compose on such constrained-size keyboards, I (and many others) need a full keyboard to really crank out the copy.

But when I’m wandering around a conference it’d be nice to be able to focus on just one, which is where convergence comes in. My phone is a corporate resource, completely managed by our more than able IT department but the tablet? That’s mine (well, and the Little Man who’s in charge of our household at the moment).

delete tablet

So while traveling out to Cloud Connect I tried to set up access to my corporate e-mail account on my tablet. It’s a Samsung Galaxy Tab 10.1 and it’s an Android device. It supports standard e-mail access via POP3 and IMAP – I already have my Gmail and personal accounts connected – but it also, apparently, supports Microsoft Exchange ActiveSync which supports hundreds of devices. It’s through ActiveSync that our growing iPhone using population accesses e-mail when they’re on the road. So I thought I’d give it a try.

It worked like a charm, until I got to the warning part.

HYPER-STRICT SECURITY

SC20120212-142429

That was the part that gave over complete – and I do mean complete – control to the fine IT folks at headquarters.

The list of actions required to be allowed would not be surprising (and indeed are not) when applied to a corporate managed resources, like my Blackberry. But when I read through what I had to allow administrators to potentially perform on my device, I had second thoughts.

It all makes perfect sense. If I’m going to have corporate e-mail messages, which in addition to their sensitive nature often times include attachments that have even more confidential data – product roadmaps, marketing strategies, detailed internal discussions on functionality and features – then it would be necessary to follow best practices like locking the screen with a password and requiring stored data to be encrypted.

I stopped right there. Not because I didn’t think it was good practice and a requirement, but because my four year old routinely uses my device. He’s quite adept at getting around on an Android device (I’ve finally managed to teach him to ask before installing or buying new games) and while he occasionally deletes items – permanently and purposefully – generally he’s a good steward of the technology while he’s using it.

But can he learn to enter a password that may be required (and forced on the device) by IT administrators? And even if he could, is that even acceptable? The rule is never share your password, and perhaps in today’s increasingly consumerized IT that should be amended to “especially not with your four year old.”

And what if I allowed the administrator to do these things – require a password with a complex rule – and then the young man tried to access it without my presence? Sure, he always asks before he uses it today, but tomorrow? This is a child, we’re talking about. What if he grabs it and tries to unlock it – and fails? Would IT automatically delete everything on the device, as I’ve granted them permission to do?

And would IT be willing to talk him down from the hysteria when he realizes every one of his games has been deleted remotely?

I’m guessing not.

AT an IMPASSE

And so I hit “cancel”, because ultimately I wasn’t willing give over that much control and suffer the potential “damage” just for the convenience of converged e-mail. Then I considered what that meant. I am perfectly fine with the same control over my corporate owned and issued resources – my laptop, my Blackberry – but not my own, personal mobile device.

The hyper-security policy scared me away from using a personal, consumer grade device because they wanted to turn it into an enterprise-grade device.

I spent much of the rest of the flight wondering if VDI was the solution to this problem. It effectively sandboxes corporate resources within an enterprise-grade container and they can do whatever they want to it without any impact on my device. But not all VDI solutions are equal – and most assume connectedness, which is not entirely compatible with the on-again off-again nature of roaming, mobile devices when on the road. yooninja

Certainly a less invasive MDM policy would also suffice (I’m sure administrators can pick and choose which actions they want to be allowed) but that would defeat the purpose of managing the device in the first place. If they can’t secure the corporate data that might be on my device, in a way that’s compliant with corporate (and potentially industry and government) policies, then there’s no point in offering the option.

We’re at an impasse, it seems.

And maybe that’s not necessarily a bad thing. If overly strict security policies are required in order to access something as simple as e-mail and users are scared away by the potential wiping of their device, maybe that’s a good thing. Corporate resources are kept secure and one less headache (managing yet another device) is averted until we can come up with a solution that balances the need for security with the need for me to ensure games like Yoo Ninja and Tank Hero don’t inadvertently end up in the trash bin.

Ultimately there will be a solution that does just that – a combination of a secure storage vault on the device, managed exclusively by IT, in which e-mail – and other resources retrieved via secure remote access solutions – can be encrypted and managed as per their specific security needs. And that area can be protected by specific passwords and strength policies and wiped at a moment’s notice – without disturbing the all important Reading Monster or Captain America.

But that technology doesn’t yet exist, though the need certainly does. Trusting that the old adage1 continues to be right – that necessity is indeed the mother of invention – I’ve no doubt someone will come up with that technology in the near future.

1 The source of this idiom is apparently hotly contested – Plato, Whistler, and Victor Hugo are all cited as being the source.

Read the original blog entry...

More Stories By Lori MacVittie

Lori MacVittie is responsible for education and evangelism of application services available across F5’s entire product suite. Her role includes authorship of technical materials and participation in a number of community-based forums and industry standards organizations, among other efforts. MacVittie has extensive programming experience as an application architect, as well as network and systems development and administration expertise. Prior to joining F5, MacVittie was an award-winning Senior Technology Editor at Network Computing Magazine, where she conducted product research and evaluation focused on integration with application and network architectures, and authored articles on a variety of topics aimed at IT professionals. Her most recent area of focus included SOA-related products and architectures. She holds a B.S. in Information and Computing Science from the University of Wisconsin at Green Bay, and an M.S. in Computer Science from Nova Southeastern University.

@MicroservicesExpo Stories
How is your DevOps transformation coming along? How do you measure Agility? Reliability? Efficiency? Quality? Success?! How do you optimize your processes? This morning on #c9d9 we talked about some of the metrics that matter for the different stakeholders throughout the software delivery pipeline. Our panelists shared their best practices.
In a previous article, I demonstrated how to effectively and efficiently install the Dynatrace Application Monitoring solution using Ansible. In this post, I am going to explain how to achieve the same results using Chef with our official dynatrace cookbook available on GitHub and on the Chef Supermarket. In the following hands-on tutorial, we’ll also apply what we see as good practice on working with and extending our deployment automation blueprints to suit your needs.
Sensors and effectors of IoT are solving problems in new ways, but small businesses have been slow to join the quantified world. They’ll need information from IoT using applications as varied as the businesses themselves. In his session at @ThingsExpo, Roger Meike, Distinguished Engineer, Director of Technology Innovation at Intuit, showed how IoT manufacturers can use open standards, public APIs and custom apps to enable the Quantified Small Business. He used a Raspberry Pi to connect sensors...
Let’s face it, embracing new storage technologies, capabilities and upgrading to new hardware often adds complexity and increases costs. In his session at 18th Cloud Expo, Seth Oxenhorn, Vice President of Business Development & Alliances at FalconStor, will discuss how a truly heterogeneous software-defined storage approach can add value to legacy platforms and heterogeneous environments. The result reduces complexity, significantly lowers cost, and provides IT organizations with improved effi...
The cloud promises new levels of agility and cost-savings for Big Data, data warehousing and analytics. But it’s challenging to understand all the options – from IaaS and PaaS to newer services like HaaS (Hadoop as a Service) and BDaaS (Big Data as a Service). In her session at @BigDataExpo at @ThingsExpo, Hannah Smalltree, a director at Cazena, will provide an educational overview of emerging “as-a-service” options for Big Data in the cloud. This is critical background for IT and data profes...
Father business cycles and digital consumers are forcing enterprises to respond faster to customer needs and competitive demands. Successful integration of DevOps and Agile development will be key for business success in today’s digital economy. In his session at DevOps Summit, Pradeep Prabhu, Co-Founder & CEO of Cloudmunch, covered the critical practices that enterprises should consider to seamlessly integrate Agile and DevOps processes, barriers to implementing this in the enterprise, and pr...
If we look at slow, traditional IT and jump to the conclusion that just because we found its issues intractable before, that necessarily means we will again, then it’s time for a rethink. As a matter of fact, the world of IT has changed over the last ten years or so. We’ve been experiencing unprecedented innovation across the board – innovation in technology as well as in how people organize and accomplish tasks. Let’s take a look at three differences between today’s modern, digital context...
The principles behind DevOps are not new - for decades people have been automating system administration and decreasing the time to deploy apps and perform other management tasks. However, only recently did we see the tools and the will necessary to share the benefits and power of automation with a wider circle of people. In his session at DevOps Summit, Bernard Sanders, Chief Technology Officer at CloudBolt Software, explored the latest tools including Puppet, Chef, Docker, and CMPs needed to...
Cognitive Computing is becoming the foundation for a new generation of solutions that have the potential to transform business. Unlike traditional approaches to building solutions, a cognitive computing approach allows the data to help determine the way applications are designed. This contrasts with conventional software development that begins with defining logic based on the current way a business operates. In her session at 18th Cloud Expo, Judith S. Hurwitz, President and CEO of Hurwitz & ...
Data-as-a-Service is the complete package for the transformation of raw data into meaningful data assets and the delivery of those data assets. In her session at 18th Cloud Expo, Lakshmi Randall, an industry expert, analyst and strategist, will address: What is DaaS (Data-as-a-Service)? Challenges addressed by DaaS Vendors that are enabling DaaS Architecture options for DaaS
One of the bewildering things about DevOps is integrating the massive toolchain including the dozens of new tools that seem to crop up every year. Part of DevOps is Continuous Delivery and having a complex toolchain can add additional integration and setup to your developer environment. In his session at @DevOpsSummit at 18th Cloud Expo, Miko Matsumura, Chief Marketing Officer of Gradle Inc., will discuss which tools to use in a developer stack, how to provision the toolchain to minimize onboa...
The (re?)emergence of Microservices was especially prominent in this week’s news. What are they good for? do they make sense for your application? should you take the plunge? and what do Microservices mean for your DevOps and Continuous Delivery efforts? Continue reading for more on Microservices, containers, DevOps culture, and more top news from the past week. As always, stay tuned to all the news coming from@ElectricCloud on DevOps and Continuous Delivery throughout the week and retweet/favo...
Microservices are a type of software architecture where large applications are made up of small, self-contained units working together through APIs that are not dependent on a specific language. Each service has a limited scope, concentrates on a specific task and is highly independent. This setup allows IT managers and developers to build systems in a modular way. In his book, “Building Microservices,” Sam Newman said microservices are small, focused components built to do a single thing very w...
SYS-CON Events announced today that Catchpoint Systems, Inc., a provider of innovative web and infrastructure monitoring solutions, has been named “Silver Sponsor” of SYS-CON's DevOps Summit at 18th Cloud Expo New York, which will take place June 7-9, 2016, at the Javits Center in New York City, NY. Catchpoint is a leading Digital Performance Analytics company that provides unparalleled insight into customer-critical services to help consistently deliver an amazing customer experience. Designed...
With the proliferation of both SQL and NoSQL databases, organizations can now target specific fit-for-purpose database tools for their different application needs regarding scalability, ease of use, ACID support, etc. Platform as a Service offerings make this even easier now, enabling developers to roll out their own database infrastructure in minutes with minimal management overhead. However, this same amount of flexibility also comes with the challenges of picking the right tool, on the right ...
SYS-CON Events announced today that Interoute, owner-operator of one of Europe's largest networks and a global cloud services platform, has been named “Bronze Sponsor” of SYS-CON's 18th Cloud Expo, which will take place on June 7-9, 2015 at the Javits Center in New York, New York. Interoute is the owner-operator of one of Europe's largest networks and a global cloud services platform which encompasses 12 data centers, 14 virtual data centers and 31 colocation centers, with connections to 195 ad...
SYS-CON Events announced today that Alert Logic, Inc., the leading provider of Security-as-a-Service solutions for the cloud, will exhibit at SYS-CON's 18th International Cloud Expo®, which will take place on June 7-9, 2016, at the Javits Center in New York City, NY. Alert Logic, Inc., provides Security-as-a-Service for on-premises, cloud, and hybrid infrastructures, delivering deep security insight and continuous protection for customers at a lower cost than traditional security solutions. Ful...
SYS-CON Events announced today that Commvault, a global leader in enterprise data protection and information management, has been named “Bronze Sponsor” of SYS-CON's 18th International Cloud Expo, which will take place on June 7–9, 2016, at the Javits Center in New York City, NY, and the 19th International Cloud Expo, which will take place on November 1–3, 2016, at the Santa Clara Convention Center in Santa Clara, CA. Commvault is a leading provider of data protection and information management...
With an estimated 50 billion devices connected to the Internet by 2020, several industries will begin to expand their capabilities for retaining end point data at the edge to better utilize the range of data types and sheer volume of M2M data generated by the Internet of Things. In his session at @ThingsExpo, Don DeLoach, CEO and President of Infobright, will discuss the infrastructures businesses will need to implement to handle this explosion of data by providing specific use cases for filte...
WebSocket is effectively a persistent and fat pipe that is compatible with a standard web infrastructure; a "TCP for the Web." If you think of WebSocket in this light, there are other more hugely interesting applications of WebSocket than just simply sending data to a browser. In his session at 18th Cloud Expo, Frank Greco, Director of Technology for Kaazing Corporation, will compare other modern web connectivity methods such as HTTP/2, HTTP Streaming, Server-Sent Events and new W3C event APIs ...