Welcome!

Microservices Expo Authors: Dan Blacharski, Yeshim Deniz, Mehdi Daoudi, AppNeta Blog, Elizabeth White

Related Topics: Microservices Expo, Industrial IoT, Mobile IoT, Containers Expo Blog, @CloudExpo

Microservices Expo: Article

Telecommuting – The Invisible Employee

The biggest advantages to having remote workers & virtual offices are in-house facility costs, expansion, & talent acquisition

One of the truisms in information technology is that everything old is new again - well, except maybe for punched cards. We went from big corporate data centers to regional/division corporate data centers back to big corporate data centers and now to even bigger cloud data centers. We have gone from dumb terminals were everything was done on the mainframe, to PCs, and now to virtualized desktops - where everything is run on the central servers. And now, we are back to talking about the IT advantages of telecommuting.

Telecommuting is certainly nothing new. But what is changing is how people are telecommuting and the IT processes and procedures that support them. Gone are the days of modem banks and analog days. Gone are the days when IT departments handed out PCs so people could work from home. And gone are the days when connecting remote employees meant connecting them directly into the corporate network.

When most people think of telecommuting, we hark back to the model that JetBlue made famous: the company supplied the personal computer, monitor, keyboard, mouse, and Internet connection (there is no need to go back to the caveman days with terminals and modems or acoustic couplers!). The PC was company property so that the policies, anti-virus, patches, etc., could all be controlled and managed by the corporate IT department. After all, a lot of employees still didn't even own their own computer.

These PCs had the necessary software pre-loaded on them, be it a thick client or a terminal emulator. When the remote staff connected in - their computers were placed onto the corporate network and became part of the companies extended network. When the PCs needed to be updated, patched, or upgraded - the employee had to bring everything back to the in-house IT department.

What changed? Well... EVERYTHING! There were four basic changes made for teleworking - and each of these changes required the IT department to adapt in different ways. As the ability to provide a realistic work environment kept increasing, we have gone from teleworkers to virtual offices.

One of the first big changes was that users no longer wanted to take a company PC home with them. They had their own perfectly good computer, and wanted to be able to connect using their machines. These machines/users wanted to connect to the company over the Internet instead of through dial-up modems. So IT departments started to increase their network connectivity, add Virtual Private Network (VPN) devices, and put in place intrusion detection/prevention appliances. Many a sleepless night was had by the IT administrator waiting for some remote user to spread a worm or Trojan through the entire organization.

The next big change was also Internet related - the death of thick clients. As browser technologies involved we were finally able to produce thick-client like look-and-feel inside a browser window. Most companies ported their internal applications to use browser-based web interfaces. These browser-based applications were exactly what were needed to allow better remote workers.

Ironically the Internet contributed the necessary technology to the next big change in our march to the virtual office: the move from IPSec-based VPN connections to browser-based SSL connections. IPSec, while a good protocol, proved problematic. Many travelers found out that their VPN connections were either blocked, or that the ISP or hotel lacked the technology to allow IPSec to pass through their networks. Just about every company's helpdesk received a call from some executive complaining about being unable to connect, and the helpdesk would have to try to work with the hotel or ISP to resolve the problem (and usual not be able to).

SSL VPNs resolve that issue because they work through the browser - an application that every PC already had loaded and that every user was already familiar with using. No longer would users have to be given CDs of the VPN software along with installation instructions (and the sure to follow helpdesk call). Most SSL VPN systems function as a proxy to allow dynamic access rights to the user. Instead of connecting them to the network (along with every virus, Trojan, and worm and the person's computer), we can now limit them to accessing the company's Intranet server, or to allow only access to specific company web pages.

Now that we have people using their own computers, over their own Internet connection, to securely access browser based applications - we must be done, right? What could be left? What is left is giving the user the necessary tools to have a virtual office instead of a remote connection.

Remote phone are required. The person needs to have a phone at his desk - even if that desk is 1000 miles away (or more). Here again new technology was required. We needed the new modern voice systems that allow Voice over IP (VoIP) so that we could have corporate phones remotely become part of the corporate telephone system. Even here, this is starting to give way to soft phones - software running on somebody's computer that provides that phone interface.

The remote person needs to know if his/her co-worker is available. After all, she can't simply look over the cubicle wall anymore to see if the coworker is there or not - and she can't see/hear if the co-worker is on the phone. But presence software, tied into the phone and using software on the person's computer, can tell the remote person if that co-worker is on the phone, in a meeting, or even at their desk working on their computer. Such presence software is normally built into an instant messaging client. These clients provide an easy way to communicate with somebody. Instant messaging is the new way to ask: Do you have a second?

The final piece of the puzzle to finally become feasible is video conferencing. IT departments no longer have to purchase expensive cameras, video conferencing servers, and large data connections everywhere. Point-to-point ad-hoc video conferences are easily done today with commercial "webcams" sitting on people's monitors and attached to their computers. In fact, most modern laptops have webcams built into them. Video conferencing allows the visual interfacing that is critical in modern communications. If you think that video is not important, remember that 70% of all our communication information comes from visual "clues". Without providing video conferencing, you are removing 70% of the person's comprehension.

Now that we know how to create a modern telecommuter environment, the question becomes whether we should allow telecommuting. Why are companies, both big and small, investing in this technology? Is this a technology that you should to be implementing?

The biggest advantages to having remote workers and virtual offices are in-house facility costs, expansion, and talent acquisition. Companies that have increased their use of remote workers have benefited from reduced building overhead expenses. One company that I frequently visit has been so successful with their remote worker program that they had to close the on-site cafeteria because there simply wasn't enough staff present to make use of it.

JetBlue used remote employees to staff their reservation lines. These were primarily part-time college educated women who only wanted to work 3-4 hours while their kids were in school. Using remote employees allowed JetBlue to staff across the country - thereby moving calls across the country as people's shifts changed. This is something that could not have been done with a traditional on-site call center.

Sometimes the perfect employee that you need to succeed isn't willing to relocate to where your office is. This leaves employers with the choice of either doing without a key resource, or figuring out how to allow that employee to work from home. Remote employees and virtual offices empower an employer to find the employee that will best contribute to the company - even if that person lives in a mountain cabin.

Those people who wonder if I really mean what I say about the advantages of virtual offices should know that it is what I use. I have a company phone that connects directly over the Internet to the company's phone system. I have an SSL VPN connection to gain access to the internal system. I use Cisco's Jabber service to provide presence information and instant messaging capabilities. And I use Cisco's WebEx Telepresence video conferencing service for when I need "face-to-face" time. The most important lesson I have learned about using a virtual office is to treat it like it is your real office - because the day you decide to wear your fuzzy slippers to the office is the day your boss will have a surprise video conference call with you.

More Stories By Dean Nedelman

Dean Nedelman is Director of Professional Services at ASi Networks, a network and voice services firm in City of Industry, Calif. In this role, he supports our major accounts, and oversees the implementation of advanced Cisco solutions and services. He has over 25 years of experience in technical and executive level technology roles, primarily in secure high performance computer environments across multiple industries and sectors. Dean's background includes security, high availability, telephony, advanced network, wide area application services, and storage area networks.

Comments (0)

Share your thoughts on this story.

Add your comment
You must be signed in to add a comment. Sign-in | Register

In accordance with our Comment Policy, we encourage comments that are on topic, relevant and to-the-point. We will remove comments that include profanity, personal attacks, racial slurs, threats of violence, or other inappropriate material that violates our Terms and Conditions, and will block users who make repeated violations. We ask all readers to expect diversity of opinion and to treat one another with dignity and respect.


@MicroservicesExpo Stories
When you decide to launch a startup company, business advisors, counselors, bankers and armchair know-it-alls will tell you that the first thing you need to do is get funding. While there is some validity to that boilerplate piece of wisdom, the availability of and need for startup funding has gone through a dramatic transformation over the past decade, and the next few years will see even more of a shift. A perfect storm of events is causing this seismic shift. On the macroeconomic side this ...
Developers want to create better apps faster. Static clouds are giving way to scalable systems, with dynamic resource allocation and application monitoring. You won't hear that chant from users on any picket line, but helping developers to create better apps faster is the mission of Lee Atchison, principal cloud architect and advocate at New Relic Inc., based in San Francisco. His singular job is to understand and drive the industry in the areas of cloud architecture, microservices, scalability ...
A Man in the Middle attack, or MITM, is a situation wherein a malicious entity can read/write data that is being transmitted between two or more systems (in most cases, between you and the website that you are surfing). MITMs are common in China, thanks to the “Great Cannon.” The “Great Cannon” is slightly different from the “The Great Firewall.” The firewall monitors web traffic moving in and out of China and blocks prohibited content. The Great Cannon, on the other hand, acts as a man in the...
This recent research on cloud computing from the Register delves a little deeper than many of the "We're all adopting cloud!" surveys we've seen. They found that meaningful cloud adoption and the idea of the cloud-first enterprise are still not reality for many businesses. The Register's stats also show a more gradual cloud deployment trend over the past five years, not any sort of explosion. One important takeaway is that coherence across internal and external clouds is essential for IT right n...
Cloud promises the agility required by today’s digital businesses. As organizations adopt cloud based infrastructures and services, their IT resources become increasingly dynamic and hybrid in nature. Managing these require modern IT operations and tools. In his session at 20th Cloud Expo, Raj Sundaram, Senior Principal Product Manager at CA Technologies, will discuss how to modernize your IT operations in order to proactively manage your hybrid cloud and IT environments. He will be sharing be...
Back in February of 2017, Andrew Clay Schafer of Pivotal tweeted the following: “seriously tho, the whole software industry is stuck on deployment when we desperately need architecture and telemetry.” Intrigue in a 140 characters. For me, I hear Andrew saying, “we’re jumping to step 5 before we’ve successfully completed steps 1-4.”
Enterprise architects are increasingly adopting multi-cloud strategies as they seek to utilize existing data center assets, leverage the advantages of cloud computing and avoid cloud vendor lock-in. This requires a globally aware traffic management strategy that can monitor infrastructure health across data centers and end-user experience globally, while responding to control changes and system specification at the speed of today’s DevOps teams. In his session at 20th Cloud Expo, Josh Gray, Chie...
To more closely examine the variety of ways in which IT departments around the world are integrating cloud services, and the effect hybrid IT has had on their organizations and IT job roles, SolarWinds recently released the SolarWinds IT Trends Report 2017: Portrait of a Hybrid Organization. This annual study consists of survey-based research that explores significant trends, developments, and movements related to and directly affecting IT and IT professionals.
In his general session at 19th Cloud Expo, Manish Dixit, VP of Product and Engineering at Dice, discussed how Dice leverages data insights and tools to help both tech professionals and recruiters better understand how skills relate to each other and which skills are in high demand using interactive visualizations and salary indicator tools to maximize earning potential. Manish Dixit is VP of Product and Engineering at Dice. As the leader of the Product, Engineering and Data Sciences team at D...
NHK, Japan Broadcasting, will feature the upcoming @ThingsExpo Silicon Valley in a special 'Internet of Things' and smart technology documentary that will be filmed on the expo floor between November 3 to 5, 2015, in Santa Clara. NHK is the sole public TV network in Japan equivalent to the BBC in the UK and the largest in Asia with many award-winning science and technology programs. Japanese TV is producing a documentary about IoT and Smart technology and will be covering @ThingsExpo Silicon Val...
Cloud Expo, Inc. has announced today that Aruna Ravichandran, vice president of DevOps Product and Solutions Marketing at CA Technologies, has been named co-conference chair of DevOps at Cloud Expo 2017. The @DevOpsSummit at Cloud Expo New York will take place on June 6-8, 2017, at the Javits Center in New York City, New York, and @DevOpsSummit at Cloud Expo Silicon Valley will take place Oct. 31-Nov. 2, 2017, at the Santa Clara Convention Center in Santa Clara, CA.
Is your application too difficult to manage? Do changes take dozens of developers hundreds of hours to execute, and frequently result in downtime across all your site’s functions? It sounds like you have a monolith! A monolith is one of the three main software architectures that define most applications. Whether you’ve intentionally set out to create a monolith or not, it’s worth at least weighing the pros and cons of the different architectural approaches and deciding which one makes the most s...
Today we can collect lots and lots of performance data. We build beautiful dashboards and even have fancy query languages to access and transform the data. Still performance data is a secret language only a couple of people understand. The more business becomes digital the more stakeholders are interested in this data including how it relates to business. Some of these people have never used a monitoring tool before. They have a question on their mind like “How is my application doing” but no id...
In large enterprises, environment provisioning and server provisioning account for a significant portion of the operations team's time. This often leaves users frustrated while they wait for these services. For instance, server provisioning can take several days and sometimes even weeks. At the same time, digital transformation means the need for server and environment provisioning is constantly growing. Organizations are adopting agile methodologies and software teams are increasing the speed ...
In his session at 20th Cloud Expo, Scott Davis, CTO of Embotics, will discuss how automation can provide the dynamic management required to cost-effectively deliver microservices and container solutions at scale. He will discuss how flexible automation is the key to effectively bridging and seamlessly coordinating both IT and developer needs for component orchestration across disparate clouds – an increasingly important requirement at today’s multi-cloud enterprise.
Keeping pace with advancements in software delivery processes and tooling is taxing even for the most proficient organizations. Point tools, platforms, open source and the increasing adoption of private and public cloud services requires strong engineering rigor – all in the face of developer demands to use the tools of choice. As Agile has settled in as a mainstream practice, now DevOps has emerged as the next wave to improve software delivery speed and output. To make DevOps work, organization...
Software as a service (SaaS), one of the earliest and most successful cloud services, has reached mainstream status. According to Cisco, by 2019 more than four-fifths (83 percent) of all data center traffic will be based in the cloud, up from 65 percent today. The majority of this traffic will be applications. Businesses of all sizes are adopting a variety of SaaS-based services – everything from collaboration tools to mission-critical commerce-oriented applications. The rise in SaaS usage has m...
The proper isolation of resources is essential for multi-tenant environments. The traditional approach to isolate resources is, however, rather heavyweight. In his session at 18th Cloud Expo, Igor Drobiazko, co-founder of elastic.io, drew upon his own experience with operating a Docker container-based infrastructure on a large scale and present a lightweight solution for resource isolation using microservices. He also discussed the implementation of microservices in data and application integrat...
We'd all like to fulfill that "find a job you love and you'll never work a day in your life" cliché. But in reality, every job (even if it's our dream job) comes with its downsides. For you, the constant fight against shadow IT might get on your last nerves. For your developer coworkers, infrastructure management is the roadblock that stands in the way of focusing on coding. As you watch more and more applications and processes move to the cloud, technology is coming to developers' rescue-most r...
2016 has been an amazing year for Docker and the container industry. We had 3 major releases of Docker engine this year , and tremendous increase in usage. The community has been following along and contributing amazing Docker resources to help you learn and get hands-on experience. Here’s some of the top read and viewed content for the year. Of course releases are always really popular, particularly when they fit requests we had from the community.