{"id":279,"date":"2012-08-01T04:35:18","date_gmt":"2012-08-01T09:35:18","guid":{"rendered":"http:\/\/www.smbitjournal.com\/?p=279"},"modified":"2017-02-18T11:56:39","modified_gmt":"2017-02-18T16:56:39","slug":"how-i-learned-to-stop-worrying-and-love-byod","status":"publish","type":"post","link":"https:\/\/smbitjournal.com\/2012\/08\/how-i-learned-to-stop-worrying-and-love-byod\/","title":{"rendered":"How I Learned To Stop Worrying and Love BYOD"},"content":{"rendered":"

Bring Your Own Devices (or BYOD) is one of those hot topics this year that seems to have every IT department worried.\u00a0 What does BYOD mean for the future of IT?\u00a0 People have already begun to call it the consumerization of IT and IT professionals everywhere are terrified that the traditional role of IT is ending and that BYOD is shifting all control into the hands of the end users.<\/p>\n

Is this really the case?\u00a0 In a world where security and control of data are becoming increasingly regulated and exposed and as the public takes a growing interest in how companies are securing their data it is safe to assume that the movement of the IT field is not going to be towards a loss of control.\u00a0 And, in my experience, BYOD means exactly the opposite.<\/p>\n

There is no ignoring the fact that BYOD signals many changes and demands IT departments rethink traditional approaches.\u00a0 But is that such a bad thing?\u00a0 The old model was one of a network castle.\u00a0 The firewalls were the moat and all of our devices from servers to desktops sat huddled together inside the castle courtyard talking freely one to another.\u00a0 One of the greatest fears was that one of those desktops were to become “compromised” and would unleash a fifth column attack from within the castle where there were practically no defenses of which to speak.<\/p>\n

The old model created a quagmire of issues and required complicated workarounds in order to accommodate modern changes in computing environments.\u00a0 When businesses existed in only a single location or when businesses would regularly purchase leased lines connecting all of their offices the model worked rather well.\u00a0 Once workers began to need to work remotely, whether at home or when on the road, the model became difficult to support and the concept of VPNs were introduced in order to extend the castle wherever it was needed.\u00a0 VPNs changed how companies could physically exist but did so without addressing some fundamental issues with the architecture of a traditional IT infrastructure.<\/p>\n

The solution to this infrastructure reinvention has been coming for a long time now.\u00a0 The movement towards web applications, “cloud services”, hosted applications, Software as a Service and other terms for the new ways in which people were thinking about applications.\u00a0 Slowly we started exposing applications to the “outside”.\u00a0 We started simply with email, then basic web applications and slowly more and more components of business infrastructure start to be exposed externally without requiring the use of a VPN.<\/p>\n

The advent of smartphones accelerated this process as certain applications, email and calendaring being the biggest drivers, absolutely demanded extension to these mobile devices.\u00a0 For the most part, IT departments did not even see a significant shift occurring.\u00a0 Instead it was little pinholes, small changes as more and more of the tools used in the business were available without connecting to the VPN, without sitting inside the office.<\/p>\n

Today a new business might legitimately ask its CIO: “Why do we even need a LAN?\u00a0 What benefit do we get from everyone sitting on a single, physical network?”\u00a0 There are still plenty of good reasons why a LAN might be needed.\u00a0 But it is a valuable question to ask and the answer might surprise you.\u00a0 I was asked this myself and the answer was that we didn’t need a LAN, every app was available through its own, secure channel, without a need for VPNs or a local network.<\/p>\n

Where LANs continue to shine brightest is in desktop management.\u00a0 If you need to lock down and control the actual end user equipment then LANs work their best here – currently.\u00a0 This too will change in time.\u00a0 But this is where BYOD becomes the secret weapon of the IT department.<\/p>\n

BYOD, while creating its own raft of obvious complications, especially around end user support expected after decades of total IT control of end user devices, offers the opportunity to eliminate the LAN, pull back the walls of the castle to surround only the core infrastructure where no end user ever need venture and to drop the support of end users devices solidly into the lap of the end users themselves.\u00a0 With modern LAN-less application publishing strategies (this includes web apps, remote desktop technologies and others) end user devices are effectively thin clients often providing no more processing capacity than is necessary to display the application.\u00a0 They are a window into the infrastructure, not a gateway.\u00a0 They look at the servers, they aren’t sitting inside the castle with them.<\/p>\n

Thinking of end user devices as view panels or windows rather than computing devices is the key to making BYOD an advantage to the IT department rather than its bane.\u00a0 Of course, this plays into the usual ebb and flow and fat and thin clients over the history of computing.\u00a0 The tide will change again, but for now, this is our current opportunity.\u00a0 End users want the illusion of control and the reality of picking the device that is best suited to their needs – which are almost strictly physical needs whether of fashion or function.\u00a0 IT departments want the reality of control and should be happy to allow end users to pick their own devices.\u00a0 Everyone can win.<\/p>\n

The key, of course, is eliminating legacy applications or finding workarounds.\u00a0 Technological approaches such as VDI, terminal servers or even racks of datacenter-housed desktops potentially provide fallback strategies that can be accessed from nearly any device while “view” layer technologies like HTML 5 look to provide elegant, modern options for exposing applications, shifting display-related processing to the end user device and standardizing on a protocol that is likely to exist ubiquitously in the very near future.\u00a0 The technologies are there today.<\/p>\n

With the corporate network shrunk down to being only the infrastructure servers and associated networking gear suddenly IT departments have the potential for greater control and more flexibility while giving up little.\u00a0 End users are happy, IT is happy.\u00a0 BYOD is an opportunity for IT to exert greater control, tighter security all while giving the impression of being approachable and flexible.<\/p>\n","protected":false},"excerpt":{"rendered":"

Bring Your Own Devices (or BYOD) is one of those hot topics this year that seems to have every IT department worried.\u00a0 What does BYOD mean for the future of IT?\u00a0 People have already begun to call it the consumerization of IT and IT professionals everywhere are terrified that the traditional role of IT is … Continue reading How I Learned To Stop Worrying and Love BYOD<\/span> →<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[120],"tags":[156,157,158],"class_list":["post-279","post","type-post","status-publish","format-standard","hentry","category-architecture","tag-byod","tag-security","tag-vdi"],"_links":{"self":[{"href":"https:\/\/smbitjournal.com\/wp-json\/wp\/v2\/posts\/279","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/smbitjournal.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/smbitjournal.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/smbitjournal.com\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/smbitjournal.com\/wp-json\/wp\/v2\/comments?post=279"}],"version-history":[{"count":5,"href":"https:\/\/smbitjournal.com\/wp-json\/wp\/v2\/posts\/279\/revisions"}],"predecessor-version":[{"id":284,"href":"https:\/\/smbitjournal.com\/wp-json\/wp\/v2\/posts\/279\/revisions\/284"}],"wp:attachment":[{"href":"https:\/\/smbitjournal.com\/wp-json\/wp\/v2\/media?parent=279"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/smbitjournal.com\/wp-json\/wp\/v2\/categories?post=279"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/smbitjournal.com\/wp-json\/wp\/v2\/tags?post=279"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}