SlideShare a Scribd company logo
1 of 22
Download to read offline
Managing
              mobility in a
            changing device
               landscape

                Andrew Gee
     Vice President, Sales UK & Ireland



wyse.com
Agenda
      • Trends
           •    Mobility
           •    Devices
           •    Consumerisation
           •    Applications
      • Challenges & Architectures
           •    Breaking the 1:1 link
           •    Inherent security
           •    Smarter management
      • User types & scenarios
      • Technologies




© 2012 Wyse Technology
We are all more mobile

                                        Field worker
                                        productivity
                                        demands
               Office based
                                        maximum time
               workers need
                                        is spent mobile
               access when not
               at their desks




                         Home-based   Customers
                         working is   want services
                         increasing   to come
                                      to them




© 2012 Wyse Technology
Consumerisation


                                      500
                                                        m

                                      smartphones
                                      shipped in 2011




               1.5               bn

                smart devices
                forecast to be
                sold in 2014
                                        20          %

                                         more smartphones
                                         sold than PCs



© 2012 Wyse Technology
Applications are changing

      Collaborative               Location aware
           working




        Unified                   Social
 Communications




© 2012 Wyse Technology
Applications are becoming
      more centralised and more
      local!

                                                   Desktop as a Service & Web applications




                                         Virtual
                                        desktops
                                                                         New local
                           Virtual                                      applications
                         applications


            PC



  6
© 2012 Wyse Technology
Agenda
      • Trends
           •    Mobility
           •    Devices
           •    Consumerisation
           •    Applications
      • Challenges & Architectures
           •    Breaking the 1:1 link
           •    Inherent security
           •    Smarter management
      • User types & scenarios
      • Technologies




© 2012 Wyse Technology
Challenges

                         Desktop refresh



  Demands for higher               Need to reduce
         availability              energy consumption




    Fast delivery of                       Security and
      new services                         Compliance




© 2012 Wyse Technology
Cloud Client Computing




        Long               Easy      Very low power   Centrally       No
     service life        to secure    consumption     managed     moving parts




© 2012 Wyse Technology
Break the link

                         1:1
              BENEFITS




                         USER           Better productivity


                         ORGANISATION   More flexibility and agility



© 2012 Wyse Technology
Inherently more secure




          Avoid data on     Centralised     Authenticated    Secure
           the device         security         access            devices you
                              architecture                       don’t own


   Benefits
             Simplify the      More             Control data        Reduce risks from
             security          integrity        leakage             lost devices
             architecture




© 2012 Wyse Technology
Smarter management




      Centralised         Devices that       Never visit the    Automated
      On-premise or        manage              desktop             mobile device
       cloud-based          themselves                              management


   Benefits
             Reduced management       Consistent device           Faster provisioning
             cost                     configurations




© 2012 Wyse Technology
Agenda
      • Trends
           •    Mobility
           •    Devices
           •    Consumerisation
           •    Applications
      • Challenges & Architectures
           •    Breaking the 1:1 link
           •    Inherent security
           •    Smarter management
      • User types & scenarios
      • Technologies




© 2012 Wyse Technology
Understanding user types

          Mobile
                                              Applications




                             Form factor &                       Content
                              peripherals



   Non mobile
                         Task-based Workers                     Office based
                                                             Knowledge Workers



© 2012 Wyse Technology
Typical user scenarios . Contact Centre




                          Data
                          Voice
                          Video




© 2012 Wyse Technology
Typical user scenarios . Business Manager
       At home




                         In the office   On the move



© 2012 Wyse Technology
Typical user scenarios . Project Manager




                                         3g




                   Hot desking         On the move



© 2012 Wyse Technology
Typical user scenarios . Home Worker




        Occasional home worker

                                     Regular home worker




© 2012 Wyse Technology
Agenda
      • Trends
           •    Mobility
           •    Devices
           •    Consumerisation
           •    Applications
      • Challenges & Architectures
           •    Breaking the 1:1 link
           •    Inherent security
           •    Smarter management
      • User types & scenarios
      • Technologies




© 2012 Wyse Technology
Technologies to take a look at…




              Wyse Thin and Zero clients           Wyse PocketCloud




             Wyse Enterprise Mobility Management   Wyse mobile thin clients


© 2012 Wyse Technology
To take away…

      • Enterprise computing is changing fast – take advantage of it

      • Break the 1:1 link between user and PC

      • Back to Basics – understand your users

      • User satisfaction is not just about how their computer works –
        look for user wins

      • Don’t underestimate the new smart user: Deliver a menu of services
        that they can use to fit the way they work




© 2012 Wyse Technology
agee@wyse.com


                         www.wyse.com




               Andrew Gee
    Vice President, Sales, UK & Ireland



wyse.com

More Related Content

What's hot

Smart Style Office for Virtual Desktop Infrastructure
Smart Style Office for Virtual Desktop InfrastructureSmart Style Office for Virtual Desktop Infrastructure
Smart Style Office for Virtual Desktop Infrastructure247 Invest
 
12 Things You Must Know About VDI
12 Things You Must Know About VDI12 Things You Must Know About VDI
12 Things You Must Know About VDIShivani Sehta
 
Virtual desktop infrastructure
Virtual desktop infrastructureVirtual desktop infrastructure
Virtual desktop infrastructuregaurav jain
 
VDI Choices - Citrix XenDesktop, XenApp or VDI in a Box?
VDI Choices - Citrix XenDesktop, XenApp or VDI in a Box?VDI Choices - Citrix XenDesktop, XenApp or VDI in a Box?
VDI Choices - Citrix XenDesktop, XenApp or VDI in a Box?eG Innovations
 
Comparing the TCO of Desktops
Comparing the TCO of DesktopsComparing the TCO of Desktops
Comparing the TCO of DesktopsDesktone
 
Make VDI Personal, Make VDI for Everyone
Make VDI Personal, Make VDI for EveryoneMake VDI Personal, Make VDI for Everyone
Make VDI Personal, Make VDI for EveryoneUnidesk Corporation
 
Citrix Mforum 2014 m104 JonathanWade
Citrix Mforum 2014 m104 JonathanWadeCitrix Mforum 2014 m104 JonathanWade
Citrix Mforum 2014 m104 JonathanWadeJonathan Wade
 
Virtual desktop infrastructure
Virtual desktop infrastructureVirtual desktop infrastructure
Virtual desktop infrastructureKavaskar Ganesan
 
Vdi strategy
Vdi strategyVdi strategy
Vdi strategylatheefca
 
Microsoft the power of choice
Microsoft  the power of choiceMicrosoft  the power of choice
Microsoft the power of choicegadi_fe
 
VDI/ VMware Horizon View
VDI/ VMware Horizon ViewVDI/ VMware Horizon View
VDI/ VMware Horizon ViewSumeraHangi
 
Virtual desktop infrastructure
Virtual desktop infrastructureVirtual desktop infrastructure
Virtual desktop infrastructureGokulan Subramani
 
VDI Performance Assurance With Monitoring and Testing
VDI Performance Assurance With Monitoring and TestingVDI Performance Assurance With Monitoring and Testing
VDI Performance Assurance With Monitoring and TestingeG Innovations
 
Virtual Desktops: How Secure Can They Be?
Virtual Desktops: How Secure Can They Be?Virtual Desktops: How Secure Can They Be?
Virtual Desktops: How Secure Can They Be?Desktone
 
VDI and Application Virtualization
VDI and Application VirtualizationVDI and Application Virtualization
VDI and Application VirtualizationJames W. De Rienzo
 
Securely managing all Dell and non-Dell end user devices: Endpoint systems ma...
Securely managing all Dell and non-Dell end user devices: Endpoint systems ma...Securely managing all Dell and non-Dell end user devices: Endpoint systems ma...
Securely managing all Dell and non-Dell end user devices: Endpoint systems ma...Dell World
 
Desktop as a Service DaaS in India by BSNL SIS
Desktop as a Service DaaS in India by BSNL SISDesktop as a Service DaaS in India by BSNL SIS
Desktop as a Service DaaS in India by BSNL SISSATYAVEER PAL
 

What's hot (20)

Smart Style Office for Virtual Desktop Infrastructure
Smart Style Office for Virtual Desktop InfrastructureSmart Style Office for Virtual Desktop Infrastructure
Smart Style Office for Virtual Desktop Infrastructure
 
VDI Best Practices
VDI Best PracticesVDI Best Practices
VDI Best Practices
 
12 Things You Must Know About VDI
12 Things You Must Know About VDI12 Things You Must Know About VDI
12 Things You Must Know About VDI
 
Virtual Desktop Infrastructure
Virtual Desktop InfrastructureVirtual Desktop Infrastructure
Virtual Desktop Infrastructure
 
Virtual desktop infrastructure
Virtual desktop infrastructureVirtual desktop infrastructure
Virtual desktop infrastructure
 
VDI Choices - Citrix XenDesktop, XenApp or VDI in a Box?
VDI Choices - Citrix XenDesktop, XenApp or VDI in a Box?VDI Choices - Citrix XenDesktop, XenApp or VDI in a Box?
VDI Choices - Citrix XenDesktop, XenApp or VDI in a Box?
 
Comparing the TCO of Desktops
Comparing the TCO of DesktopsComparing the TCO of Desktops
Comparing the TCO of Desktops
 
Make VDI Personal, Make VDI for Everyone
Make VDI Personal, Make VDI for EveryoneMake VDI Personal, Make VDI for Everyone
Make VDI Personal, Make VDI for Everyone
 
Citrix Mforum 2014 m104 JonathanWade
Citrix Mforum 2014 m104 JonathanWadeCitrix Mforum 2014 m104 JonathanWade
Citrix Mforum 2014 m104 JonathanWade
 
Virtual desktop infrastructure
Virtual desktop infrastructureVirtual desktop infrastructure
Virtual desktop infrastructure
 
Vdi strategy
Vdi strategyVdi strategy
Vdi strategy
 
Microsoft the power of choice
Microsoft  the power of choiceMicrosoft  the power of choice
Microsoft the power of choice
 
VDI/ VMware Horizon View
VDI/ VMware Horizon ViewVDI/ VMware Horizon View
VDI/ VMware Horizon View
 
Virtual desktop infrastructure
Virtual desktop infrastructureVirtual desktop infrastructure
Virtual desktop infrastructure
 
VDI Performance Assurance With Monitoring and Testing
VDI Performance Assurance With Monitoring and TestingVDI Performance Assurance With Monitoring and Testing
VDI Performance Assurance With Monitoring and Testing
 
Vdi
VdiVdi
Vdi
 
Virtual Desktops: How Secure Can They Be?
Virtual Desktops: How Secure Can They Be?Virtual Desktops: How Secure Can They Be?
Virtual Desktops: How Secure Can They Be?
 
VDI and Application Virtualization
VDI and Application VirtualizationVDI and Application Virtualization
VDI and Application Virtualization
 
Securely managing all Dell and non-Dell end user devices: Endpoint systems ma...
Securely managing all Dell and non-Dell end user devices: Endpoint systems ma...Securely managing all Dell and non-Dell end user devices: Endpoint systems ma...
Securely managing all Dell and non-Dell end user devices: Endpoint systems ma...
 
Desktop as a Service DaaS in India by BSNL SIS
Desktop as a Service DaaS in India by BSNL SISDesktop as a Service DaaS in India by BSNL SIS
Desktop as a Service DaaS in India by BSNL SIS
 

Similar to Wyse webinar presentation Web2Present Managing mobility in a changing device landscape

IBM Mobile Enterprise Overview
IBM Mobile Enterprise OverviewIBM Mobile Enterprise Overview
IBM Mobile Enterprise Overviewaakhan0830
 
IBM Mobile Strategy - Mobile World Congress 2012
IBM Mobile Strategy - Mobile World Congress 2012IBM Mobile Strategy - Mobile World Congress 2012
IBM Mobile Strategy - Mobile World Congress 2012Robert Sutor
 
Ibm solutions for the mobile enterprise
Ibm solutions for the mobile enterpriseIbm solutions for the mobile enterprise
Ibm solutions for the mobile enterpriseChris Pepin
 
Build and Connect Enterprise Mobile Applications from developerWorks Live!
Build and Connect Enterprise Mobile Applications from developerWorks Live! Build and Connect Enterprise Mobile Applications from developerWorks Live!
Build and Connect Enterprise Mobile Applications from developerWorks Live! Leigh Williamson
 
Gwc mobilefoundation-final-2
Gwc mobilefoundation-final-2Gwc mobilefoundation-final-2
Gwc mobilefoundation-final-2Dirk Nicol
 
Cloud Technology to Facilitate Growth
Cloud Technology to Facilitate GrowthCloud Technology to Facilitate Growth
Cloud Technology to Facilitate GrowthIconnyx
 
Becoming a mobile enterprise: step by step
Becoming a mobile enterprise: step by stepBecoming a mobile enterprise: step by step
Becoming a mobile enterprise: step by stepChris Pepin
 
Mobile advisor zenprise-pitch - lars
Mobile advisor zenprise-pitch - larsMobile advisor zenprise-pitch - lars
Mobile advisor zenprise-pitch - larsLars Bodenhoff
 
Enterasys Mobile IAM BYOD Brochure
Enterasys Mobile IAM BYOD BrochureEnterasys Mobile IAM BYOD Brochure
Enterasys Mobile IAM BYOD BrochureArrow ECS UK
 
Introduction to IBM Worklight: Building and connecting cross-platform mobile ...
Introduction to IBM Worklight: Building and connecting cross-platform mobile ...Introduction to IBM Worklight: Building and connecting cross-platform mobile ...
Introduction to IBM Worklight: Building and connecting cross-platform mobile ...Jeremy Siewert
 
IBM mobile strategy at Innovate 2012
IBM  mobile strategy at Innovate 2012IBM  mobile strategy at Innovate 2012
IBM mobile strategy at Innovate 2012Dirk Nicol
 
Mobile Application Security
Mobile Application SecurityMobile Application Security
Mobile Application SecurityDirk Nicol
 
Riverbed Securing Cloud Applications with a Distributed Web Application Firewall
Riverbed Securing Cloud Applications with a Distributed Web Application FirewallRiverbed Securing Cloud Applications with a Distributed Web Application Firewall
Riverbed Securing Cloud Applications with a Distributed Web Application FirewallRiverbed Technology
 
Infor i Business Cloud
Infor i Business CloudInfor i Business Cloud
Infor i Business CloudInforsystemi
 
Engaging Mobile Apps with IBM® Social Business Solutions and IBM Worklight
Engaging Mobile Apps with IBM® Social Business Solutions and IBM WorklightEngaging Mobile Apps with IBM® Social Business Solutions and IBM Worklight
Engaging Mobile Apps with IBM® Social Business Solutions and IBM WorklightDirk Nicol
 

Similar to Wyse webinar presentation Web2Present Managing mobility in a changing device landscape (20)

IBM Mobile Strategy
IBM Mobile StrategyIBM Mobile Strategy
IBM Mobile Strategy
 
IBM Mobile Enterprise Overview
IBM Mobile Enterprise OverviewIBM Mobile Enterprise Overview
IBM Mobile Enterprise Overview
 
IBM Mobile Strategy - Mobile World Congress 2012
IBM Mobile Strategy - Mobile World Congress 2012IBM Mobile Strategy - Mobile World Congress 2012
IBM Mobile Strategy - Mobile World Congress 2012
 
Ibm solutions for the mobile enterprise
Ibm solutions for the mobile enterpriseIbm solutions for the mobile enterprise
Ibm solutions for the mobile enterprise
 
IBM Mobile Strategy
IBM Mobile StrategyIBM Mobile Strategy
IBM Mobile Strategy
 
Get your house on order
Get your house on orderGet your house on order
Get your house on order
 
Build and Connect Enterprise Mobile Applications from developerWorks Live!
Build and Connect Enterprise Mobile Applications from developerWorks Live! Build and Connect Enterprise Mobile Applications from developerWorks Live!
Build and Connect Enterprise Mobile Applications from developerWorks Live!
 
Gwc mobilefoundation-final-2
Gwc mobilefoundation-final-2Gwc mobilefoundation-final-2
Gwc mobilefoundation-final-2
 
WinWire_azure_session
WinWire_azure_sessionWinWire_azure_session
WinWire_azure_session
 
Cloud Technology to Facilitate Growth
Cloud Technology to Facilitate GrowthCloud Technology to Facilitate Growth
Cloud Technology to Facilitate Growth
 
Becoming a mobile enterprise: step by step
Becoming a mobile enterprise: step by stepBecoming a mobile enterprise: step by step
Becoming a mobile enterprise: step by step
 
Mobile advisor zenprise-pitch - lars
Mobile advisor zenprise-pitch - larsMobile advisor zenprise-pitch - lars
Mobile advisor zenprise-pitch - lars
 
Enterasys Mobile IAM BYOD Brochure
Enterasys Mobile IAM BYOD BrochureEnterasys Mobile IAM BYOD Brochure
Enterasys Mobile IAM BYOD Brochure
 
Introduction to IBM Worklight: Building and connecting cross-platform mobile ...
Introduction to IBM Worklight: Building and connecting cross-platform mobile ...Introduction to IBM Worklight: Building and connecting cross-platform mobile ...
Introduction to IBM Worklight: Building and connecting cross-platform mobile ...
 
IBM mobile strategy at Innovate 2012
IBM  mobile strategy at Innovate 2012IBM  mobile strategy at Innovate 2012
IBM mobile strategy at Innovate 2012
 
Beyond BYOD
Beyond BYODBeyond BYOD
Beyond BYOD
 
Mobile Application Security
Mobile Application SecurityMobile Application Security
Mobile Application Security
 
Riverbed Securing Cloud Applications with a Distributed Web Application Firewall
Riverbed Securing Cloud Applications with a Distributed Web Application FirewallRiverbed Securing Cloud Applications with a Distributed Web Application Firewall
Riverbed Securing Cloud Applications with a Distributed Web Application Firewall
 
Infor i Business Cloud
Infor i Business CloudInfor i Business Cloud
Infor i Business Cloud
 
Engaging Mobile Apps with IBM® Social Business Solutions and IBM Worklight
Engaging Mobile Apps with IBM® Social Business Solutions and IBM WorklightEngaging Mobile Apps with IBM® Social Business Solutions and IBM Worklight
Engaging Mobile Apps with IBM® Social Business Solutions and IBM Worklight
 

More from Web2Present

Web2Present Student Recruitment Webinar Media kit 2017 18
Web2Present Student Recruitment Webinar Media kit 2017 18Web2Present Student Recruitment Webinar Media kit 2017 18
Web2Present Student Recruitment Webinar Media kit 2017 18Web2Present
 
Webinar presentation master's programs - TU/e
Webinar presentation master's programs - TU/eWebinar presentation master's programs - TU/e
Webinar presentation master's programs - TU/eWeb2Present
 
Webinar earn a high scientific and technical master degree in applied mechani...
Webinar earn a high scientific and technical master degree in applied mechani...Webinar earn a high scientific and technical master degree in applied mechani...
Webinar earn a high scientific and technical master degree in applied mechani...Web2Present
 
Web2 present 2016 in review
Web2 present 2016 in reviewWeb2 present 2016 in review
Web2 present 2016 in reviewWeb2Present
 
Webinar: Enquiries to enrolment - July 2016
Webinar: Enquiries to enrolment - July 2016Webinar: Enquiries to enrolment - July 2016
Webinar: Enquiries to enrolment - July 2016Web2Present
 
Webinar: Study International Relations in the Heart of Transylvania
Webinar: Study International Relations in the Heart of TransylvaniaWebinar: Study International Relations in the Heart of Transylvania
Webinar: Study International Relations in the Heart of TransylvaniaWeb2Present
 
Webinar - Achieve your Supply Chain qualification studying at MIT and ZLC, tw...
Webinar - Achieve your Supply Chain qualification studying at MIT and ZLC, tw...Webinar - Achieve your Supply Chain qualification studying at MIT and ZLC, tw...
Webinar - Achieve your Supply Chain qualification studying at MIT and ZLC, tw...Web2Present
 
Integrating companion animal knowledge into aquatic veterinary medicine
Integrating companion animal knowledge into aquatic veterinary medicineIntegrating companion animal knowledge into aquatic veterinary medicine
Integrating companion animal knowledge into aquatic veterinary medicineWeb2Present
 
Webinar: Specialize in energy, transport and telecommunications economics at ...
Webinar: Specialize in energy, transport and telecommunications economics at ...Webinar: Specialize in energy, transport and telecommunications economics at ...
Webinar: Specialize in energy, transport and telecommunications economics at ...Web2Present
 
Webinar: An MBA in the Hospitality Industry – A ‘Necessity’ or ‘Nice to Have’?
Webinar: An MBA in the Hospitality Industry – A ‘Necessity’ or ‘Nice to Have’?Webinar: An MBA in the Hospitality Industry – A ‘Necessity’ or ‘Nice to Have’?
Webinar: An MBA in the Hospitality Industry – A ‘Necessity’ or ‘Nice to Have’?Web2Present
 
Webinar: MS and MBA programs from Embry-Riddle Aeronautical University in Day...
Webinar: MS and MBA programs from Embry-Riddle Aeronautical University in Day...Webinar: MS and MBA programs from Embry-Riddle Aeronautical University in Day...
Webinar: MS and MBA programs from Embry-Riddle Aeronautical University in Day...Web2Present
 
Webinar: Study an online Master’s in Gender Studies, Linköping University, Sw...
Webinar: Study an online Master’s in Gender Studies, Linköping University, Sw...Webinar: Study an online Master’s in Gender Studies, Linköping University, Sw...
Webinar: Study an online Master’s in Gender Studies, Linköping University, Sw...Web2Present
 
Webinar: MSc in Software, Systems and Services Development in Global Environment
Webinar: MSc in Software, Systems and Services Development in Global EnvironmentWebinar: MSc in Software, Systems and Services Development in Global Environment
Webinar: MSc in Software, Systems and Services Development in Global EnvironmentWeb2Present
 
Webinar: SAIS Europe: The Master of Arts in Global Risk Information
Webinar: SAIS Europe: The Master of Arts in Global Risk InformationWebinar: SAIS Europe: The Master of Arts in Global Risk Information
Webinar: SAIS Europe: The Master of Arts in Global Risk InformationWeb2Present
 
Webinar: Study a Master’s in Education and Globalisation in Finland
Webinar: Study a Master’s in Education and Globalisation in FinlandWebinar: Study a Master’s in Education and Globalisation in Finland
Webinar: Study a Master’s in Education and Globalisation in FinlandWeb2Present
 
Webinar: MSc in Software, Systems and Services Development in Global Environment
Webinar: MSc in Software, Systems and Services Development in Global EnvironmentWebinar: MSc in Software, Systems and Services Development in Global Environment
Webinar: MSc in Software, Systems and Services Development in Global EnvironmentWeb2Present
 
Webinar: AACSB accredited MSc programs in Oulu, the capital of Northern Scand...
Webinar: AACSB accredited MSc programs in Oulu, the capital of Northern Scand...Webinar: AACSB accredited MSc programs in Oulu, the capital of Northern Scand...
Webinar: AACSB accredited MSc programs in Oulu, the capital of Northern Scand...Web2Present
 
MA in Learning, Education and Technology - University of Oulu
MA in Learning, Education and Technology - University of OuluMA in Learning, Education and Technology - University of Oulu
MA in Learning, Education and Technology - University of OuluWeb2Present
 
The Study Abroad Portal Media Kit 2015
The Study Abroad Portal Media Kit 2015The Study Abroad Portal Media Kit 2015
The Study Abroad Portal Media Kit 2015Web2Present
 
Tips to prepare a better presentation for a webinar
Tips to prepare a better presentation for a webinarTips to prepare a better presentation for a webinar
Tips to prepare a better presentation for a webinarWeb2Present
 

More from Web2Present (20)

Web2Present Student Recruitment Webinar Media kit 2017 18
Web2Present Student Recruitment Webinar Media kit 2017 18Web2Present Student Recruitment Webinar Media kit 2017 18
Web2Present Student Recruitment Webinar Media kit 2017 18
 
Webinar presentation master's programs - TU/e
Webinar presentation master's programs - TU/eWebinar presentation master's programs - TU/e
Webinar presentation master's programs - TU/e
 
Webinar earn a high scientific and technical master degree in applied mechani...
Webinar earn a high scientific and technical master degree in applied mechani...Webinar earn a high scientific and technical master degree in applied mechani...
Webinar earn a high scientific and technical master degree in applied mechani...
 
Web2 present 2016 in review
Web2 present 2016 in reviewWeb2 present 2016 in review
Web2 present 2016 in review
 
Webinar: Enquiries to enrolment - July 2016
Webinar: Enquiries to enrolment - July 2016Webinar: Enquiries to enrolment - July 2016
Webinar: Enquiries to enrolment - July 2016
 
Webinar: Study International Relations in the Heart of Transylvania
Webinar: Study International Relations in the Heart of TransylvaniaWebinar: Study International Relations in the Heart of Transylvania
Webinar: Study International Relations in the Heart of Transylvania
 
Webinar - Achieve your Supply Chain qualification studying at MIT and ZLC, tw...
Webinar - Achieve your Supply Chain qualification studying at MIT and ZLC, tw...Webinar - Achieve your Supply Chain qualification studying at MIT and ZLC, tw...
Webinar - Achieve your Supply Chain qualification studying at MIT and ZLC, tw...
 
Integrating companion animal knowledge into aquatic veterinary medicine
Integrating companion animal knowledge into aquatic veterinary medicineIntegrating companion animal knowledge into aquatic veterinary medicine
Integrating companion animal knowledge into aquatic veterinary medicine
 
Webinar: Specialize in energy, transport and telecommunications economics at ...
Webinar: Specialize in energy, transport and telecommunications economics at ...Webinar: Specialize in energy, transport and telecommunications economics at ...
Webinar: Specialize in energy, transport and telecommunications economics at ...
 
Webinar: An MBA in the Hospitality Industry – A ‘Necessity’ or ‘Nice to Have’?
Webinar: An MBA in the Hospitality Industry – A ‘Necessity’ or ‘Nice to Have’?Webinar: An MBA in the Hospitality Industry – A ‘Necessity’ or ‘Nice to Have’?
Webinar: An MBA in the Hospitality Industry – A ‘Necessity’ or ‘Nice to Have’?
 
Webinar: MS and MBA programs from Embry-Riddle Aeronautical University in Day...
Webinar: MS and MBA programs from Embry-Riddle Aeronautical University in Day...Webinar: MS and MBA programs from Embry-Riddle Aeronautical University in Day...
Webinar: MS and MBA programs from Embry-Riddle Aeronautical University in Day...
 
Webinar: Study an online Master’s in Gender Studies, Linköping University, Sw...
Webinar: Study an online Master’s in Gender Studies, Linköping University, Sw...Webinar: Study an online Master’s in Gender Studies, Linköping University, Sw...
Webinar: Study an online Master’s in Gender Studies, Linköping University, Sw...
 
Webinar: MSc in Software, Systems and Services Development in Global Environment
Webinar: MSc in Software, Systems and Services Development in Global EnvironmentWebinar: MSc in Software, Systems and Services Development in Global Environment
Webinar: MSc in Software, Systems and Services Development in Global Environment
 
Webinar: SAIS Europe: The Master of Arts in Global Risk Information
Webinar: SAIS Europe: The Master of Arts in Global Risk InformationWebinar: SAIS Europe: The Master of Arts in Global Risk Information
Webinar: SAIS Europe: The Master of Arts in Global Risk Information
 
Webinar: Study a Master’s in Education and Globalisation in Finland
Webinar: Study a Master’s in Education and Globalisation in FinlandWebinar: Study a Master’s in Education and Globalisation in Finland
Webinar: Study a Master’s in Education and Globalisation in Finland
 
Webinar: MSc in Software, Systems and Services Development in Global Environment
Webinar: MSc in Software, Systems and Services Development in Global EnvironmentWebinar: MSc in Software, Systems and Services Development in Global Environment
Webinar: MSc in Software, Systems and Services Development in Global Environment
 
Webinar: AACSB accredited MSc programs in Oulu, the capital of Northern Scand...
Webinar: AACSB accredited MSc programs in Oulu, the capital of Northern Scand...Webinar: AACSB accredited MSc programs in Oulu, the capital of Northern Scand...
Webinar: AACSB accredited MSc programs in Oulu, the capital of Northern Scand...
 
MA in Learning, Education and Technology - University of Oulu
MA in Learning, Education and Technology - University of OuluMA in Learning, Education and Technology - University of Oulu
MA in Learning, Education and Technology - University of Oulu
 
The Study Abroad Portal Media Kit 2015
The Study Abroad Portal Media Kit 2015The Study Abroad Portal Media Kit 2015
The Study Abroad Portal Media Kit 2015
 
Tips to prepare a better presentation for a webinar
Tips to prepare a better presentation for a webinarTips to prepare a better presentation for a webinar
Tips to prepare a better presentation for a webinar
 

Recently uploaded

Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsNathaniel Shimoni
 
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Hiroshi SHIBATA
 
Tampa BSides - The No BS SOC (slides from April 6, 2024 talk)
Tampa BSides - The No BS SOC (slides from April 6, 2024 talk)Tampa BSides - The No BS SOC (slides from April 6, 2024 talk)
Tampa BSides - The No BS SOC (slides from April 6, 2024 talk)Mark Simos
 
All These Sophisticated Attacks, Can We Really Detect Them - PDF
All These Sophisticated Attacks, Can We Really Detect Them - PDFAll These Sophisticated Attacks, Can We Really Detect Them - PDF
All These Sophisticated Attacks, Can We Really Detect Them - PDFMichael Gough
 
Email Marketing Automation for Bonterra Impact Management (fka Social Solutio...
Email Marketing Automation for Bonterra Impact Management (fka Social Solutio...Email Marketing Automation for Bonterra Impact Management (fka Social Solutio...
Email Marketing Automation for Bonterra Impact Management (fka Social Solutio...Jeffrey Haguewood
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesKari Kakkonen
 
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...Wes McKinney
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch TuesdayIvanti
 
4. Cobus Valentine- Cybersecurity Threats and Solutions for the Public Sector
4. Cobus Valentine- Cybersecurity Threats and Solutions for the Public Sector4. Cobus Valentine- Cybersecurity Threats and Solutions for the Public Sector
4. Cobus Valentine- Cybersecurity Threats and Solutions for the Public Sectoritnewsafrica
 
Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)Kaya Weers
 
Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024TopCSSGallery
 
React JS; all concepts. Contains React Features, JSX, functional & Class comp...
React JS; all concepts. Contains React Features, JSX, functional & Class comp...React JS; all concepts. Contains React Features, JSX, functional & Class comp...
React JS; all concepts. Contains React Features, JSX, functional & Class comp...Karmanjay Verma
 
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS:  6 Ways to Automate Your Data IntegrationBridging Between CAD & GIS:  6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integrationmarketing932765
 
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Alkin Tezuysal
 
Transcript: New from BookNet Canada for 2024: BNC SalesData and LibraryData -...
Transcript: New from BookNet Canada for 2024: BNC SalesData and LibraryData -...Transcript: New from BookNet Canada for 2024: BNC SalesData and LibraryData -...
Transcript: New from BookNet Canada for 2024: BNC SalesData and LibraryData -...BookNet Canada
 
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical InfrastructureVarsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructureitnewsafrica
 
Generative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptxGenerative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptxfnnc6jmgwh
 
Infrared simulation and processing on Nvidia platforms
Infrared simulation and processing on Nvidia platformsInfrared simulation and processing on Nvidia platforms
Infrared simulation and processing on Nvidia platformsYoss Cohen
 
Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...itnewsafrica
 
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotesMuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotesManik S Magar
 

Recently uploaded (20)

Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directions
 
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024
 
Tampa BSides - The No BS SOC (slides from April 6, 2024 talk)
Tampa BSides - The No BS SOC (slides from April 6, 2024 talk)Tampa BSides - The No BS SOC (slides from April 6, 2024 talk)
Tampa BSides - The No BS SOC (slides from April 6, 2024 talk)
 
All These Sophisticated Attacks, Can We Really Detect Them - PDF
All These Sophisticated Attacks, Can We Really Detect Them - PDFAll These Sophisticated Attacks, Can We Really Detect Them - PDF
All These Sophisticated Attacks, Can We Really Detect Them - PDF
 
Email Marketing Automation for Bonterra Impact Management (fka Social Solutio...
Email Marketing Automation for Bonterra Impact Management (fka Social Solutio...Email Marketing Automation for Bonterra Impact Management (fka Social Solutio...
Email Marketing Automation for Bonterra Impact Management (fka Social Solutio...
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examples
 
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch Tuesday
 
4. Cobus Valentine- Cybersecurity Threats and Solutions for the Public Sector
4. Cobus Valentine- Cybersecurity Threats and Solutions for the Public Sector4. Cobus Valentine- Cybersecurity Threats and Solutions for the Public Sector
4. Cobus Valentine- Cybersecurity Threats and Solutions for the Public Sector
 
Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)
 
Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024
 
React JS; all concepts. Contains React Features, JSX, functional & Class comp...
React JS; all concepts. Contains React Features, JSX, functional & Class comp...React JS; all concepts. Contains React Features, JSX, functional & Class comp...
React JS; all concepts. Contains React Features, JSX, functional & Class comp...
 
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS:  6 Ways to Automate Your Data IntegrationBridging Between CAD & GIS:  6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integration
 
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
 
Transcript: New from BookNet Canada for 2024: BNC SalesData and LibraryData -...
Transcript: New from BookNet Canada for 2024: BNC SalesData and LibraryData -...Transcript: New from BookNet Canada for 2024: BNC SalesData and LibraryData -...
Transcript: New from BookNet Canada for 2024: BNC SalesData and LibraryData -...
 
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical InfrastructureVarsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
 
Generative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptxGenerative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptx
 
Infrared simulation and processing on Nvidia platforms
Infrared simulation and processing on Nvidia platformsInfrared simulation and processing on Nvidia platforms
Infrared simulation and processing on Nvidia platforms
 
Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...
 
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotesMuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
 

Wyse webinar presentation Web2Present Managing mobility in a changing device landscape

  • 1. Managing mobility in a changing device landscape Andrew Gee Vice President, Sales UK & Ireland wyse.com
  • 2. Agenda • Trends • Mobility • Devices • Consumerisation • Applications • Challenges & Architectures • Breaking the 1:1 link • Inherent security • Smarter management • User types & scenarios • Technologies © 2012 Wyse Technology
  • 3. We are all more mobile Field worker productivity demands Office based maximum time workers need is spent mobile access when not at their desks Home-based Customers working is want services increasing to come to them © 2012 Wyse Technology
  • 4. Consumerisation 500 m smartphones shipped in 2011 1.5 bn smart devices forecast to be sold in 2014 20 % more smartphones sold than PCs © 2012 Wyse Technology
  • 5. Applications are changing Collaborative Location aware working Unified Social Communications © 2012 Wyse Technology
  • 6. Applications are becoming more centralised and more local! Desktop as a Service & Web applications Virtual desktops New local Virtual applications applications PC 6 © 2012 Wyse Technology
  • 7. Agenda • Trends • Mobility • Devices • Consumerisation • Applications • Challenges & Architectures • Breaking the 1:1 link • Inherent security • Smarter management • User types & scenarios • Technologies © 2012 Wyse Technology
  • 8. Challenges Desktop refresh Demands for higher Need to reduce availability energy consumption Fast delivery of Security and new services Compliance © 2012 Wyse Technology
  • 9. Cloud Client Computing Long Easy Very low power Centrally No service life to secure consumption managed moving parts © 2012 Wyse Technology
  • 10. Break the link 1:1 BENEFITS USER Better productivity ORGANISATION More flexibility and agility © 2012 Wyse Technology
  • 11. Inherently more secure  Avoid data on  Centralised  Authenticated  Secure the device security access devices you architecture don’t own Benefits Simplify the More Control data Reduce risks from security integrity leakage lost devices architecture © 2012 Wyse Technology
  • 12. Smarter management  Centralised  Devices that  Never visit the  Automated  On-premise or manage desktop mobile device cloud-based themselves management Benefits Reduced management Consistent device Faster provisioning cost configurations © 2012 Wyse Technology
  • 13. Agenda • Trends • Mobility • Devices • Consumerisation • Applications • Challenges & Architectures • Breaking the 1:1 link • Inherent security • Smarter management • User types & scenarios • Technologies © 2012 Wyse Technology
  • 14. Understanding user types Mobile Applications Form factor & Content peripherals Non mobile Task-based Workers Office based Knowledge Workers © 2012 Wyse Technology
  • 15. Typical user scenarios . Contact Centre  Data  Voice  Video © 2012 Wyse Technology
  • 16. Typical user scenarios . Business Manager At home In the office On the move © 2012 Wyse Technology
  • 17. Typical user scenarios . Project Manager 3g Hot desking On the move © 2012 Wyse Technology
  • 18. Typical user scenarios . Home Worker Occasional home worker Regular home worker © 2012 Wyse Technology
  • 19. Agenda • Trends • Mobility • Devices • Consumerisation • Applications • Challenges & Architectures • Breaking the 1:1 link • Inherent security • Smarter management • User types & scenarios • Technologies © 2012 Wyse Technology
  • 20. Technologies to take a look at… Wyse Thin and Zero clients Wyse PocketCloud Wyse Enterprise Mobility Management Wyse mobile thin clients © 2012 Wyse Technology
  • 21. To take away… • Enterprise computing is changing fast – take advantage of it • Break the 1:1 link between user and PC • Back to Basics – understand your users • User satisfaction is not just about how their computer works – look for user wins • Don’t underestimate the new smart user: Deliver a menu of services that they can use to fit the way they work © 2012 Wyse Technology
  • 22. agee@wyse.com www.wyse.com Andrew Gee Vice President, Sales, UK & Ireland wyse.com

Editor's Notes

  1. Replace bullets with Image + lable
  2. Purpose: Share that we’re aware of and workingplaying a key role in driving major trendsComments: The center of our digital world is changing from the PC, to multiple screens per user – combining personal and secure digital activities.Virtualization and the cloud are enabling this revolution. Wyse has been there, as an inventor and innovator for over 30 years. We invented the thin client, that has been an important part of this changing landscape. And the client’s importance grows over time.Browsing only: Web 1.0Windows Applications: Terminal ServicesFull Desktop: VDI, Provisioning, Web 2.0Open Cloud Computing: Web 3.0
  3. Too big and bulkyUnreliable – moving parts – fans, hard drivesApplications need to be localHigh energy useNot secure, from theft, viruses, data theft
  4. Break the 1:1 link between the users and their PCDiagram: 1:1 PC & User vs Data in one location accessed by multiple devices. Thin Client, smartphone, tablet, web browser
  5. Desktop zero client : Wyse C10LEVirtual desktopSoftphone installed in the virtual desktopHeadset attached to thin clientVideo in window on thin client – aka Jewelry TV
  6. Hot desk access in HQ: P20 zero clientHTC smartphoneMobile thin client with 3G/WiFi
  7. Thin client mounted on back of monitor Softphone installed on thin clientUses mobile thin client when visits HQ