The workplace as a service uses cloud computing to support BYOD customers

Source: Internet
Author: User
Keywords They these workplaces are services implementations jobs

Since the launch of the first BlackBerry smartphone in 2003 from the production line, and the advent of the iphone, which revolutionized the 2007, users ' expectations of these products are not just enough to make them work, they want to make them part of their experience, This has also led to significant changes in the operations of numerous business and service providers.

Global smartphone sales reached 157.8 million in the fourth quarter of 2011, compared with 491.4 million in 2011, according to the IDC report. In many cases, individuals purchase these devices for personal use, and employers do not configure these mobile terminals for their employees ' purchases. Combined with the ever-increasing demand for mobile office and telecommuting, it's not surprising that the BYOD (use your own device) pattern becomes a trend. Employees want to be able to achieve continuous access to their enterprise resources, regardless of their location or the device they are using. At the same time, the enterprise's IT department is also trying to ensure that enterprise resources are safe and safe.

For cloud computing providers, the shift means one thing: Understanding customer needs to make them critical for workplace access flexibility requires a "workplace as a Service" (Wpaas) concept.

What is a workplace as a service (Wpaas)?

Similar to other service offerings, such as infrastructure-services (IaaS), Platform-Services (PaaS), and software and Services (SaaS) – the workplace is a technology and business model that relies on cloud computing to provide office services to employees without being constrained by their location.

Wpaas not only needs to implement the functions that employees need to access the applications and data needed to complete their work, but it also has to be tailored to the physical location of the user, the security requirements of the Organization, the type of equipment and the ownership of the device.

The gathering of the above information is the work being done by the TM Forum's corporate Cloud Leadership Committee (ECLC), which is comprised of large enterprises, including some of the biggest customers of cloud computing providers (ECLC). ECLC is working to identify these "workplace as services" needs so that suppliers can better understand customer needs, address any technical challenges and produce standardized reference implementations.

The concept of Wpaas is that it is becoming increasingly apparent and robust to help businesses and employees achieve access to enterprise resources that are not limited by the devices used, the geographic location, or the type of equipment they are accessing. The U.S. Department of Homeland Security CIO released the agency's own Wpaas strategy in 2011, saying federal agencies will use its private cloud computing to support virtual desktops on mobile devices.

While early cloud computing services have met the demands of companies to achieve lower capital expenditures, they are now putting higher demands on cloud computing providers to provide more powerful, business-oriented applications and services that can increase employee productivity.

Workplace as a service (WPAAS): Context Environment

One might think it's not a big deal to email on an individual smartphone, but given that the user's work unit is a bank, a government department or a Defense Department, the situation is different. Security is paramount in these situations, but in reality security is no more important than other types of business requirements--both size and status.

In addition, the user's office space also makes a variety of. Even on the move, they need access to resources. They may also occasionally work in branch offices or outside locations, such as using another network system and a trade hall of different security levels. For any Wpaas implementation, it is essential to take a comprehensive view of the above situations to provide users with the ability to access their e-mail or other important applications.

What if a user uses a WiFi network in their own home or a public network of airports, coffee shops, or other more complex locations? Will this change the resources and the way they should be able to access them?

It all boils down to the context that he needs to find a delicate balance between efficiency and security. This is where cloud computing providers can make a big fuss.

Define Requirements and Solutions

For cloud providers, the first step in implementing Wpaas is to understand the needs of users and their customers ' IT departments--and this is what the TM forum ECLC is doing.

ECLC members come from all over the world: financial, pharmaceutical, aerospace, manufacturing, defense, and advertising; they are promoting the development of the whole market by communicating End-to-end cloud computing services, including smart combinations of hardware and software. In turn, as the market develops, it provides a clear direction for cloud computing providers.

This process may involve consolidating existing cloud computing service components, such as storage capacity, processing power, bandwidth, and several software applications. These personal components are then available to enterprise customers.

However, to go further, cloud providers must fine-tune these different service components based on the user's "context" and security requirements to enable the service to be "intelligent". This creates an attractive product for customers who are unwilling to invest in in-house development of these services.

As ECLC develops a reference implementation, it needs to demonstrate different security contexts, such as whether a password and security authentication mechanism is required to be relevant to the application, or whether sensitive data and applications require additional levels of authentication.

Another important factor will be the context of the connection. Is the user located in a secure network or a public network? Do they access through virtual private cloud computing, and if so, how secure is this access approach? Connectivity will be considered the independence of the device.

It is also important to identify the physical location of the user. If a user is in an office owned by a partner company, it will be considered a safe situation even if it is not part of the customer's own network environment.

In this case, the customer not only retains a lot of control, but also allows employees to take advantage of the cloud services and BYOD trends.

When can we see the effect?

ECLC is currently working on the preparation of a white paper on Wpaas needs and plans to present a reference implementation at the TM Forum Management World Congress 2012, held in Orland this December.

Although Wpaas is still at an early stage of development, companies, service providers and related manufacturers have high hopes for it.

(Responsible editor: The good of the Legacy)

Related Article

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.