25
Thu, Apr
1 New Articles

Power i Forecast: Wireless

Development Tools / Utilities
Typography
  • Smaller Small Medium Big Bigger
  • Default Helvetica Segoe Georgia Times

How will the proliferation of wireless devices impact enterprise network infrastructures?

 

With the large number of mobile devices, including smart phones and wireless tablet computers, about to hit the market this spring and the move toward accessing enterprise applications from mobile devices accelerating, we wondered how IT departments were planning to handle the inevitable requests from users to access the corporate network. Many of the companies we contacted were not prepared to answer the questions below. However, we found two IBM Business Partners, Key Information Systems of Woodland Hills, California, and East Coast Computer, of Pompano Beach, Florida, that knew exactly what we were talking about and were willing to go on the record with their opinions. Their comments are printed below. We would like to thank Will Rodgers, Network Practice Manager, Key Information Systems, and Zane Gramenidis, President, East Coast Computer, Inc. for the time they took responding to our questions. Also, be sure to read the article "Bitzer Mobile Breaks New Ground Providing Mobile Device Access to Enterprise Applications" in last Friday's MC TNT Tips 'n Techniques.

 

How do you think the proliferation of wireless devices will impact enterprise networks, both wired and wireless?

 

Rodgers: IT organizations have always found it difficult to quickly adopt new technologies and gadgets—such as the newest generation of wireless clients, ranging from smart phones to wireless tablet devices. It can be very difficult for a company to balance the needs of the IT organization to provide secure access, management, and user access control against the ever-growing demands of the end-user community to provide mobile access to corporate systems and applications. End-users have always pushed to use the latest and greatest gadgets before IT has properly certified them as being ready for corporate use. IT organizations continue to struggle to meet the needs of the end-user community they serve oftentimes because their budgets have been so hacked and slashed over the last few years that they lack the resources and expertise to provide innovative solutions and support for new technologies. Getting these new devices certified to run in many IT environments is seen as a drain on existing resources and budgets. While end-user groups will insist the devices are "required to stay competitive" and "will increase employee productivity," many IT organizations have heard it all before and will be reviewing most of these claims with some skepticism. Long term, most IT organizations have bought into the fact that they need to provide better wireless and mobile access, but in the short term, IT organizations must prioritize projects based on the limited resources they have available. As with any new technology, IT needs money to test, certify, and manage the devices.

 

Gramenidis: By implementing solutions from companies like Citrix, Microsoft, VMWare, and Cisco (or a combination thereof), our customers encourage their users to use the wireless device of their choice. This is because they have the ability to connect securely to the corporate network. It used to be known as "bring your own computer." Now it is bring your own device. Motorola has just released the Atrix, which can actually access the corporate network to deliver Windows 7 or other operating systems to the device while the user can still use the device as a phone. You can attach a keyboard, mouse, and monitor to get the full user experience. MicroVision, Inc. is in pursuit to put a projector into the phone. By doing this, the user will no longer be confined to the small screen size of the mobile device. Interaction with the projected image will also eliminate the need for the keyboard and mouse.

 

Smart phones will also impact the enterprise network, especially for firms with IP phone systems. Users will be able to take the smartphone on the road and have the ability to connect to the corporate phone system to utilize all features as if they were locally connected. This would save cell phone minutes as well. It would also eliminate the desk phone in the office.

 

When combining the smart phone and the ability to run applications through XenDesktop, you are basically taking the user out of the office while giving the user the same user experience as if still in the office. All interaction between applications and the phone, i.e., CRM screen pops, will remain intact as if in the office. Management will also be able to centrally control the user phone and the user desktop.

 

For users (both local and remote) that don't need an actual physical phone, a soft phone can be used instead.

 

What technical impediments do you foresee impeding connectivity of the iPhone, iPad, and Android devices to the corporate network?

 

Rodgers: Some smaller organization may be more agile and find it easier to adopt these new technologies. Larger organizations that have more regulatory and compliance issues to deal with—like SOX, PCI, and HIPAA—will find the process more difficult. As long as everything is connected to your own "wired" network, IT organizations have a general sense of control. Once you introduce wireless access into your network environment, you introduce a lot of unknowns, so secure access, device management, and user access control become a big issue. Right now, IT organizations want to manually provision all of these devices, so it takes a lot of effort to get these things ready for the end-user. In addition, some corporate applications may need to be re-coded or re-formatted to fit the screen size of each of the various devices. Testing, provisioning, security, encryption, and device management can all be another drain on IT, which can make IT more reluctant to prioritize the project. Most of these new mobility devices are introduced with the general consumer market in mind, not enterprise business customers. As such, they initially lack a lot of the tools and support functions required by IT organizations. For example, even network printing was a problem when the iPad first came out. Given sufficient time, these tools and features can be added with the cooperation and support of the vendors. Even then, security and remote management are probably the biggest concerns for enterprise customers and may require support from the product vendor and a number of third-party vendors.

 

Gramenidis: Citrix gives our users the ability to use all of these devices to connect to the corporate network to access applications or operating systems and to utilize peripherals that are connected to the device. All of these devices can run Windows 7 through the Citrix Desktop Receiver.

 

How do you plan to handle the security challenges that may result from expanded use of wireless devices?

 

Rodgers: Security is one of the biggest concerns of most IT organizations when it comes to wireless devices and mobility. Device encryption and secure remote access methods such as IPSec and SSL are basic security features required for any device to be seriously considered today. While some vendors provide these features built into the OS, they lack other security features that IT organizations are used to seeing, like firewalls, anti-X control, IDS/IPS, and centralized management. Just like the IT desktop environment, the wireless device vendors are relying on third-party developers to provide these solutions. While the industry is working to develop the next generation of managed mobile security systems, even with the best security systems in place, we still have problems with the end-users who fail to follow basic corporate security guidelines. So most IT organizations have to ask, "Is it worth opening up our networks to this attack vector when we don't even trust our own end-users?" and "Can we really protect the end-users against themselves?" IT organizations will need to continue to monitor, update, and innovate their security systems and, at the same time, develop policies, procedures, and training programs for the end-user community to help ensure compliance with corporate security initiatives.

 

Gramenidis: We are not concerned about an infected wireless device connecting to the corporate network since Citrix runs in a protected area on the wireless device. Infection of the wireless device can't enter the corporate network since the device is not actually connected to the network or it is blocked. These devices are given access to run applications or operating systems from servers on the network. Security is actually increased through virtualization. Programs are running on servers in a protected data center and not from the actual device. If programs need to run from the actual device because an Internet connection or network connection is not available, they will run in a protected area that is immune from infected programs on the device. More importantly, data will never leave the data center; only encrypted keystrokes, mouse-clicks, and screenshots are sent. This way, this data doesn't end up on the wireless device that may be lost or stolen. Users and devices can be set up to receive encrypted files to store on the device or on memory sticks or other peripherals if the need arises. Users can also be set up to receive encrypted print streams so they can print to local printers.

 

How do you plan to handle the capacity provisioning issues that may result from expanded use of wireless devices?

 

Rodgers: Most of these products lack enterprise-class provisioning and management tools at launch time, but the vendors continue to update and improve the capabilities with enterprise business customers in mind. Right now, most of these devices still require some manual provisioning, which is a drain on IT resources and does not scale well.

 

Gramenidis: Scalability is not a problem with bandwidth since Citrix utilizes bandwidth very efficiently by only sending mouse-clicks and keystrokes one way and changes to the screen the other way. Of course, we would have to add additional capacity for servers on the back end to serve the user's applications and/or operating systems.

 

Do you plan to restrict access to the corporate network to just one or two brands or types of wireless devices?

 

Rodgers: Due to the limited resources within most IT organizations, it is most likely that some prioritization and standardization will be required. Most IT organizations don't have the resources to test, provision, secure, encrypt, and manage every device that end-users drag in and beg to use on the network. IT organizations will probably want to choose one path to follow. IT organizations must have standards.

 

Gramenidis: No, since most wireless devices have the ability to run the Citrix Desktop Receiver that will allow operating systems like Windows 7 to actually be used from the wireless device.

 

Are the challenges to providing network access to many different devices—including those from Apple, BlackBerry, Nokia, and Microsoft—formidable?

 

Rodgers: Due to the limited resources within most IT organizations, it is most likely that some prioritization and standardization will be required. Most IT organizations don't have unlimited resources.

 

Gramenidis: No, again because we don't have to actually run the applications from the device. We just have the device connect to our network and applications can then be run from the network.

 

What is your overall strategy to deal with the proliferation of wireless devices?

  • Provide connectivity to all
  • Provide connectivity to some
  • Provide connectivity to none
  • Wait until the economy improves or my boss makes me do something

 

Rodgers: With limited resources, most companies will need to prioritize the proliferation of wireless devices. As the cost for these devices drops with mass adoption and enterprise-class security and management tools become available, the barriers to entry will drop, at which point everyone will get one. For now, as usual, the people at the top will get them first, then the people that really "need" them, and eventually the people that really "want" them.

 

Gramenidis: We plan to provide connectivity to everyone.

 

What role do other vendors such as Cisco play in allowing access to the enterprise network by wireless devices such as the iPad?

 

Rodgers: Cisco and other network vendors continue to improve wireless access services to make wireless access a viable option for enterprise-class business customers. For example, wireless LAN controllers (WLC) simplify access point (AP) management and provisioning. New security features continue to be added, so, for example, you can now get IDS/IPS in a WLC. Cisco also has some new technology that helps to look for interference in the radio bands and will allow a client to automatically reconnect to an AP on a different channel to avoid interference and maximize performance. These are great solutions for larger enterprise-class customers but typically out of reach for smaller companies, even though they share some of the same performance, management, and security concerns.

 

Gramenidis: Citrix, VMWare, and Microsoft solutions work well in conjunction with solutions from Cisco. Cisco partners with Citrix and supports Citrix XenDesktop on their Data Center Servers so that users can run Windows 7 from their corporate network on an Apple iPad. XenDesktop is supported on Citrix XenServer, Microsoft Hyper-V, and VMWare. Citrix XenServer, Microsoft Hyper-V, and VMWare are all supported on Cisco's UCS servers for the data center.

Chris Smith

Chris Smith was the Senior News Editor at MC Press Online from 2007 to 2012 and was responsible for the news content on the company's Web site. Chris has been writing about the IBM midrange industry since 1992 when he signed on with Duke Communications as West Coast Editor of News 3X/400. With a bachelor's from the University of California at Berkeley, where he majored in English and minored in Journalism, and a master's in Journalism from the University of Colorado, Boulder, Chris later studied computer programming and AS/400 operations at Long Beach City College. An award-winning writer with two Maggie Awards, four business books, and a collection of poetry to his credit, Chris began his newspaper career as a reporter in northern California, later worked as night city editor for the Rocky Mountain News in Denver, and went on to edit a national cable television trade magazine. He was Communications Manager for McDonnell Douglas Corp. in Long Beach, Calif., before it merged with Boeing, and oversaw implementation of the company's first IBM desktop publishing system there. An editor for MC Press Online since 2007, Chris has authored some 300 articles on a broad range of topics surrounding the IBM midrange platform that have appeared in the company's eight industry-leading newsletters. He can be reached at This email address is being protected from spambots. You need JavaScript enabled to view it..

BLOG COMMENTS POWERED BY DISQUS

LATEST COMMENTS

Support MC Press Online

$0.00 Raised:
$

Book Reviews

Resource Center

  • SB Profound WC 5536 Have you been wondering about Node.js? Our free Node.js Webinar Series takes you from total beginner to creating a fully-functional IBM i Node.js business application. You can find Part 1 here. In Part 2 of our free Node.js Webinar Series, Brian May teaches you the different tooling options available for writing code, debugging, and using Git for version control. Brian will briefly discuss the different tools available, and demonstrate his preferred setup for Node development on IBM i or any platform. Attend this webinar to learn:

  • SB Profound WP 5539More than ever, there is a demand for IT to deliver innovation. Your IBM i has been an essential part of your business operations for years. However, your organization may struggle to maintain the current system and implement new projects. The thousands of customers we've worked with and surveyed state that expectations regarding the digital footprint and vision of the company are not aligned with the current IT environment.

  • SB HelpSystems ROBOT Generic IBM announced the E1080 servers using the latest Power10 processor in September 2021. The most powerful processor from IBM to date, Power10 is designed to handle the demands of doing business in today’s high-tech atmosphere, including running cloud applications, supporting big data, and managing AI workloads. But what does Power10 mean for your data center? In this recorded webinar, IBMers Dan Sundt and Dylan Boday join IBM Power Champion Tom Huntington for a discussion on why Power10 technology is the right strategic investment if you run IBM i, AIX, or Linux. In this action-packed hour, Tom will share trends from the IBM i and AIX user communities while Dan and Dylan dive into the tech specs for key hardware, including:

  • Magic MarkTRY the one package that solves all your document design and printing challenges on all your platforms. Produce bar code labels, electronic forms, ad hoc reports, and RFID tags – without programming! MarkMagic is the only document design and print solution that combines report writing, WYSIWYG label and forms design, and conditional printing in one integrated product. Make sure your data survives when catastrophe hits. Request your trial now!  Request Now.

  • SB HelpSystems ROBOT GenericForms of ransomware has been around for over 30 years, and with more and more organizations suffering attacks each year, it continues to endure. What has made ransomware such a durable threat and what is the best way to combat it? In order to prevent ransomware, organizations must first understand how it works.

  • SB HelpSystems ROBOT GenericIT security is a top priority for businesses around the world, but most IBM i pros don’t know where to begin—and most cybersecurity experts don’t know IBM i. In this session, Robin Tatam explores the business impact of lax IBM i security, the top vulnerabilities putting IBM i at risk, and the steps you can take to protect your organization. If you’re looking to avoid unexpected downtime or corrupted data, you don’t want to miss this session.

  • SB HelpSystems ROBOT GenericCan you trust all of your users all of the time? A typical end user receives 16 malicious emails each month, but only 17 percent of these phishing campaigns are reported to IT. Once an attack is underway, most organizations won’t discover the breach until six months later. A staggering amount of damage can occur in that time. Despite these risks, 93 percent of organizations are leaving their IBM i systems vulnerable to cybercrime. In this on-demand webinar, IBM i security experts Robin Tatam and Sandi Moore will reveal:

  • FORTRA Disaster protection is vital to every business. Yet, it often consists of patched together procedures that are prone to error. From automatic backups to data encryption to media management, Robot automates the routine (yet often complex) tasks of iSeries backup and recovery, saving you time and money and making the process safer and more reliable. Automate your backups with the Robot Backup and Recovery Solution. Key features include:

  • FORTRAManaging messages on your IBM i can be more than a full-time job if you have to do it manually. Messages need a response and resources must be monitored—often over multiple systems and across platforms. How can you be sure you won’t miss important system events? Automate your message center with the Robot Message Management Solution. Key features include:

  • FORTRAThe thought of printing, distributing, and storing iSeries reports manually may reduce you to tears. Paper and labor costs associated with report generation can spiral out of control. Mountains of paper threaten to swamp your files. Robot automates report bursting, distribution, bundling, and archiving, and offers secure, selective online report viewing. Manage your reports with the Robot Report Management Solution. Key features include:

  • FORTRAFor over 30 years, Robot has been a leader in systems management for IBM i. With batch job creation and scheduling at its core, the Robot Job Scheduling Solution reduces the opportunity for human error and helps you maintain service levels, automating even the biggest, most complex runbooks. Manage your job schedule with the Robot Job Scheduling Solution. Key features include:

  • LANSA Business users want new applications now. Market and regulatory pressures require faster application updates and delivery into production. Your IBM i developers may be approaching retirement, and you see no sure way to fill their positions with experienced developers. In addition, you may be caught between maintaining your existing applications and the uncertainty of moving to something new.

  • LANSAWhen it comes to creating your business applications, there are hundreds of coding platforms and programming languages to choose from. These options range from very complex traditional programming languages to Low-Code platforms where sometimes no traditional coding experience is needed. Download our whitepaper, The Power of Writing Code in a Low-Code Solution, and:

  • LANSASupply Chain is becoming increasingly complex and unpredictable. From raw materials for manufacturing to food supply chains, the journey from source to production to delivery to consumers is marred with inefficiencies, manual processes, shortages, recalls, counterfeits, and scandals. In this webinar, we discuss how:

  • The MC Resource Centers bring you the widest selection of white papers, trial software, and on-demand webcasts for you to choose from. >> Review the list of White Papers, Trial Software or On-Demand Webcast at the MC Press Resource Center. >> Add the items to yru Cart and complet he checkout process and submit

  • Profound Logic Have you been wondering about Node.js? Our free Node.js Webinar Series takes you from total beginner to creating a fully-functional IBM i Node.js business application.

  • SB Profound WC 5536Join us for this hour-long webcast that will explore:

  • Fortra IT managers hoping to find new IBM i talent are discovering that the pool of experienced RPG programmers and operators or administrators with intimate knowledge of the operating system and the applications that run on it is small. This begs the question: How will you manage the platform that supports such a big part of your business? This guide offers strategies and software suggestions to help you plan IT staffing and resources and smooth the transition after your AS/400 talent retires. Read on to learn: