fbpx
 

Tag: BYOD

BYOD and IoT

In a January 5, 2016 report entitled “BYOD, WEARABLES AND IOT: Strategies, Security, Satisfaction” (click here for access to the report – requires a valid Tech Pro Research member account) Tech Pro Research released its findings of a survey in which there were 206 respondents from the U.S., Canada, Europe, India, Asia-Pacific, China, Australia and New Zealand. These findings were quite clear that BYOD (Bring-Your-Own-Device) is something of a new normal, especially for smaller companies. It is also clear from […]

Microsoft licensing lessons learned – Mobility, BYOD and Desktop Virtualization?

Neither BYOD and/or desktop virtualization are inherently bad. If the funding is there for the correct licensing and the benefits of improved security and device and account management are realized, these approaches can be quite favorable to you. Server virtualization is the generally accepted standard, the dominant model if you will. Today’s servers are far too massive, far too dense for single applications and perhaps more importantly, far too massive and dense for licensing. Microsoft has moved towards its Core […]

Microsoft licensing lessons learned – Mobility, BYOD and Desktop Virtualization?

Neither BYOD and/or desktop virtualization are inherently bad. If the funding is there for the correct licensing and the benefits of improved security and device and account management are realized, these approaches can be quite favorable to you. Server virtualization is the generally accepted standard, the dominant model if you will. Today’s servers are far too massive, far too dense for single applications and perhaps more importantly, far too massive and dense for licensing. Microsoft has moved towards its Core […]

Enact and Redact: Data Redaction feature of Oracle Advanced Security Enterprise Option in 12c

With today’s growing concerns regarding the security on BYO devices (BYOD) such as smartphones, tablets, and laptops; it is critical to ensure sensitive data is not exposed. Enacting security policies and procedures that help remove or reduce these concerns is mandatory in today’s world. Data Redaction is a new feature of the Oracle Advanced Security Enterprise Option introduced with version 12c. It is still a feature that must be licensed separately from Oracle Database Enterprise Edition 12c, but it goes […]

Client Access Licenses (CAL): 2 Important Changes in Microsoft Pricing Structure

Effective December 1, 2012, Microsoft will make two (2) important changes to its pricing structure for Client Access Licenses (CALs). First, the price is increasing by 15% for User CALs. Second, the price is increasing by 15% for User CALs – only! User CALs are assigned to a person or process and authorize access to the server software to which they are associated regardless of the number of devices that person or process utilizes. Device CALs are assigned to a […]

Desktop virtualization and licensing

Software management, hardware imaging and refreshment, and BYOD (the “edge devices”) are not only cost containment strategies, they can be key business differentiators. By ensuring anytime, anywhere access, executives, account managers, and technicians are able to remain connected to the information they require. This connectivity introduces a multitude of devices that must be managed, utilized, and, in some cases, transported. And that introduces the problem of multiple versions. Licensing all these different devices introduces excess cost. Desktop virtualization eases these […]

In Archive