vmware-embraces-people-centric-computing-as-opposed-to-device-centric-computing-what-this-means-for-vmware-monitoring-more

VMware Embraces ‘People-Centric’ Computing as Opposed to ‘Device-Centric’ Computing: What This Means for VMware Monitoring & More

Most IT products have historically been developed as device-centric applications. In other words, the software is designed to work with a specific device or hardware system. Until recently, this model worked fine. Businesses and individuals chose the hardware with the specifications they wanted to use, then selected software (such as VMware monitoring tools or other applications) that were compatible with that hardware (except, of course, in instances where the software comes preinstalled, which is often the case, limiting users’ decisions even further).But today’s users — and the IT world in general — are different sorts of people. 

Today’s users want software to be compatible with all of their devices. They want to be able to merge work and personal activities across their various devices, and to access their files, applications, etc. from their desktop computers, portable laptops and tablets, and even their smartphones.This means that software needs to be people-centric, not device-centric. The trend isn’t just driven by users, either. 

Businesses want to be able to have one team and a single set of tools and processes to deliver software, content, and more across various devices to all of their users. In many cases, these users are spread across the country or even around the world. Most businesses are having to care for at least two separate management silos: one for desktop users and another for mobile users. This makes for inconsistent policy enforcement, a lack of central governance, and even a broken identity across the IT department. 

One world exists for physical endpoints, while another is solely dedicated to virtualized environments. 

VMware Introduces People-Centric Design with Project A2

VMware monitoring - Microsoft Windows 10

Windows 10 is an excellent example of how people-centric computing is shaping the industry. 

Windows 10 delivers a cohesive, streamlined experience to users across work and personal devices. Expect more software application developers to follow suit, combining the teams that work on desktop, mobile, physical, and virtual environments. In order to enable people-centric computing, VMware (as well as other big tech companies) has begun to roll out products to support this movement. 

For example, Windows 10 is designed to work for each user, across devices, and to provide a seamless user experience with consistent applications and data access for all of those devices. Likewise, VMware has introduced Project A2, which is a centralized management solution designed to allow businesses to deliver applications and enforce policies consistently across all desktop and mobile environments. 

Project A2 will allow you to simplify the application management afforded by VMware App Volumes to physical endpoints. It will also provide an easier way to migrate to Windows 10 while still managing legacy PC environments. 

VMware Also Includes People-Centric Design in Products Like Identity Manager & NSX

People Centric

VMware has begun building the concepts of people-centric computing into many of their products already, including Identity Manager, NSX, Horizon, and Project A2. Expect this trend to continue as VMware rolls out new products designed to make it easier to manage a variety of users and devices. 

 However, new tools for VMware monitoring and the like can’t just be focused on the distribution of the application. There has to be a way to assure the security of the content distributed. This means secure sign-in, secure VPN connections for each application, etc. VMware is addressing these issues with other new products, like Identity Manager and NSX. 

 VMware Horizon 6.2 Offers People-Centric Features & Functionality Too

people centric

The people who use the devices are more important than the devices themselves. IT has to realize that failing to deliver the experience users demand is a large contributing factor to shadow IT, which is damaging to the business, the customers, and the reputation of the IT department. 

VMware has also built people-centric features and functionality into products like VMware Horizon. In the release of Horizon 6.2, VMware included enhancements like: 

  • More efficient management and delivery of applications at scale, which should ensure a rich user experience when deploying to global, multi-site virtual environments. 
  • An improved user experience through support of Skype for Business, as well as the most current NVIDIA GRID virtual graphics processing unit. 
  • Support for all-flash storage options to lower costs and improve performance via the new VMware Virtual SAN.
  • Improved security capabilities, which includes support for options like biometric fingerprint authentication. 
  • Compliance improvements, such as FIPS 140-2 compliance and readiness for other governmental regulations. 

People-centric computing isn’t just limited to VMware monitoring and other tools. It is evident across the IT industry. It is largely a response to growing tensions between users — who want to use the same applications, access the same data, and receive similar experiences across all of their work and personal devices — and the IT department, which wants more control over the environment for management, governance, security, and related purposes. 

A lack of flexibility on the part of IT has been a huge contributor to the problem of shadow IT, in which users simply go around the limitations imposed by IT by using outside applications and storage options, like Dropbox and Google Docs. IT is gradually realizing that in order to curtail the growth of dangerous shadow IT activities, they must begin providing a user experience that works across all of the users’ personal and work devices. Hence, IT is finally on board with the people-centric computing concept. 

In addition to VMware, large software proprietors like Microsoft, AppSense, and others have also begun to embrace the people-centric computing ideology, evident in products like Windows 10.Are you in search of more information about the happenings in VMware and across the world of technology? 

Sign up for our newsletter today to stay informed on the latest regarding virtualization, cloud computing, VMware products, and more.

CNIL
Metrics and Logs

(formerly, Opvizor Performance Analyzer)

VMware vSphere & Cloud
PERFORMANCE MONITORING, LOG ANALYSIS, LICENSE COMPLIANCE!

Monitor and Analyze Performance and Log files:
Performance monitoring for your systems and applications with log analysis (tamperproof using immudb) and license compliance (RedHat, Oracle, SAP and more) in one virtual appliance!

Subscribe to Our Newsletter

Get the latest product updates, company news, and special offers delivered right to your inbox.

Subscribe to our newsletter

Use Case - Tamper-resistant Clinical Trials

Goal:

Blockchain PoCs were unsuccessful due to complexity and lack of developers.

Still the goal of data immutability as well as client verification is a crucial. Furthermore, the system needs to be easy to use and operate (allowing backup, maintenance windows aso.).

Implementation:

immudb is running in different datacenters across the globe. All clinical trial information is stored in immudb either as transactions or the pdf documents as a whole.

Having that single source of truth with versioned, timestamped, and cryptographically verifiable records, enables a whole new way of transparency and trust.

Use Case - Finance

Goal:

Store the source data, the decision and the rule base for financial support from governments timestamped, verifiable.

A very important functionality is the ability to compare the historic decision (based on the past rulebase) with the rulebase at a different date. Fully cryptographic verifiable Time Travel queries are required to be able to achieve that comparison.

Implementation:

While the source data, rulebase and the documented decision are stored in verifiable Blobs in immudb, the transaction is stored using the relational layer of immudb.

That allows the use of immudb’s time travel capabilities to retrieve verified historic data and recalculate with the most recent rulebase.

Use Case - eCommerce and NFT marketplace

Goal:

No matter if it’s an eCommerce platform or NFT marketplace, the goals are similar:

  • High amount of transactions (potentially millions a second)
  • Ability to read and write multiple records within one transaction
  • prevent overwrite or updates on transactions
  • comply with regulations (PCI, GDPR, …)


Implementation:

immudb is typically scaled out using Hyperscaler (i. e. AWS, Google Cloud, Microsoft Azure) distributed across the Globe. Auditors are also distributed to track the verification proof over time. Additionally, the shop or marketplace applications store immudb cryptographic state information. That high level of integrity and tamper-evidence while maintaining a very high transaction speed is key for companies to chose immudb.

Use Case - IoT Sensor Data

Goal:

IoT sensor data received by devices collecting environment data needs to be stored locally in a cryptographically verifiable manner until the data is transferred to a central datacenter. The data integrity needs to be verifiable at any given point in time and while in transit.

Implementation:

immudb runs embedded on the IoT device itself and is consistently audited by external probes. The data transfer to audit is minimal and works even with minimum bandwidth and unreliable connections.

Whenever the IoT devices are connected to a high bandwidth, the data transfer happens to a data center (large immudb deployment) and the source and destination date integrity is fully verified.

Use Case - DevOps Evidence

Goal:

CI/CD and application build logs need to be stored auditable and tamper-evident.
A very high Performance is required as the system should not slow down any build process.
Scalability is key as billions of artifacts are expected within the next years.
Next to a possibility of integrity validation, data needs to be retrievable by pipeline job id or digital asset checksum.

Implementation:

As part of the CI/CD audit functionality, data is stored within immudb using the Key/Value functionality. Key is either the CI/CD job id (i. e. Jenkins or GitLab) or the checksum of the resulting build or container image.

White Paper — Registration

We will also send you the research paper
via email.

CodeNotary — Webinar

White Paper — Registration

Please let us know where we can send the whitepaper on CodeNotary Trusted Software Supply Chain. 

Become a partner

Start Your Trial

Please enter contact information to receive an email with the virtual appliance download instructions.

Start Free Trial

Please enter contact information to receive an email with the free trial details.