The Adviser is available in e-mail format. Sign up online at www.emtecinc.com/adviser. the EMTEC ADVISER INFORMATION TECHNOLOGY SOLUTIONS AND STRATEGIES Vol. 15 No. 5 September/October 2012

In This Issue... Deciding the Desktop Global Strategy Future: As the sun sets on Windows XP, organizations must make strategic decisions about Emtec serves as a trusted partner for technology projects desktop systems...pg. 4 essential to Kelly Services’ worldwide operations.

Smartphones, Dumb Users: odern human Few smartphone users take resources manage- ment has its roots in proper security measures. Here the Industrial are some tips for improving Revolution of the safety...pg. 9 M18th and 19th centuries when global economies shifted from agriculture to industry. The rapid development of large BI at the ‘Speed of factories created a demand for huge Thought’: In-memory analytics workforces, along with the need for a puts turbocharged data access management style that addressed a wide range of issues such as recruiting, hiring, and analysis in the hands of training, compensation and benefits, safe- business users...pg. 12 ty, security and much more. Companies in the modern global Virtual Work, Real IT business environment have the same Kelly Services understands these tract laws, government regulations, cur- Challenges: As virtual needs but also require the ability to challenges better than most. rency and more. Operating successfully attract, develop and coordinate work- Headquartered in Troy, Mich., the global on a global level means Kelly Services is working becomes more forces that span borders and even conti- workforce solutions company employs more than a typical enterprise, but also a prevalent, organizations need to nents. Additional issues such as supply 550,000 individuals on a temporary, tem- complex social system requiring clarity of ensure they have the right tools chain management, technology consisten- porary-to-hire and direct-hire basis for purpose, guidance and direction. The cy and regulatory compliance require importance of effective technology solu- and processes to support remote clients around the world. This is in addi- centralized organizational properties that tion to the nearly 8,000 full-time employ- tions in global workforce management employees...pg. 14 can be administered globally. ees working for Kelly Services globally. cannot be overstated. Today, Kelly® offers a comprehensive “Our whole business is built around array of and consulting serv- our employees, starting with the hiring PRSRT STD ices including recruitment, human process,” said Judy Snyder, VP of Global U.S. POSTAGE resource management, vendor manage- PAID Applications, Kelly Services. “From Tulsa, OK ment, and outplacement services on a placing employees on assignment to Permit No. 2146 global basis. Kelly employees can be ensuring paychecks are issued correctely found working in traditional office posi- involves a significant amount of time, tions as well as in finance, healthcare, resources and knowledge. From a busi- engineering, law, education, accounting, ness perspective, the applications and information technology, science, creative platforms we use are extremely com- services, and light industrial. plex.” Such a global reach requires the com- That’s why Kelly Services counts on The Adviser pany to understand and manage issues Emtec to provide the technical and func- related to each country’s labor and con- tional expertise needed to help ensure Oracle Business Intelligence Enterprise Edition 11g (OBIEE) is a comprehensive business intelligence platform that delivers a full range of analytic and reporting capabilities.

• Designed for scalability, reliability, and performance, OBIEE 11g delivers contextual, relevant and actionable insight to everyone in an organization, resulting in improved decision-making, better- informed actions, and more efficient business processes.

• OBIEE 11g integrates with all popular data sources, ETL tools, business applications, application servers, security infrastructure, portal technology as well as any ODBC compliant third party analytical tool.

• OBIEE 11g accesses data from multiple heterogeneous sources— including popular relational and multidimensional data sources and major ERP and CRM applications from Oracle and SAP.

Oracle provides the industry’s only multi-sourced BI applications, as well as market-leading performance management applications that are powered by this BI platform.

For more information, please contact Deanna Evers 800-800-8894 x127897 [email protected] WWW.EMTECINC.COM

Copyright © 2012, Oracle Corporation. All Rights Reserved. ORC-16

2 www.emtecinc.com The Adviser COVER STORY continued from page 1 critical applications surrounding human capital management, back-office financials, payroll and billing are up-to- date and delivering flexibility and efficiency at every level.

History of Success Over the past four years, Emtec has partnered with Kelly Services on three mission-critical projects to implement or upgrade essential Oracle PeopleSoft Enterprise Applications. The first, in 2008, involved implementing PeopleSoft’s Enterprise Service Automation to centralize all data entry, processing and invoicing in one system for KellyOCG, the Outsourcing and Consulting Group of Kelly Services. In 2011, Kelly Services again called on Emtec to assist with an organization-wide upgrade of PeopleSoft Human Capital Emtec’s Goal: Management (HCM) and PeopleSoft Financials from version 8.9 to version 9.1. HCM is the key application that allows Emtec did Kelly Services to manage its workforce on a single system of Clients for Life record while complying with local laws and regulations. everything“ on s I read the article on Kelly PeopleSoft Financials provides an integrated repository for all financial data and organization-wide support for transactions time and within Services on the eve of Oracle and billing processes. budget. It was Open World, I look back on the “We had been very pleased with the work Emtec did on the tremendous client relationships Kelly OCG project. They performed very well on that project, considered a we have built throughout our from scheduling and budget to technical and functional expert- organizationA over the years. One of Emtec’s ise,” said Snyder. “When we began looking at the PeopleSoft success by our first projects was around building complex HCM and Financials upgrades, we went through the process of technical team desktop computers to run advanced CAD reviewing different vendors to see what they had to offer. In the programs for Pixar Animation. Now we assist end, we decided to go with a trusted partner.” and our organizations with global supply chain, Emtec’s team of Oracle experts is uniquely positioned to business team. human capital and complex GAAP and IFRS deliver on PeopleSoft projects. Emtec holds Oracle Platinum reporting requirements. Partner status and was one of the first Oracle partners in North Our executive Our clients are asking us to do more and America to earn PeopleSoft PeopleTools Specialization. This more; and we have grown our breadth of serv- distinction means Emtec has been recognized by Oracle for its staff was ices to support them as they continue to grow expertise in delivering services specifically around PeopleSoft thrilled. through competency development, business results and proven and evolve. As Kelly has grown from tempo- success. rary office staffing to offering outsourcing Beyond the PeopleSoft expertise, the Emtec team demon- and consulting services including recruitment, strated a keen understanding of Kelly Services’ business human resource management, vendor man- requirements and the potential impact to the company if the upgrade didn’t go well. agement and outplacement services on a “This was a large project with a high degree of technical difficulty,” said Snyder. “We had a lot of global basis; we continue to expand from custom code that needed to be reviewed to see if it could be used in the upgraded ”versions without neg- project based work to more long-term rela- atively impacting the integrity of the system.” tionships with our clients that are wider in breadth than ever. We have transformed our On Time, Within Budget organization from pure hardware sales and The Emtec team, working alongside members of the Kelly Services IT team, performed a “fit-gap” services into one that delivers complex global analysis to examine all the custom code line by line. Through this careful review process, they were able projects as well as long-term outsourcing, to determine if code had already been incorporated into the latest PeopleSoft version or if modifications managed services, global delivery and were required to make the custom code work with the latest version. expanded solution offerings around Cloud, Once the code issues were cleared up, the upgrade began in earnest. Cutover to the new system Application Development and Packaged began on a Friday evening in August 2011 and was completed before the start of business on Monday. Application Solutions. “We were up and running at 5 a.m. on Monday, and the business experienced no impact at all,” Kelly Services is a great example of Snyder said. “It was transparent to the business, which was the goal. This project wasn’t about creating Emtec’s commitment to our “Client for Life” some cool, new features — it was just to make sure that everything operated as it had before and peo- approach. Our multi-year client relationships ple could show up and do their jobs. demonstrate our aspiration to continuously “It was a really good experience. On some of our projects in the past, we’ve had issues with meet- deliver value and grow alongside our clients ing scheduled deadlines within the allotted budget. But Emtec did everything on time and within budg- and their needs. et. It was considered a success by our technical team and our business team. Our executive staff was thrilled.” Now more than ever, our clients are being The HCM and Financials upgrade project served dual purposes. It ensured that Kelly Services would held accountable to deliver ROI and justify not encounter end-of-life Oracle support issues with the older versions, and laid the groundwork for an their strategic initiatives before they move even more critical and far-reaching project — a complete overhaul of the company’s legacy VAX pay- forward. Our mission is to help our clients roll system written in COBOL. Emtec is currently helping Kelly Services shift this system to a PeopleSoft transform IT into an investment that returns platform, with an expected go-live date for U.S. operations in January 2013. Additional international true value to their respective organizations. I operations are to be switched to the PeopleSoft system in staged deployments through 2015. am proud that these organizations feel the “It’s a big deal when you upgrade everything, especially when you need to move from an antiquat- comfort level to turn again and again to our ed legacy system,” said Snyder.“But when we’re finished, we’ll be in great shape with the latest versions Emtec team to help them meet these new of PeopleSoft throughout the company.” challenges.

September/October 2012 www.emtecinc.com 3 Deciding the Desktop Future As the sun sets on Windows XP, organizations need to make strategic decisions about their desktop systems.

ime is running out for the graphics power to run Win 7. There may Initially, Windows 8 was expected to upgrade numerous PCs to Win 7 or Win Windows XP operating sys- also be driver compatibility issues for ship in late 2013, which would have 8 — the new OS is deployed on virtual tem, yet it remains extraor- those migrating from XP. To avoid nega- made it tough for organizations to machines within the data center. dinarily popular. Although tive impacts on productivity, organiza- upgrade their desktops before XP sup- Desktop virtualization is popular Microsoft support for XP port runs out. Microsoft announced on tions need to carefully assess their desk- because it addresses one of the most willT end in April 2014, the decade-old OS top environment and plan accordingly. July 9, 2012, that Windows 8 will be time-consuming and expensive opera- still holds the largest share of the global released to manufacturing in August and One feature of Win 7 does make tions supported by IT organizations — desktop OS market. made available to consumers by the end things easier for organizations running deploying and managing end-user desk- There are a number of reasons why legacy and home-grown applications. of October. That makes migration from tops. The benefits of desktop virtualiza- XP has retained such a foothold. For one Windows XP Mode allows Windows 7 XP to Win 8 a viable option. tion become very evident when it comes thing, it’s familiar and people like what users to run many XP applications right Waiting for Windows 8 could expose to a major desktop upgrade or migration they’re used to. In addition, XP still from the Win 7 desktop. Available in an organization to unnecessary risk, project. When everything can be done works, and people question why they Windows 7 Professional, Ultimate and however. Unlike Windows 7, which was within the data center, the migration should spend money fixing what’s not Enterprise editions, Windows XP Mode released nearly three years ago, Windows broken. And many end-users have very utilizes Windows Virtual PC to create a 8 has no track record. Organizations that becomes less costly and disruptive. old versions of applications that won’t virtual XP machine within the Win 7 OS. choose to migrate to Win 7 now will have VDI is fairly transparent to the end- run on the newer operating systems. It doesn’t solve all compatibility prob- more time to evaluate Windows 8. In user, who still sees a personalized desktop That said, it’s absolutely critical that lems but it will buy some time. It gives fact, businesses would have the luxury to interface. It’s especially beneficial to organizations start thinking strategically organizations the option of deploying wait until the first service pack emerges mobile and remote workers, who can about their desktop systems. When Win 7 right away, then slowly migrating some six to nine months after the access their desktops via a wide range of Microsoft support for XP ends, security legacy XP applications. Windows 8 release in order to ensure devices from any location. patches and other updates will no longer that any potential glitches are fixed. The goals of desktop virtualization be available. Organizations need to begin Wait for 8? On the other hand, Windows 8 could can also be achieved through application planning now to replace their remaining be a real boon for organizations with Windows 8, on the other hand, is a streaming, server- and blade-based com- XP machines or face serious risks. mobile employees. Windows 8 includes radical departure from XP, featuring a puting and cloud services, which may There are a number of options avail- Windows To Go — the ability to provide new interface designed for touchscreen, provide better ROI and lower total cost able, and which one you choose depends users with a full corporate copy of mouse, keyboard and pen input. The new of ownership. The various approaches upon a number of factors. What’s impor- “Metro” interface features big, colorful Windows 8, along with their business can also be combined to create a flexible tant is to allow plenty of time to com- tiles that the user can swipe and touch — apps, data and settings, on a USB storage architecture. plete the migration and ensure that all similar to a Windows Phone device. The device. And Windows 8 can stay always end-users are trained and comfortable tiles differ from traditional desktop icons connected with Metro-style apps. The takeaway here is that migrating with the new environment before the sun by letting users view live information the desktop infrastructure requires sets on XP. from Windows 8 Metro-style applica- What about VDI? informed decisions and strategic plan- tions without actually accessing the apps. Another option is to transition to a ning. With XP slated to sunset in less Roll with 7? For instance, a tile for Windows Live virtual desktop infrastructure (VDI). than two years, organizations should Organizations that have stuck with Mail will show the latest message, while With VDI, the user interface and applica- start the process now to ensure that end- XP this long are in an unusual position. a tile for a social networking app will tion environment are hosted on a central- users have the desktop resources they They can choose to upgrade to the cur- show notifications. ized server. This eliminates the need to need without interruption. rent Microsoft operating system, Windows 7, or wait until the release of the next version, Windows 8. Many organizations appear to going with Win 7 — Microsoft sold 70 million licenses in Gartner Says Windows 8 Marks Beginning of New Era the second quarter of 2012 alone. indows 8 marks the beginning of the new WinRT distinguished analyst at Gartner.“Microsoft will continue to Windows 7, which was launched in (Windows Runtime) computing era and the support Win32, but it will encourage developers to write October 2009, has some of the look and W beginning of the end of the WinNT era, according more manageable and engaging applications using WinRT.” feel of XP with greatly improved per- to Gartner, Inc. Nevertheless, the combination of the WinRT Metro is a new interface model that will lock organiza- formance. Windows 7 is faster and has a programming model, a new user interface and legacy tions into the next generation of Windows. However, Silver smaller footprint than its predecessor, WinNT support will allow users to continue running their said that enterprises will take many years to move their Microsoft Vista, and improved memory Win32 programs alongside new WinRT apps. applications to the new model, and it will take at least five management for a better user experience. Gartner analysts said WinRT is a new platform years for significant traction of Metro-style apps to pervade Windows 7 will run on a PC with fairly designed to keep Microsoft relevant in a future that will be all areas of user-facing enterprise apps. Organizations plan- modest specifications, and supports a dominated by mobile devices. Microsoft will position ning to develop new Win32 applications should switch to broad range of hardware and software WinRT as its strategic platform for new development, but Metro for all new user-facing applications beginning in options. It has been generally very well most users will continue to run Win32 applications for 10 2013 and should focus on external apps first and internal received, with marked improvements in or more years. apps later. usability, security and networking. “Windows 8 is the start of Microsoft’s effort to respond While Microsoft is not forcing anyone to eliminate Still, organizations that decide to to market demands and competitors, as it provides a com- Win32 applications, Gartner believes that Win32 and the migrate from XP to Win 7 will need sev- mon interface and programming API set from phones to Windows Desktop will become less strategic over time. eral months of testing and preparation. servers. It is also the beginning of the end of Win32 applica- Analysts say that by 2020 enterprise end-users will spend Organizations must be sure older PCs tions on the desktop,” said Michael Silver, vice president and less than 10 percent of their time in Win32 applications. have enough memory, disk space and

4 www.emtecinc.com The Adviser MOBILITY: Just what the doctor ordered

Emtec’s Professional Mobile Medical Solution Delivers Healthcare Efficiency at the Highest Level

Emtec has integrated a combination of cutting edge technology including Panasonic’s rugged laptops, Dragon Voice Recognition Software and bluetooth technology. This suite of products enables doctors, nurses, medical technicians, medical field support, dentists, pharmacists, first responders and other medical staff to perform their job more efficiently and effectively while being completely mobile. Enjoy the advantages of taking notes on the fly, increase clinical record

accuracy, distribute valuable information through the For more information, please contact Deanna Evers appropriate channels instantly, and save money by simplifying 800-800-8894 x127897 office routines and cutting Medical Transcription costs. [email protected] WWW.EMTECINC.COM

September/October 2012 www.emtecinc.com 5 6 www.emtecinc.com The Adviser BYOD Policies Must Address Legal Risks Healthy IT Opportunities rganizations adopting formal “Bring Your Own Device” policies that Healthcare reform will create strong permit employees to use personal mobile devices to create, store and O transmit work-related data must be prepared to deal with a number of demand for a broad range of IT services. potential legal risks, according to a recent article in the New York Law Journal. Author Philip M. Berkowitz notes that organizations must be aware that legal he recent Supreme Court experience and other information sys- requirements concerning security, encryption and confidentiality could be ruling upholding the tems. breached by BYOD use. Litigation discovery can also become more complex Affordable Care Act (ACA) As an indication of the IT opportu- when material must be obtained from a device that is used both for personal and should provide a shot in the nities presented by HIX development, work matters. arm for the IT industry. industry giants such as Microsoft, IBM, “Companies adopting BYOD policies should update confidentiality agree- HealthcareT reform is likely to create sig- , Oracle and Dell all have estab- ments, take practical steps to safeguard confidential information and trade nificant demand for IT projects sur- lished their own HIX practices. secrets, and take post-termination efforts to preserve (if necessary) and delete rounding health insurance exchanges, “The insurance exchange aspect of company information from departing employees,” Berkowitz writes. electronic health records, data conver- healthcare reform is creating the need Organizations must also be aware of the risk that contingent or contract sion, claims processing, insurance sales for states to make decisions and solve workers could have confidential or trade secret data from a previous employer on and more. problems that lie outside their tradition- their mobile devices. This issue should be addressed in contracts with agencies Reports from Everest Group have al areas of expertise, such as integrating providing contract workers. Such contracts often are form agreements that may estimated that the U.S. market for IT databases, collecting monthly premiums ignore these issues. services in healthcare is about $14 bil- and calculating tax subsidies,” said Jack lion to $15 billion currently and is grow- Hersey, general manager, United States ing at 5 percent to 7 percent every year. Public Sector Healthcare and Social FCC Says Broadband Speeds Increasing With healthcare reform, the market Services Group, Microsoft. “Microsoft’s could grow between 8 percent and 10 HIX solutions eliminate the need for roadband providers have significantly improved accuracy in actual versus percent, an incremental increase of 3 states to evaluate numerous point solu- advertised speeds during the past year, and consumers are subscribing to percent. Additionally, Everest Group tions from various firms to find one that B higher-speed tiers and receiving faster speeds than ever before, according to estimates the market for healthcare IT works well with government policies or the latest results from the Federal Communications Commission’s ongoing, outsourcing is worth $20 billion annual- existing IT infrastructures.” nationwide performance study of residential wireline broadband service. ly, with the number of transactions In its second “Measuring Broadband America” report, the FCC found that in growing by 35 percent over the past EHR and mHealth July the average broadband provider delivered 96 percent of advertised download three years. The Affordable Care Act also creates speed during times when bandwidth demand was at its peak — up from 87 per- “Healthcare payers need to develop a new sense of urgency surrounding the cent in April and 80 percent in March 2011. FCC analysis indicates that the a technology strategy to realign IT with development of electronic health record change was driven largely driven by improvements in network performance and the evolving healthcare ecosystem, iden- (EHR) and mobile healthcare (mHealth) not downward adjustments to the speed tiers offered. tify strategic partners to assist in that Additionally, the report says that consumers are subscribing to higher-speed journey, and leverage optimal delivery solutions. Such initiatives are major IT tiers and receiving faster speeds than ever before. The FCC found that the aver- locations,” said Jimit Arora, vice presi- implementations that involve redesigned dent, Everest Group. “Service providers storage infrastructures, cloud-based age speed tier that consumers were subscribing to increased from 11.1 Megabits need to invest in domain expertise across applications, security and privacy con- per second (Mbps) to 14.3Mbps, an almost 30 percent increase in just one year. people, processes and technology if they trols, and wireless and mobile technolo- Because providers also did a better job of meeting or exceeding their advertised want to grow and stay ahead of compe- gies. Pricewaterhouse Coopers (PwC) speeds, the actual increase in speeds experienced by consumers was even greater tition.” estimates the U.S. market opportunities than advertised speed, from 10.6Mbps to 14.6Mbps, representing an almost 38 for mHealth will be $6.5 billion by percent improvement. Online Marketplaces 2017, while the Millennium Research “Millions of Americans have improved broadband performance. This is good Group says the EHR market will reach A key provision of the Act is the news for consumers and the economy, but we need to keep pushing for faster $8.3 billion by 2016. “individual mandate” that requires broadband speeds and greater capacity,” said FCC Chairman Julius everyone in the U.S. to purchase health In a recent report, “Implications of Genachowski. “Bandwidth abundance is essential to driving innovation and insurance or face an annual fine. By the U.S. Supreme Court Ruling on unleashing the benefits of broadband, including increased education, healthcare, extending insurance coverage to some Healthcare,” PwC’s Health Research and job-creation opportunities across the country.” 40 million Americans, this provision will Institute notes that leading health sector create increased volumes for both participants have already made signifi- healthcare providers and insurers. cant progress in devising new ways to Hacking Toolkits Targeting Java conduct business and move ahead of the Additionally, every state has to build evelopers of web exploit toolkits are increasingly focusing on Java competition in the face of impending a health insurance exchange (HIX) that exploits, network security experts say. Security bloggers have recently deadlines under the ACA. Those that serves as an online marketplace for indi- noted that one such kit, Blackhole, was recently upgraded to exploit a have resisted change will be seeking the D viduals and small businesses to compare newly patched security flaw addressed in the Java SE 6 Update 33 and Java SE 7 guidance of knowledgeable technology policies and buy insurance. The Update 5. Department of Health and Human partners to get on track. The Blackhole platform has become increasingly popular among hackers. Services has awarded hundreds of mil- “Despite the political uncertainty, According to researchers at M86 Security, the tookit was the source of roughly 95 lions of dollars to states to help them set private-sector initiatives, accentuated percent of all malicious URLs identified in the second half of 2011. The up these exchanges and will continue to and accelerated by the health reform do so through 2014. law, are moving forward,” said Kelly researchers suggest one reason for the growth in Blackhole usage is that the kit Beyond the efforts by states, howev- Barnes, Leader of PwC's U.S. Health developers last year made the source code available for free download and mod- er, healthcare providers and insurers Industries practice. “The pressure for ification. must also undertake initiatives to innovative ways to provide higher-quali- Cybercriminals are attracted to Java exploits because they can have very high upgrade IT infrastructure to connect ty, more-affordable healthcare contin- success rates due to the software’s slow patching rates among enterprise users. with HIXes. Such implementations will ues. Healthcare organizations that have Vulnerability management firm Rapid7 recently conducted an analysis of the Java likely require portal technologies, con- been sitting on the sidelines will now patching habits of Internet users and found that in the first month after a Java tent management, e-commerce, customer have to get in the game and play catch- patch is released the fix is deployed by less than 10 percent of users. After two relationships management, online user up.” months, the number jumps to approximately 20 percent.

September/October 2012 www.emtecinc.com 7 HP CloudSystem combines servers, storage, networking, and security

together with automated system and hybrid service delivery management. The

For more information, please contact Deanna Evers result is a complete cloud solution that’s prepared to fulfill the promise of “cloud 800-800-8894 x127897 [email protected] driven” services. Contact Emtec today to learn more. WWW.EMTECINC.COM © Copyright 2012 Hewlett-Packard Development Company, L.P. HP-207

8 www.emtecinc.com The Adviser Smartphones, Dumb Users? Few smartphone users take proper security measures. Here are some tips for improving safety.

ith the advent of the iPhone, Blackberry and Androids, the mobile phone is no longer just a Analyst Says phone — it's a high-tech communi- cation device and computer. As a Biometric Security result,W the increased use of personal mobile devices for business purposes has created significant potential for Coming Soon for security breaches. Yet users remain surprisingly cavalier about the Smartphones security of these devices. According to a recent study released by the National Cyber Security Alliance obile biometric security will soon (NCSA) and McAfee, 72 percent of Americans have move from “an interesting concept” to never installed data protection applications or security M a “must-have” feature for all smart software on their smartphones. mobile devices (SMDs), according to one security “Mobile devices are continuing to grow rapidly and analyst. The forecast is boosted by Apple’s recent have become a staple in work life and play,” said John agreement to buy AuthenTec, a biometric-tech- Thode, executive vice president and general manager of nology company that designs security sensors for McAfee’s consumer, mobile and small business unit. “As mobile devices. a result, consumers and organizations need to ensure “Last year, we forecasted that the mobile bio- these devices are protected from device loss, data theft metric security market would grow to 39 million and malware that can be distributed via direct down- INSTALL AN ANTIVIRUS APP. Smartphones are becom- users by 2015,” said Alan Goode, founder of loads, links, email attachments and text messaging.” ing increasingly vulnerable to viruses and malware. London-based Goode Intelligence. “This was Regardless of the brand or operating system, there Consider using mobile security antivirus software — based on the expectation that initial growth are a number of basic security measures users should especially with Google’s Android OS. As the market- would come from two biometric modalities; take to ensure the safety of valuable information. leading mobile OS, Android has become the biggest tar- embedded fingerprint sensors and voice - SET UP THE SCREEN-LOCK FUNCTION. This feature get for cybercriminals. Some security experts estimate rics. The news that Apple is buying fingerprint locks the smartphone after it’s been sitting inactive for a that as many as one-third of all Android apps contain sensor specialist AuthenTec further supports the some form of malware. Apple’s iOS and Microsoft’s period of time, and it requires the user to enter a pass- evidence for this exciting trend.” Windows Phone 7 OS have better track records to date. word or PIN to unlock it. This is one of the easiest func- Analysts viewed Apple's acquisition of tions to set up and it can prevent people from easily DOWNLOAD APPS FROM REPUTABLE SOURCES. It is safer AuthenTec as a way for the computer and cell- accessing personal data if the phone is lost or stolen. In to use application marketplaces provided by the carrier phone maker to equip its iPhone with new securi- virtually every mobile OS, the screen-lock option is or phone vendor than to download apps directly from ty technology as it pushes to take the lead in the found within the settings menu in a Security or Lock the web. Some sites have hosted repackaged versions of fast-growing mobile-payments market. submenu. popular mobile apps—such as Google Maps—that Goode Intelligence predicts that mobile bio- include spyware. Malware and spyware can still sneak DOWNLOAD A REMOTE LOCATION/LOCK/WIPE APPLICA- metric security “will become a standard feature in in to marketplaces, however, so be careful — especially TION. These apps can remotely locate, lock or wipe a SMDs as these devices become the prime comput- with applications from unknown developers that have phone if it is lost or stolen. Remote location will provide er in both our personal and business life.” The the approximate location of a lost or misplaced phone. poor ratings or low download numbers. firm says market adoption will be fueled by three Remote locking ensures that anyone who finds or steals TURN OFF WI-FI AND BLUETOOTH WHEN NOT NEED- key factors: the phone won’t be able to access anything inside with- ED. Wi-Fi hotspots and Bluetooth create avenues for out the proper PIN or password. In a worst-case sce- public attacks. Turning off these features not only 1. SMDs are now the personal device of nario in which recovery of the phone becomes unlikely, improves safety but conserves battery life. When choice, with sales outpacing PCs. The Bring Your remote wiping clears all the data so private information Bluetooth is used, make sure it is in “non-discoverable” Own Device (BYOD) trend is accelerating the won’t fall into the wrong hands. Some applications also mode. When using Wi-Fi, try to use an encrypted net- need for enhanced security as SMDs are being allow remote wiping of the Secure Digital (SD) card, work or VPN to prevent hackers from “sniffing” data used to access and store sensitive private and too. out of the air. business information.

BACK UP DATA. This can be done either with a prod- KEEP THE OS UP TO DATE. As with a computer, a 2. SMDs currently relay on last-century tech- uct or application, a cloud service or simply by copying phone’s operating system must be kept up to date. nology to protect devices and provide authentica- contacts, documents, pictures and personal information Although updates sometimes include features that may tion and identity verification services for apps and to your computer. seem unnecessary, it is still a good idea to install them network-based services.

WRITE DOWN THE DEVICE'S IMEI NUMBER. The because they typically include security patches or 3. SMDs with biometric security features International Mobile Equipment Identity (IMEI) is a improvements. allow a number of opportunities, including next- unique number used to identify mobile phones. Carriers DON’T “JAILBREAK” THE PHONE. Jailbreaking means generation identification and authentication tech- can use this number to prevent network access if the breaking open the phone’s file system to allow modifi- nology that supports mobile users and does not device is stolen. The 15-digit IMEI number can be found cations. Although doing so enables access to unofficial rely on expensive specialist hardware, such as inside the battery compartment of the smartphone, or apps and more features, it can also bypass many securi- tokens and smartcards. by simply dialing *#06# on the keypad. ty features.

September/October 2012 www.emtecinc.com 9 SMB Cloud Usage Surging SMBs Buying More Tablets, Fewer Laptops he tablet PC is increasingly the computing device of choice among employ- Microsoft research finds that cloud computing ees of U.S. small to midsize businesses (SMBs), leading the market segment is leveling the playing field for small to midsize T to purchase fewer laptops and desktop computers, according to a new sur- vey of more 400 SMBs conducted by the wireless and mobile market strategy firm businesses, and actually provides greater security. iGR.

icrosoft Corp. mobile devices for more than email, Employees at approximately 52 percent of U.S. SMBs currently own and use recently released including productivity and business tablet devices, according to the survey. In addition, 24 percent of SMBs surveyed new research pre- apps. say they supply tablet devices to employees as part of an official corporate poli- dicting a significant Only about 20 percent of SMBs cy, and 26 percent indicated that their company would be buying fewer or far increase in paid believe that data is less secure in the fewer laptops as a result of their tablet purchases in 2012. cloudM services over the next five years cloud than it is in their on-premise sys- among small to midsize businesses “The enterprise arena in particular is one area in which tablets are anticipat- tems. Thirty-six percent overall and 49 (SMBs). The research conducted by Edge ed to climb. There has been significant press generated by large corporations that percent of larger SMBs actually think Strategies includes survey responses are using tablet devices to improve, augment or replace existing business process- that data is as secure in the cloud as in from IT decision-makers or influencers es and practices,” said Iain Gillott, president and founder of iGR. “But as our new their own systems. at more than 3,000 SMBs in 13 coun- research clearly shows, tablets are in wide use in small and medium-sized busi- tries. According to survey results, paid Cloud Security Benefits nesses as well. Given that tablets are negatively impacting laptop purchases, this cloud services are expected to double in trend looks to continue.” five years, while the number of the In fact, a separate study conducted world’s smallest companies using at least by Microsoft’s Trustworthy Computing one paid cloud service will triple in the group shows that SMBs are gaining sig- next three years. nificant IT security benefits from using Analyst Forecasts Tech Market Growth “Gone are the days of large enter- the cloud. The study shows that 35 per- rejuvenated U.S. technology market is projected to grow by 7.5 percent prises holding the keys to enterprise- cent of U.S. companies surveyed have this year and 8.3 percent in 2013, fueled primarily by a shift from com- class IT and services,” said Marco experienced noticeably higher levels of A puter equipment spending to software purchases, according to tech mar- Limena, vice president, Operator security since moving to the cloud. In ket analysts at Forrester Research. Channels, Microsoft. “The cloud levels addition, 32 percent say they spend less Forrester says software growth will occur across all categories, but Software- the playing field for SMBs, helping them time worrying about the threat of cyber- compete in today’s quickly changing attacks. as-a-Service (SaaS) applications, general business intelligence products and spe- business environment by spending less SMBs using the cloud also spend 32 cialized analytical tools will have the strongest growth. These products will help time and money on IT and more time percent less time each week managing push total software sales growth up to 11.4 percent in 2012 and 12 percent in focused on their most important priority 2013. — growing their businesses.” security than companies not using the cloud. They are also five times more like- Computer equipment purchases will slow to 4.5 percent growth this year. More Options, ly to have reduced what they spend on Forrester says the lingering effects of Thailand's 2011 floods continue to hurt Fewer Concerns managing security as a percentage of parts supply, and the prospect of Windows 8 will dampen PC sales until later in overall IT budget. Cloud computing is able to deliver the year. However, the firm expects Apple Macs and iPad tablets to post strong “There’s a perception that security is more of what SMBs need — cheaper growth in the corporate market, with “mid-single-digit” growth for servers and operations and faster, better fusion of a barrier to cloud adoption,” said storage. vital information to virtually any device. Adrienne Hall, general manager, In fact, the research finds 59 percent of Microsoft Trustworthy Computing. “Yet companies currently using cloud services when companies embrace and invest in Hacking Tool Disguised as Power Strip report significant productivity benefits cloud services, they find the benefits far from information technology, compared outweigh previous concerns.” recently developed piece of hardware resembling a power strip or surge with just 30 percent of SMBs not yet Time and money spent managing protector is actually a sophisticated network-snooping device that can using the cloud. security prior to using cloud services is A launch remotely activated attacks to identify network weaknesses. Moreover, despite a sluggish global being reinvested by SMBs to grow their The Power Pwn looks and works like a surge-protecting power strip with economy, 63 percent of SMBs using businesses and be more competitive. Of eight functional 120 volt outlets. But it is also a Linux-based computer loaded cloud services today expect to grow in SMBs that use the cloud, 41 percent said sales in the next 12 to 18 months while with hacking software, including high-gain Wi-Fi and Bluetooth antennas as well they were able to employ more staff in 55 percent believe technology will power roles that directly benefit sales or busi- as dual Ethernet ports. There's also an external 3G/GSM adapter that allows it to their growth. SMBs worldwide are ness growth, 39 percent invest in more use cellular wireless networks. It can be preconfigured using a Web interface, and embracing cloud services to reap those product development or innovation, and then casually swapped for the power strip on any computer on the network. benefits and stay ahead of competitors. 37 percent experienced improved agility Fifty percent of SMBs say cloud comput- Once in place, an attacker/penetration tester can communicate with the ing is going to become more important and competitiveness. device via text message, sending command-line input via SMS, and establish an for their operations, and 58 percent More than half of those surveyed SSH secure shell session. It can then detect and launch attacks on any detected (52 percent) said using the cloud enabled believe working in the cloud can make wired or wireless network or Bluetooth device. companies more competitive. them to add new products and services The $1,295 device was created by Pwnie Express, a Vermont-based startup SMBs’ appetites for the cloud are that benefit their business more quickly specializing in the creation penetration testing products. The device was devel- only growing as they add more devices and securely. Of those surveyed, 42 per- and services — and as their concerns cent said the cloud made it easier for oped with money from a new DARPA (Defense Advanced Research Projects about the cloud wane. Mobility is essen- them to scale their business to explore Agency) program called Cyber Fast Track, which is trying to jumpstart a new gen- tial to current cloud users. They want new markets. eration of cyber-defense tools.

10 www.emtecinc.com The Adviser Navigate the crossroads of IT Service Management KEY FEATURES

» Remote hosted service, powered by with BMC Remedy OnDemand industry-leading BMC Remedy ITSM technology IT Service Management is the intersection of business and technology strategy with » BMC handles ongoing administration, planning and operations to ensure that IT is focused on delivering business value. backup, and maintenance of the software and related infrastructure BMC Remedy OnDemand is a new SaaS-based offering that gives your organization

» You purchase the software capability, access to all the benefits of BMC’s industry-leading IT service management solutions not a software license — without the costs and overhead associated with hosting and managing on-premises

» Subscription-based, “pay-as-you-go” software. Using BMC Remedy OnDemand, you can phase in IT service management pricing quickly and incrementally, beginning with one region or process and including others » Architected with the BMC Atrium as needed. Implementation times are greatly accelerated through an established on- CMDB for centralized IT management boarding methodology and pre-configured data that reflects BMC’s ITIL-aligned, best- » Ongoing administration, backup, and practice process models based on hundreds of successful implementations.This maintenance handled by BMC allows you to begin receiving a return on your BMC investment as soon as possible. » Best-in-class consolidated service desk with ITIL and other best practices built-in

» Trusted configuration data and service maps For more information, please contact Deanna Evers » At-a-glance analytics that reflect how effectively IT is supporting critical 800-800-8894 x127897 business applications and services [email protected] » Alignment of the IT service WWW.EMTECINC.COM management lifecycle to your business requirements

» ITSM data migration — moves data from your current BMC Remedy or third-party applications to your new BMC Remedy ITSM On Demand solution

© 2012 BMC Software, Inc. All rights reserved. BMC-01

September/October 2012 www.emtecinc.com 11 BI at the ‘Speed of Thought’ In-memory analytics puts turbocharged data access and analysis in the hands of business users.

n the age of “big data,” organiza- ry analytics, however, the queries and for more than a decade both Gartner and memory analysis allows business analysts tions are struggling to access, ana- data reside in a server’s random access the Data Warehouse Institute have and line-of-business managers to build lyze and gain insight from soaring memory (RAM). This approach dramat- ranked poor query performance as the their own reports and dashboards with quantities of data in both transac- ically increases speed, performance and No. 1 cause of BI project failure. very little training or technical expertise. tional and analytic applications, reliability when querying data. Faster query response times have As a result, the value of data is shifted asI well as new kinds of data from the Some software vendors pioneered in- implications in almost any industry. from those who manage the data to the web. However, a relatively new business memory processing as much as 10 years Retail organizations can afford to do stakeholders who use it. intelligence methodology called in-mem- ago, but the technology met with limited real-time point-of-sale analysis for inven- “Business users want meaningful ory analytics is enabling business users to success until the growth and adoption of tory and margin optimization. insights, not data,” said Vesset. “They explore this data at previously unheard- 64-bit architectures, which can handle Telecommunication companies can want to see the most relevant informa- of speeds — what some industry experts more memory and larger files than 32-bit respond more quickly to the network tion to the business event at hand, as well are calling “the speed of thought.” machines. Another factor helping to capacity demands with faster analysis of as the capabilities to socialize the mean- “Big data” is a term used to describe boost in-memory BI is the fact that RAM call detail records to improve quality of ing of the data. The ability to ‘place data’ the massive amount of data produced by has become incredibly inexpensive. service. Financial institutions can draw within a specific scenario is what quickly a new generation of systems and applica- Having data and queries stored more insight from data about customers, enables organizations to pinpoint what’s tions. These are datasets so large that directly in memory relieves a number of financial markets and world events to important and what should be acted they have transcended the ability of typi- traditional BI bottlenecks. It eliminates better evaluate risks. upon.” cal database software tools to capture, the need for database optimization tasks “The speed of in-memory architec- This is why CIOs say that business store, manage and analyze. Although the such as creating indexes, aggregating ture offers tremendous benefits. analytics will be their top strategic tech- definition is necessarily subjective, most data and designing the multidimensional Organizations can explore huge data vol- nology investment over the next few analysts use the term in reference to ter- cube and star schemas typically associat- umes and get answers to critical ques- years — even ahead of more headline- abytes, exabytes or even zettabytes of ed with online analytical processing tions in near-real time,” said Dan Vesset, grabbing technologies such as cloud data. (OLAP). Since information doesn’t have program vice president of IDC's business computing and virtualization. IDC fore- Most organizations are ill-equipped to be retrieved from a database, internal analytics research. “Businesses today casts 7.2 percent compound annual to glean insight from all this information. optimization algorithms are simpler and must base decisions on insight gleaned growth of business analytics worldwide In a recent Aberdeen study, 53 percent of execute fewer CPU instructions. And from data, and that process needs to be for the next five years. organizations said they don’t get - accessing data in memory reduces the I/O close to instantaneous.” mation fast enough and 47 percent said “Analytics are more critical than ever reading activity when querying the data. to making successful business decisions too much data is inaccessible and under- Self-Service BI used within the organization. and achieving maximum performance Picking up Speed from business operations,” said Vesset. “With increasing reliance on data to The combination of increased speed understand business processes, enterpris- By removing these bottlenecks, in- and reduced complexity deliver what “We’re seeing increasing evidence that es are quickly learning that measuring memory BI provides virtually instant may be in-memory processing’s most sig- organizational performance and compet- and retaining data on all aspects of the query response times. Analytic queries nificant benefit — the potential for a itiveness can benefit from better and enterprise over all relevant periods of that once took minutes to process can be fully self-service BI infrastructure. By more business analytics, which is why the time is extremely challenging, even with completed in milliseconds. Such speed is eliminating the need to understand how analytics industry is poised to continue today's IT capacities,” said Tom particularly significant given the fact that to aggregate data and build schemas, in- its rapid growth in the years to come.” DeGarmo, principal and Technology Consulting Leader at PricewaterhouseCoopers (PwC). “Smart enterprises have adopted the science of advanced analytics to target the most ‘Substantial’ Mobile BI Growth Expected important determinants of business suc- cess, which is often customer informa- s much as one-third of all business intelligence (BI) 277 companies using BI found that employee usage of BI tion. Leading organizations around the functionality will be consumed through mobile systems doubled with the introduction of mobile BI. world are establishing a new culture of A devices by next year, and the number of BI users A recent survey by open-source BI vendor Jaspersoft inquiry, where decisions are driven by will increase substantially to include a more mainstream indicates pent-up demand for mobile BI. Ninety-three per- analytical precision that rivals scientific audience, according to Gartner. cent of the survey’s 500 respondents said they believe there insight.” are advantages to accessing BI tools on mobile devices. Two- To date, mobile BI has largely consisted of existing thirds said their organizations have already deployed a Off the Disk reports and dashboards ported to mobile devices, but mobile BI solution or have concrete plans to do so. Forty- In-memory analytics belongs to a Gartner predicts that organizations and vendors will soon three percent said their organizations are already develop- class of advanced analytic methods — develop mobile analytic applications for specific tasks or ing their own mobile BI applications. what PwC calls the “third wave” of busi- domains. “With more decision-makers working beyond the office ness analytics — with the ability to An Aberdeen research report — “Mobile BI: Actionable process and analyze large data sets hun- walls, supported by the proliferation of mobile devices such Intelligence for the Agile Enterprise” — found that compa- dreds of times faster than traditional as tablets and smartphones, mobile BI is increasingly impor- business intelligence (BI) applications. nies with mobile BI can make critical business decisions six tant for management teams to analyze key information - BI solutions are typically disk-based, times faster than organizations without a mobile platform essary for decision-making,” said Jim Bell, chief marketing meaning the application queries data for reporting and analytics. A recent Aberdeen survey of officer, Jaspersoft. stored on physical disks. With in-memo-

12 www.emtecinc.com The Adviser HP is changing the rules of networking with a full portfolio of high-performance, standards- based products, solutions, and services. These offerings are secure, energy-efficient, cost- saving, and developed specifically to simplify the complexities of networking for all customers, from the largest enterprise to the smallest emerging business.

Contact your Emtec representative to learn more.

For more information, please contact Deanna Evers 800-800-8894 x127897 [email protected]

© Copyright 2012 Hewlett-Packard Development Company, L.P. HP-203 WWW.EMTECINC.COM

September/October 2012 www.emtecinc.com 13 Virtual Work, Real IT Challenges As virtual working becomes more prevalent, organizations need to ensure they have the right tools and processes to support remote employees.

irtual working has become the reality of business today. The number of vir- Telework: The Mother of All Perks? tual workers — including Workers confess they would be willing to forgo certain telecommuters and mobile other job perks for the opportunity to work remotely. Vpersonnel — continues to increase dra- Nearly 80 percent of workers surveyed by Wrike would matically, as employees take advantage of sacrifice employer-provided free meals and 54 percent ubiquitous connectivity to free them- would give up their employer-paid cell phone plans. selves from the confines of headquarters. Perhaps even more astounding, 31 percent would A recent survey commissioned by accept a reduction in paid vacation, and one- Wrike, a social project management plat- fourth would even accept a salary reduction. form provider, found that 83 percent of respondents are already spending at least a few hours each week working outside the office. Two-thirds say they expect their offices to go fully virtual within the next few years. More than 43 percent said they now work remotely more than they did just two or three years ago. The growth has been the most significant among executives: one-half of these respondents say they spend more time working outside the office. Virtual working offers numerous benefits, including increased job satisfac- tion for employees and access to a larger talent pool for employers — 89 percent of survey respondents rated the opportu- nity to work remotely as an important ready to support them. Of course remote ing. Easy-to-use conferencing solutions center where they can be accessed by var- fringe benefit. Time savings, increased workers need a PC or laptop and a reli- support spontaneous, ad-hoc meetings ious devices or streamed to a PC for productivity and the opportunity to able Internet connection. But they will among geographically dispersed teams, offline use. Application virtualization focus on work rather than becoming dis- also need strong collaboration tools and boosting productivity, cutting costs and makes it possible for remote workers to tracted by office politics emerged as the trusted access to applications and data. enabling faster decisions. access legacy applications that aren’t top three benefits workers appreciate in In addition, the organization needs to The unified communications solu- web-based. Best of all, remote workers remote collaboration. ensure that it has enough bandwidth to tion should also enable instant messaging get the same performance as in-house support remote users, strong security and However, organizations need to for rapid communications with team users, even with bandwidth-intensive solid help desk support. ensure that remote employees have the IT members and other coworkers. Instant applications. tools they need, and that IT teams are messaging is a subset of so-called “pres- Of course, web- and cloud-based Supporting Collaboration ence” technology, which enables workers applications can be accessed by any Without the right collaboration to see who is available and the best way employee with an Internet connection. to communicate with them. Presence This copy of the Adviser was provided by tools, virtual workers can feel isolated. Single sign-on solutions can make it easi- Emtec Inc. To receive your FREE subscrip- Thirty-seven percent of survey respon- eliminates phone tag and enables remote er for remote workers to access these tion, sign up online at dents said a lack of direct communica- workers to collaborate seamlessly — an resources and also improve security. www.emtecinc.com/adviser. tion is the biggest obstacle to efficient instant message can become a phone call Whatever the solution, it must be remote collaboration. Other challenges which can become a video conference easy to use and reliable. In addition, help with just a few clicks. Copyright © 2012 CMS Special Interest include hindered data accessibility (21 desk personnel should be trained in sup- Publications. All rights reserved. percent) and poor visibility into col- porting teleworkers. Remote employees leagues’ activities (19 percent). Enabling Access Editorial Correspondence: should not have to troubleshoot IT prob- 7360 E. 38th Street, Tulsa, OK 74145 Unified communications solutions Virtual workers also need access to lems in order to do their jobs. Phone (800) 726-7667 • Fax (918) 270- enable remote workers to use the compa- applications and data. A virtual private The results of the Wrike survey 7134 ny phone and conferencing systems as if network coupled with remote desktop underscore the growing demand for vir- Some parts of this publication may be they were in the office. Calls can be for- protocol can enable remote workers to tual work capabilities — whether reprinted or reproduced in nonprofit or warded to the worker’s home or cell access their work PCs. However, this may employees are on the road or working internal-use publications with advance writ- phone, or a PC-based softphone utilized not be the ideal solution for employees from home — across both small and ten permission. to serve as the worker’s extension. Voice who only work remotely. A virtual desk- large enterprises. Given the prominent mail can be managed through an email top solution stores the user’s desktop on The Adviser is published by CMS Special role virtual work is expected to play in Interest Publications. Printed in the U.S.A. client. a server in the data center so that it can the future of business, organizations Product names may be trademarks of their Video and web conferencing bring be accessed from a wide range of devices. should begin planning now to ensure that respective companies. remote workers together for face-to-face With application virtualization, remote employees have the IT tools they communication and allow content shar- applications are centralized in the data need.

14 www.emtecinc.com The Adviser Transform Desktop Management. Energize Users.

Deliver rich, personalized virtual desktops as a managed service from a virtualization platform built to deliver the entire desktop, including the operating system, applications and data. With VMware View, desktop administrators virtualize the operating system, applications, and user data and deliver modern desktops to end-users. Get centralized automated management of these components for increased control and cost savings. Improve business agility while providing a flexible high performance desktop experience for end-users, across a variety of network conditions.

Contact Emtec today for more information about VMware View and desktop virtualization.

For more information, please contact Deanna Evers 800-800-8894 x127897 [email protected] WWW.EMTECINC.COM

Copyright © 2012 VMware, Inc. All rights reserved. VMW-22

September/October 2012 www.emtecinc.com 15 Business & Technology Empowered

Consulting Services • IT Strategy & Planning • Business Transformation • Process Improvement & Governance • Technology Selection and Architecture • BI Consulting • Project Management Packaged Application Services • PMO • PM&A • ERP • CRM • HCM Cloud Technologies • Strategy & Planning The right size with extensive delivery capabilities – big enough to • Development & Technology address market needs, small enough to care • Applications At Emtec we are the right size to meet client needs. Our global delivery centers, IT solution strength, and empathetic approach ensures a mix of Application Development capability, creativity and attention that delivers results. and Managed Services Localized expert pool with relevant experience enables rapid, meaningful • Custom Development impact • Testing Services Our rewarding culture results in highly committed, experienced, and • Managed Services motivated associates who have seen, and solved, client problems before. • IT Staffing “Client for life” approach built upon 45+ years of delivering to client Infrastructure Services success • ITSM We deliver on our commitments. Our rich legacy and multi-decade client relationships demonstrate our aspiration to continuously deliver value and • Data Center grow alongside our clients and their needs. • Business Application Infrastructure True management engagement ensures flexibility and alignment • End User Computing Platforms True engagement with management is a core value. Our clients’ ability to access decision makers at all levels ensures the necessary flexibility and critical alignment to make projects successful.

For more information, please contact Deanna Evers 800-800-8894 x127897 [email protected] WWW.EMTECINC.COM