The term "individual contributor" covers a lot of ground -- from brain surgeon to the shipping and receiving clerk at your local Wal-Mart. I'm not sure which of these two is a better fit for a virtual desktop, or which one has a Mac at home, but I do know that the individual contributors who spent their own money on technology last year to do their jobs, shelled out $1,252.60 on hardware alone, and another $556.90 on software. That's a heap o' cash.
When we asked them why they spent the money, 42% said it was something they use in their personal lives that they wanted to use for work. Another 27% said their own equipment is better than what their companies provide (presumably CT scanners, portable defibrillators and Sony PSPs can be ruled out). How do their companies feel about them using their own devices and software? 48% said their firms would either not approve, or make them stop using it.
Of course we know the usual reasons why: Security and company policy, and the "benefits" of centralized IT and shared services, among others. I don't know about you, but I always found "shared services" to be a bit of a sham. You know how it works: the VP with the biggest, high-profile project gets all of the services, and the rest of the plebes get to "share" the table scraps. Want a copy of Microsoft Project or a new laptop for that customer service rep who starts next week? Sorry…Steve's program is using all of the Project licenses, and all we have left in the closet is Pentium II desktops…but they have ergonomic keyboards!
On the night of his 18th birthday, Gregg Allman drew a bull's-eye on his shoe, then shot himself in the foot to avoid the draft. If next week, Forrester's IT department declared that I should be expecting a box with a thin client PC at my desk, and I would be expected to use it instead of my MacBook Air for work, I'd be drawing a bull's-eye but not on my shoe. It would be on the box.
I suspect most road warriors and office workers alike would feel the same way. Ever try to go to a meeting in a conference room with a thin client? It's bolted to your desk. As long as all of the information you ever need for meetings is crammed between your eustachian tubes, you're good to go. If however you're like the rest of us, there are benefits to taking your computer (and applications and data) with you, like showing more than one other person what you've been working on.
That's where client virtualization (as opposed to simply VDI) comes in, and it's in this context that Dell's acquisition of Wyse makes some sense. Wyse makes thin and zero clients, as most of us hopefully know, and surely not by pure coincidence…so does HP. But thin clients as a standalone tool for most of us, is a non-starter. But as part of a mosaic of virtualization technologies that taken together offer me my work environment no matter where I am, have potential.
The misinformation and rhetoric surrounding the recent discovery of the Flashback trojan for Macs is vehement, and says more about the historically stable state of Mac security, and the irrational way many think about it than it reveals about its weaknesses. Even long-time industry observers, who should know better, are jumping into the fray to say: See! I told you so! The Mac is vulnerable! Well…duh…that's not exactly news, folks.
Of course the Mac is vulnerable. EVERY internet connected device is vulnerable. What matters is probability, frequency and potential impact. So the correct question then, is whether or not your prevention, detection and recovery mechanisms are effective. For example, I'm not convinced that traditional anti-virus approaches are right for the Mac. The track record of these tools in the Windows world is abysmal in my view. They're among the most intrusive technologies to the user - hogging system resources and making even basic tasks impossible as they inspect every file, every day, often several times a day. And…they're reactive. Think: death by a thousand papercuts over a period of years, only to be interrupted by a rare strain of encephalitis, followed by a partial lobotomy and organ transplant to get the patient breathing again, and you're in the ballpark. Application whitelisting will hopefully come to be seen as a better approach.