Powering SMB

Unveiling the Power of IGEL and Parallels RAS in End-User Computing

XenTegra ONE Episode 4

Use Left/Right to seek, Home/End to jump to start or end. Hold shift to jump forward or backward.

0:00 | 56:46

In this insightful episode, host Sean Washington takes listeners on a deep dive into the cutting-edge of technology with a keen focus on end-user computing. Joined by industry experts Ray Anderson, a solution architect at XenTegra specializing in user computing, and Jason Hendron, an engineer from IGEL, this episode sheds light on how small and medium-sized businesses can leverage the latest technological advancements to streamline operations and enhance user experiences.

This episode references a significant press release from IGEL about their latest platform version 12, which notably includes support for Parallels RAS. This pivot introduces a dynamic discussion around the importance of keeping abreast with technology, the impact of new software releases on SMBs, and the future of end-user computing as a pivotal area for business innovation.

Whether you're a tech aficionado, a small business owner looking to upgrade your technology stack, or an IT professional keen on the latest trends in end-user computing, this episode promises valuable insights, expert commentary, and a peek into what the future holds for technology in the SMB sector. Tune in to "Powering SMB" for a comprehensive exploration of how technology continues to shape the business landscape.

WEBVTT

1
00:00:07.660 --> 00:00:13.170
Sean Washington: Alright. Good morning. Good afternoon, everybody, Shawn Washington with with powering the Smb.

2
00:00:14.484 --> 00:00:22.499
Sean Washington: Today we are joined by a little bit little group of folks today. All around the technology and the end user compute world.

3
00:00:22.660 --> 00:00:29.870
Sean Washington: We got Ray Anderson is one of our solution architects and specializes in user computing at XenTegra.

4
00:00:30.220 --> 00:00:33.280
Sean Washington: and also joining, is Jason Hendren.

5
00:00:33.430 --> 00:00:39.439
Sean Washington: who is a an engineer from IGEL, who's one of our partners that helps power.

6
00:00:40.588 --> 00:00:41.940
Sean Washington: Our end user compute.

7
00:00:42.570 --> 00:00:51.649
Sean Washington: So our formats could be a little bit different. Today we're not going to do a a blog review. We are going to reference a blog that was more of a press release

8
00:00:51.970 --> 00:00:53.023
Sean Washington: with a

9
00:00:53.890 --> 00:01:01.129
Sean Washington: when I gel announced on their latest version their platform version 12, that they are supporting parallels. Raz

10
00:01:02.187 --> 00:01:06.569
Sean Washington: just want to remind everybody to take it off mute. We will be asking you to chat.

11
00:01:08.740 --> 00:01:16.549
Sean Washington: Cs, thanks for joining us. Wanted to start with just a couple comments, because I don't know if our audience is going to be a hundred percent

12
00:01:17.000 --> 00:01:38.749
Sean Washington: familiar with IGEL and all these different end user compute technologies. So I gel, for the most part, is what I like to call a 0 trust operating system. So run it on your local machines to facilitate a virtual desktop or virtual applications, or secure web browsers. Whatever it might be, or combination of all of those.

13
00:01:41.170 --> 00:01:43.500
Sean Washington: so this was the press release.

14
00:01:43.840 --> 00:01:48.830
Sean Washington: Quote from Jim Erdo, senior vice President of alliances that I gel

15
00:01:48.850 --> 00:01:56.939
Sean Washington: together igl OS and parallels raz a comprehensive and secure virtualization endpoint management solution

16
00:01:57.060 --> 00:02:12.619
Sean Washington: by making parallels raz available via the igl app portal we are enabling our customers to benefit from a full power of parallels, raz to support a hybrid work environment with the cloud direct download efficiency.

17
00:02:13.450 --> 00:02:14.380
Sean Washington: So

18
00:02:14.700 --> 00:02:21.869
Sean Washington: that's a that's a lot of words. And if you're not a person that's familiar with this that's going to be relatively confusing.

19
00:02:23.790 --> 00:02:31.999
Sean Washington: So I kind of wanted to start with this. And you know, I I'm gonna just be devil's advocate here and create this virtual

20
00:02:32.500 --> 00:02:34.010
Sean Washington: a conversation.

21
00:02:34.510 --> 00:02:39.230
Sean Washington: I'm the guy that doesn't know anything about the bits and bytes. I am not an engineer.

22
00:02:39.280 --> 00:02:43.240
Sean Washington: but what we got here joining us are 3 absolute experts.

23
00:02:43.840 --> 00:02:52.249
Sean Washington: So I go. I go back to the the concept of what a 0 trust operating system is. This would be the IGEL software.

24
00:02:52.998 --> 00:02:56.980
Sean Washington: Anyone want to maybe take a stab at explaining that

25
00:02:57.140 --> 00:02:58.620
Sean Washington: to our audience.

26
00:02:59.850 --> 00:03:04.602
Mark Vincent: I'm gonna take a guess and say that Jason can probably give us the best ideal

27
00:03:04.910 --> 00:03:06.430
Mark Vincent: elevator pitch

28
00:03:06.460 --> 00:03:07.680
Mark Vincent: out of the group.

29
00:03:08.410 --> 00:03:11.479
Jason Hendren: Well, thanks. So, yeah, I mean.

30
00:03:11.480 --> 00:03:12.809
Mark Vincent: I'm gonna set you up there.

31
00:03:13.106 --> 00:03:34.770
Jason Hendren: No, I just say, you know a secure read only Linux operating system. So we've moved to more to a more modular approach where the base OS itself is in is an application, and we only install what you need. So we've got the base operating system being read only, and then in this case, with parallels, raz an application through our portal, which you install

32
00:03:35.177 --> 00:03:44.570
Jason Hendren: you know, to give access to your parallel trouse environment. So it makes it really, really small as far as the footprint is concerned. And secure.

33
00:03:45.930 --> 00:03:53.209
Ray Anderson: Yeah. And if I can add there, sorry. Sorry, Shawn, if I can add there, Jason, that's wonderful what I've always liked about.

34
00:03:53.260 --> 00:03:56.210
Ray Anderson: I the igl solution is

35
00:03:56.300 --> 00:04:04.199
Ray Anderson: the fact that if we take a look at the traditional way with that we deliver our applications to our end users.

36
00:04:04.712 --> 00:04:12.069
Ray Anderson: They're including third party contractors. We might do business with. That has been a windows operating system.

37
00:04:12.160 --> 00:04:24.460
Ray Anderson: and, as we all know, that windows operating system comes with, you know a lot of overhead on the management side, then administration side, but also a lot of security risk to be aware of.

38
00:04:24.780 --> 00:04:47.160
Ray Anderson: And so what I've always liked about starting a 30,000 foot view. And and I'm gonna bring us down, really, starting with the the ideal operating system. As you were mentioning, Jason being a read only operating system. What does that mean? A Linux read only operating system. And I've had various folks ask me, what exactly does that mean and what that. Go ahead, Shawn.

39
00:04:47.560 --> 00:04:50.490
Sean Washington: Oh, I finish your thought, but I wanted to interject when you were done.

40
00:04:50.870 --> 00:05:03.610
Ray Anderson: For sure. So what that means is, you know, it's truly it's truly read only and secure, because the end user has no access to the underlying Linux file system.

41
00:05:03.940 --> 00:05:12.350
Ray Anderson: So again, a a additionally, what that means is there's an opportunity to install applications, make changes.

42
00:05:12.712 --> 00:05:19.410
Ray Anderson: That the user could traditionally do on a windows endpoint. So that's what I found very powerful about the

43
00:05:19.460 --> 00:05:31.570
Ray Anderson: the Ij operating system solution, as well as you know. Hey? If if I have made an investment in a virtualization solution such as Vera parallels.

44
00:05:31.630 --> 00:05:37.859
Ray Anderson: you know Citrix, vmware, and the list goes on and on. Why is it that I need to

45
00:05:38.340 --> 00:05:41.340
Ray Anderson: provide a full blown windows desktop

46
00:05:41.420 --> 00:05:44.300
Ray Anderson: on either a laptop or a desktop.

47
00:05:44.330 --> 00:05:53.720
Ray Anderson: Even a thin client in some cases right? It just some folks agree that that just doesn't make sense, especially nowadays. And so with ideal.

48
00:05:53.770 --> 00:06:01.510
Ray Anderson: you know, you you guys provide that, hey? All I need is the parallels client and the settings

49
00:06:01.880 --> 00:06:06.449
Ray Anderson: in the operating system, and from a centralized management console

50
00:06:06.510 --> 00:06:17.709
Ray Anderson: it, can quickly configure and immediately turn on that client within the OS. On the endpoint that is very, very compelling and attractive versus.

51
00:06:17.740 --> 00:06:20.959
Ray Anderson: you know the incumbent or the traditional desktop

52
00:06:21.440 --> 00:06:21.940
Ray Anderson: absolutely.

53
00:06:21.940 --> 00:06:23.390
Jason Hendren: Absolutely 100%.

54
00:06:23.390 --> 00:06:28.870
Sean Washington: I wanted to take 1 one step backwards, just for a second guys we may have gotten ahead of ourselves a little bit.

55
00:06:29.020 --> 00:06:38.969
Sean Washington: So we we're we're talking heavily about igl. So igl is the operating system that is a facilitator of end user compute or virtual desktops or applications.

56
00:06:39.150 --> 00:06:42.900
Sean Washington: The other component of our conversation is parallels.

57
00:06:43.525 --> 00:06:48.739
Sean Washington: So if you're not familiar, parallels is a company that's very well known for being a

58
00:06:48.930 --> 00:06:51.819
Sean Washington: Mac Desktop virtualization. So you can run windows on a Mac.

59
00:06:52.280 --> 00:06:58.800
Sean Washington: But what a lot of people don't know is that they have a full enterprise play to deliver virtual apps and desktops.

60
00:06:58.980 --> 00:07:04.579
Sean Washington: a type of solution that is very similar to Citrix or vmware horizon

61
00:07:04.900 --> 00:07:12.139
Sean Washington: things that play in that model. We love the solution. We have found that it is particularly good with the Smb.

62
00:07:12.596 --> 00:07:17.103
Sean Washington: Because it bundles in a lot of different values in a single

63
00:07:17.670 --> 00:07:24.870
Sean Washington: an affordable license that caters really to the Smb. But still delivers the enterprise, features and security, etc.

64
00:07:25.240 --> 00:07:34.080
Sean Washington: And and even before I do get in there, I mean, this is powering. Smb. This is a conversation that is catered to a small and medium sized business audience.

65
00:07:34.570 --> 00:07:47.629
Sean Washington: There's 2 different parts of XenTegra. So Zentagra works with a lot of enterprise accounts. When you work with the enterprise accounts, they have it directors that have very specific strategy. Then they go out. They evaluate a million different vendors

66
00:07:47.670 --> 00:07:50.089
Sean Washington: to power their business right?

67
00:07:50.480 --> 00:08:02.029
Sean Washington: When we engage with our small and medium sized business customers, it's a different conversation, because we're either working with a single it person, or we are working with folks that are starting up a business.

68
00:08:02.110 --> 00:08:05.239
Sean Washington: You know their their directors of operations, or Ceos.

69
00:08:05.280 --> 00:08:10.169
Sean Washington: and they're turning to us, and we have a conversation about them. What a modern workforce looks like.

70
00:08:10.310 --> 00:08:15.739
Sean Washington: They wanna say modern workforce. I'm saying, you know, you're in the office. You're also hybrid work from home.

71
00:08:15.880 --> 00:08:20.540
Sean Washington: or vice versa, or a combination of all. And what kind of tools you need

72
00:08:20.630 --> 00:08:22.320
Sean Washington: to effectively

73
00:08:22.560 --> 00:08:25.810
Sean Washington: secure your data to secure your property

74
00:08:26.000 --> 00:08:37.869
Sean Washington: etc, etc. And these are the types of tools like 0 trust identity management cyber security tools, etc, etc, and igl and parallels play.

75
00:08:38.059 --> 00:08:41.079
Sean Washington: you know, right hand in hand, in delivering that

76
00:08:41.712 --> 00:08:44.610
Sean Washington: and kind of checking a lot of those boxes.

77
00:08:45.054 --> 00:08:47.719
Mark Vincent: Can, I interject. There, I think

78
00:08:48.020 --> 00:08:55.419
Mark Vincent: I I think you're you're on. You're you're you're describing it well, but I I kind of wanna dumb it down just a little bit further. Right?

79
00:08:55.640 --> 00:09:13.919
Mark Vincent: Let's just look at it this way. I'm a small business. I might have some machines that I bought from my employees, I might be hiring new folks that the idea of like this whole byod thing is becoming super popular, right? I need a guy to come in and do some work for me on the part time

80
00:09:14.160 --> 00:09:17.510
Mark Vincent: he has a machine at home, or she has a machine at home.

81
00:09:17.620 --> 00:09:19.749
Mark Vincent: How do I know that that machine

82
00:09:19.890 --> 00:09:29.400
Mark Vincent: remotely is gonna be secure enough to be able to touch my data right? That's the the bottom line. I I need to hire somebody quick, or I need to hire a temporary person. Quick!

83
00:09:29.540 --> 00:09:33.349
Mark Vincent: How do I know that the person that's connecting into my remote network

84
00:09:33.360 --> 00:09:34.590
Mark Vincent: is secure?

85
00:09:35.026 --> 00:09:39.933
Mark Vincent: I like I, Jill, just for the fact from a security guy, we call that a

86
00:09:40.470 --> 00:09:44.830
Mark Vincent: attack service right? If I'm a bad guy and I'm trying to

87
00:09:45.155 --> 00:09:58.399
Mark Vincent: infiltrate someone's network. Usually the place where it's gonna happen first is on the end users device. It's it's it's most common place to get hacked right on your local laptop, because let's face it. A lot of folks are just not

88
00:09:58.830 --> 00:10:05.929
Mark Vincent: thinking about that sort of thing right? They they boot up their windows machine, and they just assume everything's gonna be great. I'm gonna connect. It's gonna be fine.

89
00:10:06.565 --> 00:10:11.619
Mark Vincent: It's usually not. That's when the trouble begins. Right?

90
00:10:12.033 --> 00:10:23.970
Mark Vincent: Ijel has a solution that I love. It's called a Udp pocket. I'm holding one right now. My hand. What a USB device! You basically plug it in your windows machine.

91
00:10:24.280 --> 00:10:34.880
Mark Vincent: It allows it to be rebooted into this read only operating system. So talking again about this attack surface, right? A place to be able to for hackers to get

92
00:10:34.990 --> 00:10:36.889
Mark Vincent: when you boot. With this device

93
00:10:37.090 --> 00:10:46.689
Mark Vincent: there ain't no attack surface left. It's a read, only operating system windows that your vocal machine has no longer exists. It's just this.

94
00:10:46.740 --> 00:10:48.669
Mark Vincent: And it's gonna connect in

95
00:10:48.730 --> 00:10:57.209
Mark Vincent: to a remote location where we're gonna store all of your critical data where we can really control the security and the access to that data. Right?

96
00:10:57.260 --> 00:10:59.800
Mark Vincent: So it kind of gives people the peace of mind

97
00:10:59.860 --> 00:11:01.619
Mark Vincent: that their data is protected.

98
00:11:01.800 --> 00:11:03.629
Mark Vincent: I think that a lot of folks don't

99
00:11:04.020 --> 00:11:09.280
Mark Vincent: get that. But I think that's if I can give anybody for small business. One concept that is.

100
00:11:09.520 --> 00:11:14.720
Mark Vincent: that's the golden ticket right there, right? That's your easy button for hiring people

101
00:11:14.760 --> 00:11:19.440
Mark Vincent: in a new world economy where you know you might not be providing them a machine.

102
00:11:19.470 --> 00:11:24.629
Mark Vincent: you know. Smb's a lot of times, don't. It's byod this solves that problem.

103
00:11:24.880 --> 00:11:34.980
Mark Vincent: Another thing I wanted to, and I swear I'll give you guys back a little time because I do like to talk. But that press release in particular is very exciting to me, and I don't think a lot of people

104
00:11:35.130 --> 00:11:54.339
Mark Vincent: maybe understand what they're saying about that. But in the old days of these kinds of environments, every time you made a change you'd have to literally reload this USB stick every time any change came out. So you you'd be constantly in this situation of patching and patching and rebuilding.

105
00:11:54.690 --> 00:12:03.419
Mark Vincent: The way the new igl system works is when they have an update, it only updates a small component. So you don't have to reload the entire USB stick

106
00:12:03.600 --> 00:12:19.888
Mark Vincent: as it allows them to be much more efficient on patching their environment and adding features without causing a lot of downtime for the end user, which is huge again. I'm all about simplicity. I just 7 definitely is this, or sorry 12. I don't know where I came up with 7.

107
00:12:20.750 --> 00:12:21.310
Jason Hendren: I'm.

108
00:12:22.010 --> 00:12:27.354
Mark Vincent: Natural 12 goes a long way to solving that particular problem.

109
00:12:28.350 --> 00:12:29.030
Mark Vincent: eat. Yeah.

110
00:12:29.030 --> 00:12:34.129
Ray Anderson: So Mark, and and and that's important. I'm glad you brought that up, because going back to

111
00:12:34.310 --> 00:12:36.170
Ray Anderson: that, that business owner

112
00:12:36.720 --> 00:12:39.470
Ray Anderson: in an S. And B Company.

113
00:12:39.570 --> 00:12:43.210
Ray Anderson: right? That really they're in the business to run a company.

114
00:12:43.220 --> 00:13:04.419
Ray Anderson: They're not in the business of it. And so that's where you know, a solution like ideal and then using parallel braz. Right? That's where those type of solutions are very compelling. And key, because now what we do is we can give that help to give back that time. Mr. Business owner.

115
00:13:04.420 --> 00:13:16.800
Ray Anderson: do what you do, what you do best run your business right, and and and we brought to you a simplified solution that isn't. Gonna take as much time and effort on your part.

116
00:13:17.070 --> 00:13:28.990
Ray Anderson: or really having to go out and hire. You know, a full time employee to come in and and put this environment together to run my business, you know. Maybe I only need somebody

117
00:13:29.210 --> 00:13:45.200
Ray Anderson: part time, or I can go lean on somebody like Zentagra, one to help to manage that environment. But now I've taken what I'm not in the business of doing which is to create and run it, and I've simplified it a whole lot with with a solution like, I jump.

118
00:13:45.540 --> 00:13:46.210
Ray Anderson: Yep.

119
00:13:46.370 --> 00:13:50.979
Mark Vincent: It's set up better myself. And I think that what makes it even more compelling from our perspective

120
00:13:51.150 --> 00:13:57.219
Mark Vincent: is, we've even tried to simplify the onboarding of that. And Ijel's been cool enough to allow us to

121
00:13:57.270 --> 00:13:58.690
Mark Vincent: basically

122
00:13:58.740 --> 00:14:04.800
Mark Vincent: rent licensing to small business on a monthly basis. To also kind of help this

123
00:14:04.940 --> 00:14:06.770
Mark Vincent: process along further

124
00:14:07.500 --> 00:14:15.780
Mark Vincent: cinteger one has in Cantagra, I'll see. For that matter. Both of us have our own shared hosting environments specifically built for IGEL.

125
00:14:16.060 --> 00:14:27.780
Mark Vincent: So one of the barriers that you know maybe a small business might be running into is, I don't know how to set this stuff up. Well, the good news here is, you don't have to, you know, for you as well right.

126
00:14:27.780 --> 00:14:30.680
Ray Anderson: There's another great point, right? Not only

127
00:14:30.930 --> 00:14:34.759
Ray Anderson: do we have a solution that is simplified

128
00:14:35.040 --> 00:14:36.760
Ray Anderson: for the customer.

129
00:14:36.810 --> 00:14:42.390
Ray Anderson: right for the business, but now I, Joel, is a company that partners with

130
00:14:42.410 --> 00:14:53.589
Ray Anderson: folks like us, you know, Msps, you know, hosting services right? And and they've actually created that simplified management side of the solution.

131
00:14:53.650 --> 00:14:58.539
Ray Anderson: So now, really a as an Smb owner, I can take a step back and go. Wow!

132
00:14:58.810 --> 00:15:00.210
Ray Anderson: I now have

133
00:15:01.180 --> 00:15:04.609
Ray Anderson: what I would call a cradle to grave solution. Stack.

134
00:15:04.690 --> 00:15:15.900
Ray Anderson: you know all encompassing. I have an endpoint easily deployed. I can send hardware out to any one of my employees or folks I do business with, or need access to my business.

135
00:15:16.170 --> 00:15:19.060
Ray Anderson: and through a service such as yours, Mark.

136
00:15:19.470 --> 00:15:24.529
Ray Anderson: You know they they can go through an enrollment process that's real simplified.

137
00:15:24.580 --> 00:15:34.480
Ray Anderson: And now that device is onboarded. And you know, profile settings are automatically pushed down. And now that employee is within minutes

138
00:15:34.840 --> 00:15:39.879
Ray Anderson: accessing my my information, my data securely and off to the races.

139
00:15:40.270 --> 00:15:41.280
Sean Washington: It's the easy button.

140
00:15:41.900 --> 00:15:43.346
Ray Anderson: Yeah. Exactly.

141
00:15:44.260 --> 00:15:45.680
Ray Anderson: Right? Here, right? Here, mark.

142
00:15:47.220 --> 00:15:48.179
Sean Washington: Yeah. He's he's.

143
00:15:48.180 --> 00:15:48.570
Ray Anderson: But you.

144
00:15:48.570 --> 00:15:51.179
Jason Hendren: Must have an easy button. I've got one somewhere.

145
00:15:52.230 --> 00:16:00.100
Sean Washington: You know, on, on that, you know, you talk about the the barriers of entry, and you talk about the configuration of technology. Of course we can help with that.

146
00:16:00.490 --> 00:16:03.970
Sean Washington: The other components, too, are vetting vendors.

147
00:16:04.120 --> 00:16:14.859
Sean Washington: you know, because if you look at the cyber security landscape or the It landscape, there are thousands of different vendors and a lot of marketing noise within there. So we've already done our homework.

148
00:16:14.940 --> 00:16:17.570
Sean Washington: We've already built solutions that we know work.

149
00:16:17.810 --> 00:16:19.730
Sean Washington: So the client doesn't have to worry about that.

150
00:16:19.890 --> 00:16:23.650
Sean Washington: The other component, too, is licensing.

151
00:16:23.890 --> 00:16:29.360
Sean Washington: So most of these enterprise licenses clients are going to have to go out there and spend money up front.

152
00:16:29.730 --> 00:16:37.560
Sean Washington: So if you're a startup and you're limited with the amount of capital that you have, this budgeted, or, you know initial investment, or whatever.

153
00:16:37.760 --> 00:16:42.599
Sean Washington: You don't want to go out and blow that entire amount on licensing upfront

154
00:16:42.750 --> 00:16:43.920
Sean Washington: some of the

155
00:16:44.670 --> 00:16:49.780
Sean Washington: what we can do with that. And what we've worked out with almost every single vendor we do business with is

156
00:16:49.900 --> 00:16:55.760
Sean Washington: the ability to lease those back to the clients as a monthly operational expense.

157
00:16:56.080 --> 00:17:01.539
Sean Washington: So it gets amortized over the course of an entire agreement instead of just, you know.

158
00:17:01.630 --> 00:17:09.450
Sean Washington: Let's spend 2 or $300,000 upfront. Then put all the pieces together. It's that turkey easy button, and it's it's light on the wallet.

159
00:17:09.450 --> 00:17:19.509
Mark Vincent: Right. It's literally built in a way that allows that business owner to say, Hey, I know that if I bring on 3 more employees. My cost per employee

160
00:17:19.619 --> 00:17:21.150
Mark Vincent: is a very fixed

161
00:17:21.170 --> 00:17:27.079
Mark Vincent: number that I can understand. It don't have. I don't have to think about any of it other than hey? It's

162
00:17:27.480 --> 00:17:28.066
Mark Vincent: you know.

163
00:17:28.580 --> 00:17:31.080
Mark Vincent: Give me a figure. I'm not sales, Guy here, Sean, but

164
00:17:31.100 --> 00:17:33.339
Mark Vincent: roughly, what you know. Can you give me a number.

165
00:17:33.340 --> 00:17:34.400
Sean Washington: 100 bucks.

166
00:17:34.620 --> 00:17:41.890
Mark Vincent: 100 bucks. Okay, let's say 100 bucks. I like that. So 100 bucks an employee every time I hire a new employee, 100 bucks a month.

167
00:17:42.050 --> 00:17:47.160
Mark Vincent: and included in that 100 bucks, is going to be the hosting of the application for them, their licensing

168
00:17:47.240 --> 00:17:48.730
Mark Vincent: their device.

169
00:17:49.010 --> 00:18:00.959
Mark Vincent: It it's a simple, simple way to be able to kind of. At least you know forward plan. Think about how you would do your hiring and your it spend, which is awesome, and it's consumption based. So if you're not

170
00:18:00.990 --> 00:18:10.539
Mark Vincent: using it, you know you're not paying for it, so to speak. You're not being forced to buy a gigantic license and hope to grow into it. Situation! It's literally for your.

171
00:18:10.540 --> 00:18:23.059
Sean Washington: Many years ago, there was a shift in a part of it around the phone systems. So phone and Internet, you know. And the phone providers were always real big on.

172
00:18:23.230 --> 00:18:28.409
Sean Washington: you know, you buy your phone, you buy your Internet, and then you're gonna have to buy a PBX.

173
00:18:28.770 --> 00:18:35.600
Sean Washington: And there's gonna be a whole PBX vendor involved. And then, of course, all the phone vendors started transitioning to voice over IP

174
00:18:35.880 --> 00:18:39.159
Sean Washington: and creating a hole hosted platform

175
00:18:39.530 --> 00:18:45.660
Sean Washington: with different softwares revolved around it. And just became an easy button where they can include everything for a monthly fee.

176
00:18:45.870 --> 00:18:52.429
Sean Washington: We're just going to basically take the rest of it, lump that together, make it virtual and as flexible as possible.

177
00:18:52.640 --> 00:19:06.239
Mark Vincent: Yeah. The sad part about that is the phones come with us because nobody ain't using the phone anymore. I don't know how many times I've walked into a building anywhere and seen an actual physical phone. You're like, Wow, I forgot what one of those look like, you know.

178
00:19:06.240 --> 00:19:07.649
Ray Anderson: Well, you're in at home, too, do you?

179
00:19:07.650 --> 00:19:21.570
Mark Vincent: Rotary phone. You go. Wow! What is that normal phone? I can't find one anywhere. If you're not holding a cell phone and these kinds of meetings. We're doing right now. This is the new normal. So yeah, part of that solution of consolidation is

180
00:19:21.610 --> 00:19:23.000
Mark Vincent: huge. Right?

181
00:19:23.000 --> 00:19:23.910
Jason Hendren: Absolutely.

182
00:19:24.320 --> 00:19:26.330
Mark Vincent: Doesn't make the full vendor happy about it, but

183
00:19:26.370 --> 00:19:28.849
Mark Vincent: it's it is what it is. It's that's life.

184
00:19:29.930 --> 00:19:36.509
Ray Anderson: Well, I like to look at help it. It it forces them to evolve, evolve their business right, and evolve their business models.

185
00:19:36.530 --> 00:19:45.110
Ray Anderson: adapt to the changes in in the working world or or life in general, right? How, how we do business, and how we interact

186
00:19:45.280 --> 00:19:51.329
Ray Anderson: because going back to to the phone mark like, do you even have a traditional phone at your home?

187
00:19:51.330 --> 00:19:53.090
Mark Vincent: No, haven't had it in.

188
00:19:53.090 --> 00:19:53.700
Ray Anderson: I tell you.

189
00:19:53.700 --> 00:19:54.650
Mark Vincent: First, yeah.

190
00:19:54.650 --> 00:20:03.910
Ray Anderson: Exactly right. So so, Brian, I like to look at that as there's those changes are really not threat. Shouldn't be threatening

191
00:20:04.170 --> 00:20:12.820
Ray Anderson: to to the manufacturers or the providers, but an a point of evolution for them. How are they going to adapt to that new model.

192
00:20:14.045 --> 00:20:14.400
Jason Hendren: Yeah.

193
00:20:14.400 --> 00:20:22.570
Sean Washington: You know, part of running a business. You got millennials and Gen. Z. Folks coming into the works workspace, and

194
00:20:22.770 --> 00:20:30.929
Sean Washington: my understanding is by 2,01525% of the entire workforce will actually be Gen. Z. It's a huge number. And these are

195
00:20:30.990 --> 00:20:34.649
Sean Washington: for from our perspectives, young folks, right?

196
00:20:34.930 --> 00:20:35.370
Ray Anderson: M-

197
00:20:35.370 --> 00:20:41.039
Sean Washington: If you want them to come work for your company, there's gonna have to be a high tech component.

198
00:20:41.130 --> 00:20:55.800
Sean Washington: So if you have an old dusty phone or some junky old software and weird workflows that aren't integrated. Some of these guys gonna look at you sideways because they're used to easy buttons. They're used to just work. And

199
00:20:55.840 --> 00:21:00.390
Sean Washington: so I actually just recently did a a a forum

200
00:21:00.810 --> 00:21:06.299
Sean Washington: where we talked about kind of the hybrid workforce and the struggles that you know, businesses are

201
00:21:06.460 --> 00:21:10.759
Sean Washington: facing as far as this. And and there was a couple of different things we we highlighted. It was

202
00:21:10.950 --> 00:21:23.130
Sean Washington: whether it's it's cultural business or technology, right? So technologies and the tools and the the brains and everything putting it together, culture is what I was just kind of talking about making sure that you're

203
00:21:23.390 --> 00:21:30.259
Sean Washington: providing, you know good technology to these young folks, but also enabling them to

204
00:21:31.410 --> 00:21:37.719
Sean Washington: you know, work from home, because there's not a single person wants to come back to an office and raise your hand. If you're working an office here.

205
00:21:39.270 --> 00:21:40.020
Sean Washington: need half an hour.

206
00:21:40.020 --> 00:21:40.530
Ray Anderson: What's that?

207
00:21:40.530 --> 00:21:43.784
Mark Vincent: You can tell by my background. I ain't in an office.

208
00:21:44.080 --> 00:21:58.039
Sean Washington: Yeah, I mean, like the the office is now, you know, somewhat confined to a you know, a home office, a physical office, and a digital workspace at the same time. The digital workspace can be delivered in many different ways. But this is kind of the concept we're talking about here.

209
00:21:58.170 --> 00:22:04.129
Sean Washington: And the last part was the business side of it. You know I've already invested a million dollars into this office, and

210
00:22:04.140 --> 00:22:08.739
Sean Washington: you know I need to people to come here because I already made this investment. Sorry you're gonna

211
00:22:09.497 --> 00:22:12.990
Sean Washington: you're just gonna have to move on and embrace the future.

212
00:22:13.810 --> 00:22:18.519
Mark Vincent: But I think it goes hand in hand with what the future expects to. You gotta think about like

213
00:22:18.670 --> 00:22:22.889
Mark Vincent: I I I hear the word compliance so much in the in the day.

214
00:22:22.980 --> 00:22:51.529
Mark Vincent: day to day, that sometimes I wake up in the middle of night screaming it out loud because it's just like it's it's it's a never ending thing, right? Every single customer I talked to, regardless of size, regardless of industry practically anymore. They're being held to a new standard of data protection and holding on the data in a higher level security than any of these folks have ever had to deal with. They're all being forced to buy stuff like cyber insurance. All this stuff they've never thought about, because this is the new normal.

215
00:22:51.670 --> 00:23:05.420
Mark Vincent: I think that a product like these is, what is the game changer for a lot of folks? Because it is again, that easy button. Right? If I know that I'm gonna be held to a standard of having to really hold onto that data

216
00:23:05.850 --> 00:23:12.950
Mark Vincent: products like parallels products. Like, I gel simplify that process considerably. And and

217
00:23:13.200 --> 00:23:21.399
Mark Vincent: that's kinda you know, just kinda have to have something people have to embrace. But in a I mean, you're right with with Gen. Z. And millennials.

218
00:23:21.880 --> 00:23:26.590
Mark Vincent: They don't want to come to the office a lot of times. They want to use their laptop

219
00:23:27.070 --> 00:23:34.930
Mark Vincent: products like this, help bridge that gap to kind of make it a more attractive company to work for when you're giving them the tools that

220
00:23:34.980 --> 00:23:42.699
Mark Vincent: allow, you know, a little bit of a compromise on both ways. Right? You're you're protecting your data. You're actually being better about how you're being a

221
00:23:42.930 --> 00:23:50.669
Mark Vincent: controller of your data by using a product like this. But you're also enticing the younger crowd that that wants to work from home, maybe doesn't want to use.

222
00:23:50.720 --> 00:23:53.509
Mark Vincent: you know, a company laptop. That kind of thing.

223
00:23:54.250 --> 00:23:55.315
Sean Washington: So Mark, we

224
00:23:55.750 --> 00:24:00.080
Sean Washington: clearly work with the smb, and we also work with a lot of startups.

225
00:24:00.360 --> 00:24:05.509
Sean Washington: So how many times? And I mean, I know you're gonna have to actually ask this answer this question, but

226
00:24:05.570 --> 00:24:11.829
Sean Washington: and pretty much every time we go and talk to these clients, you know, they're in startup mode, and there's no it there. So

227
00:24:12.100 --> 00:24:17.810
Sean Washington: first thing they do is they buy their domain. They buy their email. It's usually coming from Godaddy all in one shot right.

228
00:24:18.735 --> 00:24:19.080
Ray Anderson: You.

229
00:24:19.730 --> 00:24:20.696
Sean Washington: No, they.

230
00:24:21.180 --> 00:24:23.549
Mark Vincent: We'll just go to go to Daddy right away, I mean. Come on.

231
00:24:23.550 --> 00:24:24.570
Sean Washington: I get good commercials.

232
00:24:26.124 --> 00:24:33.929
Sean Washington: So yeah, it's it's it's either it's Microsoft, 365. Or it's Google workspaces. And that's their cloud solution, right?

233
00:24:34.290 --> 00:24:41.289
Sean Washington: They have no identity management. There's no single sign on. There's no multi factor. They're working on. Hope, you know, computers. They bought it best buy.

234
00:24:41.430 --> 00:24:44.919
Sean Washington: That is what you do when you're a startup and sure

235
00:24:45.140 --> 00:24:53.579
Sean Washington: that gets you to, you know a certain point. But then, when you start talking about compliance. There's all these other things that they are not necessarily thinking about.

236
00:24:53.690 --> 00:24:58.210
Sean Washington: that they would probably never even ask those questions unless someone posed it to them.

237
00:25:02.053 --> 00:25:08.119
Mark Vincent: Most startups. That's certainly what we see. I mean, we deal a lot in the biotech space in San Diego.

238
00:25:08.490 --> 00:25:10.590
Mark Vincent: bought in the semiconductor space

239
00:25:10.670 --> 00:25:15.169
Mark Vincent: guys that are being held to a lot of intellectual property stuff that they're very guarded with.

240
00:25:15.290 --> 00:25:20.030
Mark Vincent: And they're also having sometimes patient data things like that. If it's medical

241
00:25:20.326 --> 00:25:28.319
Mark Vincent: they need to be able to to both entice new employees to come and work, but they also need to be able to control and have this stuff safely secured.

242
00:25:28.530 --> 00:25:30.329
Mark Vincent: These solutions work great for that.

243
00:25:34.890 --> 00:25:35.225
Sean Washington: So

244
00:25:36.130 --> 00:25:41.059
Sean Washington: we talked about some of the features of IGEL and it facilitating

245
00:25:42.500 --> 00:25:44.379
Sean Washington: these end user compute products.

246
00:25:45.490 --> 00:25:52.890
Sean Washington: We understand that it is like a what I call 0 trust operating system. It's not going to get corrupted. You're not going to be able to write to it.

247
00:25:53.396 --> 00:25:55.750
Sean Washington: It's a conduit to a cloud solution.

248
00:25:56.884 --> 00:25:58.829
Sean Washington: We did talk about updating apps.

249
00:25:59.470 --> 00:26:05.139
Sean Washington: Now that probably to our the general audience out there is probably wondering, okay.

250
00:26:05.230 --> 00:26:10.030
Sean Washington: why would an operating system that's just communicating out to a cloud need apps.

251
00:26:14.580 --> 00:26:21.840
Mark Vincent: You guys want to take that? Someone want to take that I can? I can answer. But I think you guys probably are more technically well, you could explain the reasoning

252
00:26:23.810 --> 00:26:25.869
Mark Vincent: alright. I go. I'll I'll I'll jump. Yeah.

253
00:26:26.166 --> 00:26:27.649
Ray Anderson: Jump. Yeah, I'm thinking.

254
00:26:27.940 --> 00:26:28.590
Mark Vincent: You look at.

255
00:26:28.590 --> 00:26:54.505
Jason Hendren: They just need the apps. I was gonna say, I was gonna say earlier that there, you know, when you were talking about the telephone specifically that there's an app for that. I mean just a really quick story. I I moved recently and I had jumped on the Uma. If anybody knows who Uma is a voice over IP, home Internet phone solution and when we move, we packed up the the little answer machine that came with it in the phones, and when we moved back I was pulling the stuff out of the box and

256
00:26:54.760 --> 00:27:07.750
Jason Hendren: and plugging it back up and realizing that, you know, we never really used it while we were, you know, in in some temporary housing. But when we plugged it back up, I said. You know I was playing the messages on the on the physical Uma box.

257
00:27:07.750 --> 00:27:32.230
Jason Hendren: and I was one by one playing them, and then I re. Then it dawned on me that there's an app for that, and I went and downloaded Zooma app and was able to go through and clean up all of that stuff. Right? So ultimately, yeah. And that's where even ideal comes in. Now, it says, you know, in the preventative security model is the base OS, which is an application, and then only the apps you need to, you know, only install what you need. And and keep it streamlined and simple and small.

258
00:27:32.460 --> 00:27:34.419
Sean Washington: So give me an example of what maybe

259
00:27:34.990 --> 00:27:39.530
Sean Washington: an app would be. What app would people use on an igl OS.

260
00:27:40.206 --> 00:27:55.771
Jason Hendren: So well for so certainly parallels right as we're as we're talking about the the remote application server application, the client but also maybe you've got sas based applications that you access. So just use a browser. So we support chromium.

261
00:27:56.870 --> 00:28:14.560
Jason Hendren: Firefox, and and soon edge on angel OS, so you can use a browser as well to access your browser based applications. And even here I'm running zoom directly on my angel OS device for this for this webinar. Right? So you know whatever app you need.

262
00:28:15.237 --> 00:28:16.759
Jason Hendren: You know there's

263
00:28:17.180 --> 00:28:20.086
Jason Hendren: there's several that you can use right?

264
00:28:21.150 --> 00:28:23.119
Jason Hendren: th, those are just a few that come to mind.

265
00:28:23.120 --> 00:28:41.239
Mark Vincent: I think that's a that's a good one to point out, though, Jason, you're you're literally doing this, webinar, and you look great like looks great. Your audio sounds great, and you're doing that from an il device like, literally, there's no windows. Zoom client. There's no nothing. You're literally

266
00:28:41.450 --> 00:28:43.700
Mark Vincent: in an igl device using

267
00:28:44.108 --> 00:28:52.639
Mark Vincent: a web conferencing tool. And from our perspective, we would have no idea that that is any different than anything else which is pretty awesome.

268
00:28:52.830 --> 00:28:55.100
Sean Washington: Well, unbeknownst to all of you.

269
00:28:56.900 --> 00:28:58.710
Sean Washington: The questions I were asking

270
00:28:58.790 --> 00:29:00.020
Sean Washington: I get a thumbs down

271
00:29:01.120 --> 00:29:05.310
Sean Washington: questions I was asking was actually a segue to talk about this specifically.

272
00:29:05.510 --> 00:29:06.195
Sean Washington: So.

273
00:29:08.500 --> 00:29:13.789
Sean Washington: everyone has a relative or something to use Citrix, and they've worked for a big company or a university.

274
00:29:14.120 --> 00:29:23.160
Sean Washington: And they may always say something. You might. Yeah, it's kind of nice, but it's a pain in that, because I have to do a certain application. I gotta log into this thing every time.

275
00:29:23.420 --> 00:29:30.315
Sean Washington: and blah blah blah, and sometimes it doesn't work good. Other people get it, and it works very well.

276
00:29:30.890 --> 00:29:38.550
Sean Washington: and then they try running a zoom call or a team's call or voice over IP through a virtual environment.

277
00:29:38.880 --> 00:29:46.319
Sean Washington: So is what you're saying that if you run an application on the IGEL. It will help the performance with that.

278
00:29:47.387 --> 00:29:59.452
Jason Hendren: 2 2 ways to approach that one is that yet in some instances, yes, it makes sense to run the full application on the ideal endpoint. But one of the things that I does as well as we optimize

279
00:30:00.130 --> 00:30:16.110
Jason Hendren: the communication. So rather than install the full application we install plugins right for those for, say, zoom or webex, or teams, and optimize those virtual channels in the in the the virtual

280
00:30:16.610 --> 00:30:26.530
Jason Hendren: desktop. Right? So you can then run. And essentially we're offloading that to the local client. But playing it in the, you know, in the, in the virtual desktop.

281
00:30:27.050 --> 00:30:29.730
Mark Vincent: That's an important concept for people to grasp. So

282
00:30:29.890 --> 00:30:39.389
Mark Vincent: they're potentially running a virtual desktop somewhere. So like looks like a windows desktop. But in reality, that's running at a data center somewhere. Public cloud.

283
00:30:40.090 --> 00:30:47.089
Mark Vincent: They click on the from inside that view. They're clicking on teams. And what magically happens with IGEL is, it

284
00:30:47.390 --> 00:30:57.249
Mark Vincent: sees that you're launching teams and then basically utilizes the local hardware to be able to make it seem that that's running locally from that

285
00:30:57.720 --> 00:30:59.100
Mark Vincent: desktop in the cloud.

286
00:30:59.790 --> 00:31:06.360
Ray Anderson: And that that could be key mark in that, you know, if we're talking about like a small to medium sized business that might not have

287
00:31:06.410 --> 00:31:13.639
Ray Anderson: the resources within their data center to run those applications we're speaking of that can be resource, intensive.

288
00:31:14.125 --> 00:31:32.690
Ray Anderson: You know, we have endpoint devices, the agile devices that have the hardware that can, you know, handle that traffic and handle that processing? Hey? Why not? Just, you know. Let it pass on down to the the endpoint, the ideal endpoint to run it right and alleviate or offload that that load from the servers

289
00:31:32.790 --> 00:31:34.159
Ray Anderson: in the data center.

290
00:31:35.180 --> 00:31:35.820
Ray Anderson: Yep.

291
00:31:35.820 --> 00:31:38.070
Mark Vincent: And that's the beauty of having again

292
00:31:38.440 --> 00:31:44.680
Mark Vincent: the newest version of IGEL that allows you to constantly be updating those small components to make sure they're the best

293
00:31:44.890 --> 00:31:47.070
Mark Vincent: possible versions of themselves.

294
00:31:47.330 --> 00:31:50.329
Jason Hendren: Right to yeah, to take advantage of that ultimately. But.

295
00:31:50.330 --> 00:31:53.560
Ray Anderson: Another another use case. Oh, sorry. Go ahead, Jason.

296
00:31:53.560 --> 00:32:13.060
Jason Hendren: I was just gonna just elaborating on. What Mark just said is that you know the in order to take advantage of those optimizations, the plugins on the endpoint need to match what's in the virtual environment. So I'm ideal drastically simplifies that with, you know, by allowing you to update those plugins independent of the operating system, and really small updates.

297
00:32:14.010 --> 00:32:16.180
Ray Anderson: Another great use case.

298
00:32:16.670 --> 00:32:17.809
Ray Anderson: Oh, go ahead, Sean.

299
00:32:18.120 --> 00:32:20.440
Sean Washington: What do you say? It's an easy button, wouldn't you say.

300
00:32:20.720 --> 00:32:21.670
Ray Anderson: Alright!

301
00:32:21.670 --> 00:32:22.315
Jason Hendren: Absolutely.

302
00:32:23.720 --> 00:32:30.399
Ray Anderson: What I was. Gonna say, another great use case in in line with your question about you know, applications.

303
00:32:30.936 --> 00:32:40.939
Ray Anderson: Is, if if my users use Sas Sas applications, and I have a a large group of call center folks distributed throughout North America.

304
00:32:40.950 --> 00:32:45.249
Ray Anderson: and all I need is a web browser to connect to a call center app

305
00:32:46.050 --> 00:32:54.239
Ray Anderson: instead of falling, a traditional model of publishing a a browser like edge or chrome in a virtualization

306
00:32:54.450 --> 00:32:56.539
Ray Anderson: session. In my data center.

307
00:32:56.620 --> 00:33:18.799
Ray Anderson: I, Joel, has that browser resident on the endpoint. And so now, what I can do is I can easily enable that that browser and I can even hard code that that that link within that browser session for the end user. So when the end user comes in, they launch the browser from the local endpoint. They don't have to log into a virtualization

308
00:33:18.940 --> 00:33:28.560
Ray Anderson: session in the data center. So that's what I I find really, really compelling about ijel as well as how they can do that, how they can make that shift when needed.

309
00:33:29.120 --> 00:33:32.139
Mark Vincent: Yeah, they have killer features for segregation

310
00:33:32.260 --> 00:33:34.359
Mark Vincent: per user, right? Or per group.

311
00:33:34.410 --> 00:33:41.719
Mark Vincent: So if folks, some folks are gonna need a full blown desktop because of the nature of whatever they're doing in their job.

312
00:33:41.780 --> 00:33:55.190
Mark Vincent: There's a lot of there's a lot of use cases where you could say, Hey, you're you're a temporary employee like say, tax season, that's coming up right. Your Hnr. Block. You've got to have 50 million copies of

313
00:33:55.280 --> 00:34:01.179
Mark Vincent: turbotax sitting in front of you right. But when that guy's working, what does he really need? He might need a phone.

314
00:34:01.300 --> 00:34:07.970
Mark Vincent: you know, some kind of phone system on that screen. He's gonna need his turbotax, and he's gonna need.

315
00:34:08.270 --> 00:34:14.490
Mark Vincent: I don't know. Maybe a web browser for some looking up some stuff as he's he's looking around

316
00:34:14.530 --> 00:34:20.780
Mark Vincent: short of that he doesn't need a full blown desktop. Literally, you could achieve everything that they're looking for with IGEL.

317
00:34:20.880 --> 00:34:36.420
Mark Vincent: you know, you could give them a local browser, so that doesn't take up space at the data center doesn't impact anything there. You can give them that tax software via parallels right as an application, not a full blown desktop, but just the app, so there'll be a little icon that looks like it's

318
00:34:36.610 --> 00:34:44.029
Mark Vincent: turbo attacks. Oh, cool, but it's not. It's when you double click on that. It's launching that at the data center and then presenting it inside of IGEL.

319
00:34:44.090 --> 00:34:46.930
Mark Vincent: And then the same thing with teams or whatever you know what you can

320
00:34:47.139 --> 00:34:50.479
Mark Vincent: offload as much of that as you need to to make that

321
00:34:50.860 --> 00:34:54.010
Mark Vincent: streamlined. You know I love that aspect of it.

322
00:34:54.010 --> 00:35:03.059
Ray Anderson: And you know you know what you made me think about right there. Mark is. I found that tax preparer, and I use multiple applications in a busy time of the year.

323
00:35:03.430 --> 00:35:27.860
Ray Anderson: you know, 1 one monitor just isn't gonna do the job for me. And so now I can't. Can I use. Multi monitor, can I use 4 monitors be more efficient? At what I do? And with igl, that's definitely a yes, you know the the ability just to plug in monitors as you have them, or you need them. And Ij recognize them the OS, and be able to provide those

324
00:35:28.190 --> 00:35:30.380
Ray Anderson: like you would on a on a normal windows, state.

325
00:35:30.380 --> 00:35:38.740
Jason Hendren: Sure. Yeah. And yeah, we've actually used case. It just popped up recently was with multi. Monitor was with Angel.

326
00:35:39.520 --> 00:35:51.799
Jason Hendren: the customer was using 2 laptops, one laptop for accessing a virtual desktop in a secure environment that did not have a web browser. And then they literally had another another laptop

327
00:35:52.139 --> 00:36:17.729
Jason Hendren: that they were using with a local browser. So with Iil, we just simply repurposed one laptop and allowed them to plug in an external monitor, and because of the high custom, you know, customization ability. You know, instead of some users wanting to expand that virtual desktop across multiple monitors. We said, well, we wanna snap, you know your virtual desktop to one monitor and then let them use a local browser on that laptop

328
00:36:18.117 --> 00:36:38.459
Jason Hendren: on another monitor, right? So the local browser is not in, you know, in that secure virtual desktop they can browse where they want to not save cookies. Not do tracking, you know. Clear the cash all of those things, and make even browsing locally secure. But then, you know, get rid of a device. I just save some money. There.

329
00:36:38.970 --> 00:36:48.139
Mark Vincent: Yeah, that's awesome. Is there a limit to how many more? I mean, I'm I know there's gotta be. But what's what's the limit on, on, monitors, external monitors. There.

330
00:36:48.160 --> 00:36:56.499
Jason Hendren: I have not heard of it. A a total upper limit I've I've 6. 6 is about where I've seen them go, but I believe we can definitely go higher.

331
00:36:56.951 --> 00:36:58.960
Mark Vincent: I I'll play this down to the hardware.

332
00:36:58.960 --> 00:36:59.570
Jason Hendren: Way down to the.

333
00:36:59.570 --> 00:37:00.659
Mark Vincent: Holy crap! What are you.

334
00:37:00.660 --> 00:37:01.852
Ray Anderson: Yeah, I get it.

335
00:37:02.150 --> 00:37:02.700
Mark Vincent: That's up!

336
00:37:02.700 --> 00:37:13.990
Ray Anderson: Last last I last I checked. It was like 8 monitors that the OS supports. Yeah. But then it comes down to you know how you configure that on the hardware side, and if the hardware will support it.

337
00:37:14.250 --> 00:37:18.389
Mark Vincent: That's crazy town. I would love to see 8 monitors in front of me like that. Just a giant.

338
00:37:18.830 --> 00:37:19.220
Ray Anderson: I'm.

339
00:37:19.658 --> 00:37:29.740
Jason Hendren: You say that? And then you see the the new Samsung? This the Samsung monitor, the Odyssey that's the 57 inch

340
00:37:29.930 --> 00:37:38.240
Jason Hendren: you know the gigantic, you know. Curved beautiful, you know. Multi 4. I mean, you could do multiple 4. K,

341
00:37:38.300 --> 00:37:45.129
Jason Hendren: it's a 4 K monitor. But you can do multiple 1080 p. Sessions on it. Right? So you know, seamless is incredible.

342
00:37:45.130 --> 00:37:46.919
Sean Washington: You're talking about a modern workspace.

343
00:37:47.100 --> 00:37:48.180
Jason Hendren: Yeah, absolutely.

344
00:37:48.180 --> 00:37:49.360
Ray Anderson: There you go. Yeah.

345
00:37:50.770 --> 00:37:52.130
Sean Washington: Yeah, that's pretty cool.

346
00:37:52.934 --> 00:37:54.605
Sean Washington: Yeah. So I mean, I

347
00:37:55.720 --> 00:38:05.329
Sean Washington: thing is, is, these applications are very powerful, and they they eliminate a lot of the stigma around using these types of services, and it add a lot of value.

348
00:38:07.480 --> 00:38:20.550
Sean Washington: you know. And one thing I I just kind of wanted to juxtapose. A couple of things, you know. 1 one thing that comes up all the time with us is is the concept of identity management and wrapping ztna around endpoints from people working at home.

349
00:38:21.270 --> 00:38:27.239
Sean Washington: So these people are not using traditionally virtual systems, but they need to add all this additional licensing

350
00:38:27.400 --> 00:38:34.039
Sean Washington: to their endpoints to make sure that they could securely connect to their applications and their data. Right?

351
00:38:34.310 --> 00:38:38.440
Sean Washington: So with IGEL for them, all intents and purposes, facilitates

352
00:38:39.000 --> 00:38:40.169
Sean Washington: pretty much all of that.

353
00:38:42.560 --> 00:38:43.740
Ray Anderson: Yeah, absolutely.

354
00:38:43.740 --> 00:38:44.330
Jason Hendren: Agree.

355
00:38:44.330 --> 00:38:51.910
Ray Anderson: Absolutely has has integration for sure. Everything he talked about. You know, the the wonderful thing about the ideal endpoint or OS is.

356
00:38:52.710 --> 00:39:05.210
Ray Anderson: you know, you're typically using some type of virtualization solution. Well, that's your authentication point. So now you no longer have to worry about authentication at the end point or the IGEL desktop.

357
00:39:05.440 --> 00:39:09.429
Ray Anderson: you know, end user walks up. They see a desktop, a desktop icon

358
00:39:09.850 --> 00:39:20.469
Ray Anderson: my app. They launch it boom, and that's where they get the authentication. So that's where it helps to really. Then offload a lot of what you would normally have to configure

359
00:39:20.630 --> 00:39:22.150
Ray Anderson: on the endpoint.

360
00:39:22.340 --> 00:39:30.040
Ray Anderson: You know, when we talk about secure access with those virtualization solutions. Typically a a secure, remote access

361
00:39:30.160 --> 00:39:34.749
Ray Anderson: pieces included there. Right? We talk about parallels, parallels has

362
00:39:34.950 --> 00:39:41.420
Ray Anderson: equivalent to, you know. Say, for example, citrix net scalar, which is the gateway piece.

363
00:39:41.590 --> 00:39:43.870
Ray Anderson: you know. And so now

364
00:39:44.080 --> 00:39:48.479
Ray Anderson: you know that same thing that user sees that icon and double clicks it.

365
00:39:48.630 --> 00:40:08.039
Ray Anderson: Well, the authentication is gonna happen back at the data center at the gate, and that's where they're gonna come in securely. So you don't have to rely on some type of authentication, mechanism, or method, or a VPN. Even at the endpoint. Right? We can help to remove that out of the picture.

366
00:40:08.850 --> 00:40:11.990
Mark Vincent: Yeah, I think from an architectural standpoint, at least in my mind.

367
00:40:12.350 --> 00:40:23.100
Mark Vincent: it always makes more sense to me in in the modern world to try to centralize as much of my data and my compute into one place where I can harden it as much as possible.

368
00:40:23.100 --> 00:40:23.570
Ray Anderson: So you are.

369
00:40:23.570 --> 00:40:24.080
Mark Vincent: Possible.

370
00:40:24.650 --> 00:40:28.389
Mark Vincent: And once that sort of vault has been created.

371
00:40:28.680 --> 00:40:36.269
Mark Vincent: I'm opening up just as minimal of a access to that as humanly possible, and allowing.

372
00:40:36.380 --> 00:40:43.390
Mark Vincent: you know, a program like parallels to facilitate that. And then I gel as the endpoint for being the receiver of that content. To me. Is it

373
00:40:43.500 --> 00:40:44.620
Mark Vincent: perfect solution.

374
00:40:44.740 --> 00:40:49.877
Mark Vincent: There's very little that can be. Yeah, I'm knocking on some wood, because you never know right.

375
00:40:50.180 --> 00:40:50.770
Ray Anderson: Yeah.

376
00:40:50.770 --> 00:41:07.189
Mark Vincent: But I mean as as a attack surface again it it it's certainly very compelling. There's very little that you have to deal with on that end you can really focus on that one central place. You really need to harden, really well knowing that the endpoints coming in are going to be secured by default, but kind of how they work

377
00:41:07.310 --> 00:41:08.030
Mark Vincent: right.

378
00:41:08.390 --> 00:41:14.730
Ray Anderson: Would you agree, Mark, with with that being said that now, you know, we're talking about a solution

379
00:41:15.160 --> 00:41:20.200
Ray Anderson: that I don't, you know, as a business owner, or even it. I I don't have to worry about

380
00:41:20.280 --> 00:41:21.839
Ray Anderson: the risk of an endpoint.

381
00:41:22.000 --> 00:41:23.160
Mark Vincent: You don't, and what.

382
00:41:23.160 --> 00:41:24.720
Ray Anderson: Don't even have to worry about that.

383
00:41:24.720 --> 00:41:25.750
Mark Vincent: Like, if I can. Yeah.

384
00:41:25.750 --> 00:41:26.890
Ray Anderson: You said.

385
00:41:27.460 --> 00:41:39.019
Mark Vincent: You don't have to think about it, because it's it's already hard. And begin with what a lot of people I think fail to to maybe put together. Initially, too, is that the cost savings involved? There is huge.

386
00:41:40.060 --> 00:41:56.439
Mark Vincent: I'm not maintaining or patching a a laptop with an Rmm and a and a you know endpoint detection system. Or you know, all these kinds of security tools and and remote management tools, and all of that kind of junk that goes on with the traditional endpoint.

387
00:41:56.806 --> 00:42:00.530
Mark Vincent: It's all gone, that's all gone. So what's your price per user? Then

388
00:42:00.590 --> 00:42:09.740
Mark Vincent: you might be paying a bit to have it in the cloud. But I guarantee you that's gonna be cheaper than maintaining a local machine. There's just

389
00:42:10.050 --> 00:42:12.543
Mark Vincent: in the old days I'm not sure that that

390
00:42:13.080 --> 00:42:20.250
Mark Vincent: financial, you know, would have worked out is is easily. But in the modern world, and where we're at right here right now.

391
00:42:20.280 --> 00:42:26.329
Mark Vincent: I guarantee you I could. There's not a customer I could find that if I architected this from day one.

392
00:42:26.510 --> 00:42:30.249
Mark Vincent: It's cheaper to do it this way than it would be to do the latter

393
00:42:30.560 --> 00:42:31.140
Mark Vincent: to laugh.

394
00:42:31.680 --> 00:42:37.619
Sean Washington: Especially when you factor in the cost of administrators, administrators, salaries.

395
00:42:38.160 --> 00:42:39.930
Mark Vincent: Absolutely. Yeah, you you.

396
00:42:39.930 --> 00:42:40.520
Ray Anderson: Would be.

397
00:42:41.000 --> 00:42:41.519
Mark Vincent: All of that.

398
00:42:41.520 --> 00:42:42.969
Sean Washington: Summer. Yeah, and.

399
00:42:43.406 --> 00:42:51.310
Jason Hendren: Yeah, I mean, and even when it comes down to centralizing your users data right and backing it up and knowing that it's secure and not worrying about. They did just.

400
00:42:51.310 --> 00:42:52.109
Mark Vincent: Save that on your.

401
00:42:52.110 --> 00:43:14.250
Jason Hendren: Did you save that on your windows desktop? And did that get backed up? Right. I mean, we've got a place, a central repository for you to for you to save that file, did you? Did you save it there? Right ultimately, you know, I just not. You know I just not a ransomware target, so to speak. Right? It's read. Only reboot goes back the way it was. But no data is being stored there, either. Right? So

402
00:43:14.250 --> 00:43:24.480
Jason Hendren: you're you're you're ensuring that your that your end users are are following the the policies you want them to follow right, and then you're backing up and securing their data for them.

403
00:43:24.680 --> 00:43:31.939
Mark Vincent: Yeah, the way I like to always present this to customers that are somewhat maybe they're not as technically advanced.

404
00:43:32.580 --> 00:43:37.410
Mark Vincent: It's the apple thing. Right? I have an apple. I have an apple phone. I have an ipad

405
00:43:37.550 --> 00:43:40.809
Mark Vincent: talking to you guys right now on a on an Imac. Right?

406
00:43:41.070 --> 00:43:49.850
Mark Vincent: All of my data, all of my files, my information, my configuration is not actually start on any of these devices. It's in the cloud.

407
00:43:50.000 --> 00:43:51.289
Mark Vincent: It's Icloud, right?

408
00:43:51.400 --> 00:43:53.910
Mark Vincent: I go down the street and I

409
00:43:53.970 --> 00:44:01.970
Mark Vincent: leave my phone on a cab. I really don't care. They're not gonna get anything out of it. It's locked. There's nothing actually stored here, anyways.

410
00:44:01.990 --> 00:44:12.070
Mark Vincent: at least in it, that there isn't a copy somewhere else. Right? It's the same kind of concept. If I if I keep all my data centrally located. I have igl as my device.

411
00:44:13.570 --> 00:44:20.290
Mark Vincent: Yeah, something happens to that device. Who cares? It breaks no Biggie, you know, and even from a

412
00:44:20.490 --> 00:44:24.899
Mark Vincent: standpoint of like I've got a you know. I always like the call center. It's it's a great one.

413
00:44:24.940 --> 00:44:28.770
Mark Vincent: I've got 30 people in a room. Suddenly one of the machines starts acting funny

414
00:44:29.521 --> 00:44:45.759
Mark Vincent: something's wrong with the hardware. Okay, do we have another ideal device in a desk drawer over here that we can hand the guy. He's back up and working in 5 min. It's not like I have to re config a laptop. I have to get the apps on the laptop. I have to install all the security tools on that laptop.

415
00:44:45.980 --> 00:44:49.030
Mark Vincent: all that is completely removed.

416
00:44:49.030 --> 00:44:51.530
Jason Hendren: And that, and that license is transferable right? So.

417
00:44:51.530 --> 00:44:53.089
Mark Vincent: It's actually vice versa.

418
00:44:53.090 --> 00:44:53.580
Jason Hendren: Licence in.

419
00:44:53.580 --> 00:44:54.239
Mark Vincent: Able to transfer.

420
00:44:54.240 --> 00:44:57.430
Jason Hendren: To the new device without without losing the license.

421
00:44:57.780 --> 00:45:02.445
Mark Vincent: Yup, it's it is truly that that e easy button again.

422
00:45:02.890 --> 00:45:15.549
Mark Vincent: I think most business owners that that's really what they want to deal with. They don't want to deal with the headaches of of everything else it's getting people to to to of I mean, it is a. It is an ongoing process. I think this is still relatively new to small business.

423
00:45:15.590 --> 00:45:19.480
Mark Vincent: but to me, like I said, we we do pocs

424
00:45:19.970 --> 00:45:26.090
Mark Vincent: all the time here, like I do at least one a week right now. I probably have at least 2 sales calls a week

425
00:45:26.260 --> 00:45:29.790
Mark Vincent: brand new net new customer. It's never seen this kind of technology before.

426
00:45:30.270 --> 00:45:34.320
Mark Vincent: Generally it's been my experience that once I demo it.

427
00:45:34.390 --> 00:45:36.550
Mark Vincent: the light ball clicks in.

428
00:45:36.580 --> 00:45:40.020
Mark Vincent: Within 2 or 3 days. I get a call back from that same person going?

429
00:45:40.370 --> 00:45:50.579
Mark Vincent: You said, the Poc is really easy. Can we? Can we try that? And I'm like, yeah, prerequisite. Here's what you need. It's not really that. All that much that goes to, especially with parallels. It's like ridiculously simple.

430
00:45:50.996 --> 00:45:55.439
Mark Vincent: I could set them up in an hour after they have the Prerex in place.

431
00:45:55.870 --> 00:45:57.789
Mark Vincent: They play with that thing for a week.

432
00:45:58.540 --> 00:46:13.560
Mark Vincent: It's done, you know. I think it sells itself. People understand like, Oh, wow! I see where the value is here doesn't take too hard. But it's one thing to talk about it. I think it's another thing to see it.

433
00:46:13.910 --> 00:46:16.680
Sean Washington: From a sales perspective. The concept is

434
00:46:16.800 --> 00:46:20.629
Sean Washington: somewhat disruptive, because it's not what people are used to.

435
00:46:20.630 --> 00:46:21.580
Mark Vincent: Absolutely. It's different.

436
00:46:21.580 --> 00:46:30.420
Sean Washington: So what we have to do is is explain all the different features and benefits that go into this that they literally never would have thought about

437
00:46:30.510 --> 00:46:32.449
Sean Washington: until we brought it to their attention.

438
00:46:33.238 --> 00:46:38.610
Sean Washington: And quite honestly, I don't think the average Msp. Is having these conversations with anybody.

439
00:46:39.160 --> 00:46:42.089
Sean Washington: I think they're talking about support and their help desk. And

440
00:46:42.470 --> 00:46:44.930
Sean Washington: whatever Psa is powering that and silly.

441
00:46:44.930 --> 00:46:49.176
Mark Vincent: To a certain degree. It's counterintuitive to their own business, you know.

442
00:46:49.750 --> 00:46:50.570
Ray Anderson: I would agree.

443
00:46:50.570 --> 00:46:52.209
Mark Vincent: Maybe I'm just a bit of a weirdo, but I don.

444
00:46:53.340 --> 00:47:01.040
Mark Vincent: I don't mind that. I'm losing some revenue. As a result I would prefer to have happy technicians and happy customers

445
00:47:01.090 --> 00:47:08.489
Mark Vincent: than to make a couple of extra bucks selling an endpoint. What can I say? You know what I mean like. I'd like to keep it simple. If if

446
00:47:08.680 --> 00:47:22.570
Mark Vincent: if I can get a customer that has their data centrally located, I'm using a device like I shall access it. Happy customer, for the next 10 years like this! It's it's it ultimately will be better off for both them that I think.

447
00:47:23.117 --> 00:47:25.250
Ray Anderson: You know, Mark, they they come back to you.

448
00:47:25.540 --> 00:47:27.179
Ray Anderson: It's such

449
00:47:27.380 --> 00:47:35.079
Ray Anderson: a reliable, consistent solution stack that, you know. They'll continue to bring that business back to you. And hey, you know what

450
00:47:35.330 --> 00:47:39.580
Ray Anderson: word word of mouth is still powerful, too. Right? Hey? Where'd you get? That's kind of neat.

451
00:47:40.010 --> 00:47:40.920
Mark Vincent: Appreciate that.

452
00:47:41.163 --> 00:47:42.870
Ray Anderson: I wouldn't need to go talk tomorrow.

453
00:47:42.870 --> 00:47:47.530
Mark Vincent: Biotech. Right? We're we're, we're. We're really big in biotech and San Diego, like, we're

454
00:47:47.690 --> 00:47:53.839
Mark Vincent: definitely a name out there in Southern California. And it's a very hot market for biotech right now, and

455
00:47:53.850 --> 00:47:59.080
Mark Vincent: I don't know how many businesses we've gotten in the last year. As a result of

456
00:47:59.130 --> 00:48:00.609
Mark Vincent: these guys all talk.

457
00:48:00.957 --> 00:48:06.350
Mark Vincent: What are what are you guys doing? That's pretty cool. Who did that for you again? And

458
00:48:06.360 --> 00:48:07.629
Mark Vincent: yeah, you know.

459
00:48:07.630 --> 00:48:09.379
Sean Washington: Constantly splitting up like one company.

460
00:48:09.860 --> 00:48:16.529
Sean Washington: another one and then another one and another one. And it's all the same people. It's it's it's kind of a cool ecosystem to be involved in.

461
00:48:16.730 --> 00:48:27.479
Mark Vincent: Yeah, yeah, I I've definitely seem to have a a Lego kit for cloud space right now. And every time somebody calls I'm like, okay, let me grab my Lego Kit. I already know. You know it's awesome that way.

462
00:48:28.456 --> 00:48:28.749
Ray Anderson: You know.

463
00:48:28.750 --> 00:48:42.699
Sean Washington: Selling a product like this is kind of cool because you can kind of show people magic tricks right? You bring in this laptop, and you you pull up the the igl OS, and then you say, All right, look here we go. Here's my workspace. It's follows me around everywhere. I go

464
00:48:42.830 --> 00:48:43.910
Sean Washington: pull it up.

465
00:48:44.240 --> 00:48:46.849
Sean Washington: run a zoom call, show them how great it works.

466
00:48:47.540 --> 00:48:50.519
Sean Washington: you know. Let's let's do a 4 K Youtube. Video.

467
00:48:51.395 --> 00:48:51.640
Sean Washington: But.

468
00:48:51.640 --> 00:48:56.011
Mark Vincent: It's always your coaching. I don't know why you have a thing for that. But yeah, it's a great demo.

469
00:48:56.680 --> 00:49:00.049
Sean Washington: That's the magic trick. Yeah. You know, people want to see the sizzle. Right?

470
00:49:00.140 --> 00:49:05.930
Sean Washington: So, but yeah, but the benefits are are not really, you know, there could. There's cost savings.

471
00:49:05.960 --> 00:49:13.200
Sean Washington: There is the cool magic tricks. There is the efficiencies from working from home by the end of the day. It's a security conversation.

472
00:49:13.200 --> 00:49:13.700
Jason Hendren: Sure.

473
00:49:13.700 --> 00:49:15.630
Sean Washington: Everything that Mark just mentioned about

474
00:49:15.820 --> 00:49:18.330
Sean Washington: having everything securely at a data center.

475
00:49:18.640 --> 00:49:23.843
Jason Hendren: Yeah, and you can. Yeah. And as they save money and repurpose devices or use

476
00:49:24.150 --> 00:49:24.480
Sean Washington: And I told.

477
00:49:24.480 --> 00:49:30.310
Jason Hendren: Pocket. They should also know that, you know, they can purchase devices with ideal preinstalled.

478
00:49:30.350 --> 00:49:33.020
Jason Hendren: So they've been expanding and.

479
00:49:33.020 --> 00:49:35.630
Mark Vincent: Elbow, and I, Joel, unless I Jove.

480
00:49:35.630 --> 00:49:54.240
Jason Hendren: Lenovo, Lg, and HP, specifically. You can. You can order devices and and others. You can order devices from them directly. With angel OS pre installed. Have them drop ship to your work from home users, and 3 clicks, 3 or 4 clicks, and you're they're under management, and in your secure environment.

481
00:49:54.520 --> 00:49:55.622
Sean Washington: I think it's

482
00:49:56.780 --> 00:50:06.939
Sean Washington: It would. Probably we wouldn't serve ourselves well if we didn't have this conversation about repurposing, because you brought this up a couple of times, but I wanted to make sure the audience actually knew what we're talking about here. Because

483
00:50:07.060 --> 00:50:13.379
Sean Washington: let's just say you're a Microsoft shop. You have a bunch of machines that are 2, 3 years old.

484
00:50:13.720 --> 00:50:17.700
Sean Washington: You're looking to re, you know. Change your technology. Stack. Blah, blah! Blah! Right?

485
00:50:18.680 --> 00:50:20.710
Sean Washington: You could in theory.

486
00:50:20.890 --> 00:50:25.810
Sean Washington: wipe all those machines, convert them to IGEL or use the Udp pocket that Mark showed before.

487
00:50:26.698 --> 00:50:29.489
Sean Washington: Trash. Yeah, the windows component of things

488
00:50:29.910 --> 00:50:31.939
Sean Washington: and just run your systems that way.

489
00:50:32.240 --> 00:50:36.589
Sean Washington: Would you, in theory, get more life out of those systems running Linux on them?

490
00:50:36.590 --> 00:50:37.470
Jason Hendren: Oh, absolutely.

491
00:50:39.580 --> 00:50:48.969
Mark Vincent: Heck, yeah, that's a big heck. Yeah, yeah, it's a, it's a great use case. And Jason, it's great thing to mention. Actually, yeah, because I mean, that is really the thing the beauty pockets awesome.

492
00:50:49.060 --> 00:51:05.129
Mark Vincent: But like I've got a customer right now that we're rolling out same kind of thing to live from demo to Poc to like, Wow, this is cool. I want this for my entire environment. They have a bunch of older machines that are not by today's standards. There, you know, from a windows machine. They're okay

493
00:51:05.590 --> 00:51:19.989
Mark Vincent: from a igl perspective. They're gonna be hot rods. Linux doesn't require as much overhead, especially when you're limiting what applications even get installed on this thing right? It's gonna be a parallels client, some VoIP

494
00:51:20.110 --> 00:51:23.460
Mark Vincent: type of, you know, utility, a browser. That's it.

495
00:51:23.934 --> 00:51:25.670
Mark Vincent: It's gonna work, great

496
00:51:26.004 --> 00:51:29.980
Mark Vincent: and that allowed them to get, you know, maybe 3 to 4 more years

497
00:51:30.295 --> 00:51:37.440
Mark Vincent: life cycle out of that existing hardware, and then if they have net new, we've already talked them about. The Lg makes a really slick.

498
00:51:38.040 --> 00:51:42.059
Mark Vincent: Is it the ground that you can get that way, I think it's that's yeah.

499
00:51:42.060 --> 00:51:42.660
Ray Anderson: Yeah, that.

500
00:51:42.660 --> 00:52:05.189
Mark Vincent: And there's a nice little laptop that Lg has, and it's pre loaded with igl again, so as they buy new ones for their clients, or they have executives that want to travel, and they want a machine they can just take with them as Igel on it the grams, a night approach for that. And it just works, you know. Again, there's nothing on that machine that can be compromised or broken. It just literally boots straight into the cloud

501
00:52:05.490 --> 00:52:06.770
Mark Vincent: allows them to get their job done.

502
00:52:06.770 --> 00:52:08.420
Jason Hendren: Yeah. And when it comes to mobile devices.

503
00:52:08.420 --> 00:52:09.160
Mark Vincent: That's it.

504
00:52:09.300 --> 00:52:13.739
Jason Hendren: Yeah. The battery life's dramatically increased as well. Right? So ultimately they'll they'll.

505
00:52:13.740 --> 00:52:15.420
Mark Vincent: Oh, yeah, less running on right?

506
00:52:15.420 --> 00:52:16.800
Jason Hendren: Is as lightweight as it is.

507
00:52:16.800 --> 00:52:17.829
Mark Vincent: 12. That was great.

508
00:52:17.830 --> 00:52:19.000
Jason Hendren: A lot longer. Yeah.

509
00:52:19.280 --> 00:52:32.389
Sean Washington: So the way the ecosystem works is Ijel used to actually be, you know, create their own hardware. They they were kind of a thin client type provider with their software. They went agnostic about a year and a half ago, 2 years ago.

510
00:52:32.390 --> 00:52:34.830
Jason Hendren: They were on the. They were on that journey for quite some time, because.

511
00:52:34.830 --> 00:52:36.109
Sean Washington: Yeah. But a quick question.

512
00:52:36.110 --> 00:52:52.175
Jason Hendren: Quite honestly, yeah, customers that even had other other hardware. They, you know, what makes idle. So wonderful is the management interface, the universal management what we call the universal management suite that makes it easy to manage one or thousands of devices something else, you know.

513
00:52:52.510 --> 00:53:11.672
Jason Hendren: is, you know, just the ease of use and administration. But there were a lot of people that wanted that software, but you know, didn't necessarily want the you know, want the you know, the hardware itself. So I just sort of been on that journey for quite some time to to be hardware agnostic, and run iglos on other hardware. I think the

514
00:53:12.000 --> 00:53:13.360
Jason Hendren: the pandemic

515
00:53:13.945 --> 00:53:19.090
Jason Hendren: covid chip shortages. Things like that accelerated that ultimately. But but yeah.

516
00:53:19.820 --> 00:53:22.249
Ray Anderson: But it was interesting, Jason, because.

517
00:53:22.480 --> 00:53:31.650
Ray Anderson: W. What you just said at the same time, not only do you make a great software stack when you did have those hardware devices, and I'll speak of the Ud. 3 in particular.

518
00:53:32.340 --> 00:53:39.230
Ray Anderson: It was great hardware. And so you know, Co. When when when it came to that time. Customers like, what do you mean? I can't get these

519
00:53:39.310 --> 00:53:41.480
Ray Anderson: ideal hardware devices anymore.

520
00:53:41.750 --> 00:53:49.149
Ray Anderson: So it was almost like a scramble like, well, what's the next best thing that's comparable or comparable to to the ud threes.

521
00:53:49.568 --> 00:53:56.789
Ray Anderson: So that was that was quite interesting. So I, Joel, did you know hardware and software did do a really good job on both sides.

522
00:53:57.000 --> 00:53:57.700
Ray Anderson: Yeah.

523
00:53:57.700 --> 00:54:02.870
Sean Washington: So now, yeah, you can go to an Lg or whoever it might be. Get a nice

524
00:54:03.080 --> 00:54:09.129
Sean Washington: thin client, or I mean, really, what's attractive is is a a mobile, thin client, laptop

525
00:54:09.290 --> 00:54:14.970
Sean Washington: laptop with Igell on it sports multiple computers. Take whoever you want. As long as you have an Internet connection.

526
00:54:14.990 --> 00:54:16.080
Sean Washington: you're online.

527
00:54:16.790 --> 00:54:23.320
Ray Anderson: You know what I really like to Shawn those hardware vendors you speaking of? Lg, in particular, is they just work.

528
00:54:23.918 --> 00:54:34.589
Ray Anderson: I mean, there's no special configuration whatsoever, cause I've been there configured them, or or set them up with. I jaw and and the OS. Just goes on them

529
00:54:34.650 --> 00:54:39.849
Ray Anderson: on the hardware comes up and it runs, and you can just leave it be for

530
00:54:40.440 --> 00:54:44.310
Ray Anderson: another. What? 2, 3, 4, 5 years down the road.

531
00:54:44.310 --> 00:54:45.590
Sean Washington: Yeah, exactly.

532
00:54:47.280 --> 00:54:54.733
Mark Vincent: I know this has been a great conversation, but we're getting to like an hour. We could talk all day about igl parallels and small business.

533
00:54:55.020 --> 00:54:55.639
Ray Anderson: That's hot. There.

534
00:54:55.640 --> 00:55:12.219
Mark Vincent: We didn't have another reason to have another show, so I think maybe we should probably try to wrap it up. Definitely, I'm gonna give my shameless plug here for z integral one. I do it every time this particular topic, and if you want to know more reach out

535
00:55:12.516 --> 00:55:17.099
Mark Vincent: I would love to demo this stuff to you so you can see it first hand

536
00:55:17.438 --> 00:55:34.389
Mark Vincent: I've got this demo down. I could do it blindfolded with, you know, tied up. And I it's still a great demo fantastic product and if you're interested, reach up well, we can talk to you about it and demo it. And, Poc, if you're if you're really interested in it as well.

537
00:55:34.650 --> 00:55:36.190
Sean Washington: We'll show you some magic tricks.

538
00:55:36.610 --> 00:55:38.675
Mark Vincent: Yeah, exactly. Yeah. Once you see it.

539
00:55:38.970 --> 00:55:41.650
Ray Anderson: I want to see Sean's. Youtube Tvs.

540
00:55:43.540 --> 00:55:44.260
Mark Vincent: Perfect.

541
00:55:44.260 --> 00:55:45.050
Sean Washington: And time.

542
00:55:46.010 --> 00:55:49.250
Mark Vincent: Awesome anything else. Shut guys, you wanna add.

543
00:55:49.250 --> 00:55:52.630
Ray Anderson: No, that was, that was a great conversation. Great conversation.

544
00:55:52.630 --> 00:55:54.309
Jason Hendren: Absolutely my pleasure. Happy to be here.

545
00:55:55.213 --> 00:55:58.970
Mark Vincent: Love having you guys. And definitely, we'll we'll do this again.

546
00:56:00.750 --> 00:56:03.864
Sean Washington: Until next time. Thank you for joining, powering. Smb.

547
00:56:04.520 --> 00:56:06.750
Mark Vincent: Alright, thanks. Everyone have a great day.

548
00:56:07.020 --> 00:56:08.659
Ray Anderson: You guys later, excited.