{"id":65865,"date":"2023-12-04T19:00:00","date_gmt":"2023-12-05T00:00:00","guid":{"rendered":"http:\/\/74d2948405.nxcli.io\/resources\/88-igel-weekly-get-in-the-know-reveal-blind-spots-in-your-digital-workspace-and-enhance-ux\/"},"modified":"2026-01-30T12:56:59","modified_gmt":"2026-01-30T17:56:59","slug":"88-igel-weekly-get-in-the-know-reveal-blind-spots-in-your-digital-workspace-and-enhance-ux","status":"publish","type":"post","link":"https:\/\/xentegra.com\/hi\/resources\/88-igel-weekly-get-in-the-know-reveal-blind-spots-in-your-digital-workspace-and-enhance-ux\/","title":{"rendered":"88: IGEL Weekly: Get in the Know \u2013 Reveal Blind Spots in Your Digital Workspace and Enhance UX"},"content":{"rendered":"<p><iframe loading=\"lazy\" src=\"https:\/\/www.buzzsprout.com\/1555814\/episodes\/14086942-igel-weekly-get-in-the-know-reveal-blind-spots-in-your-digital-workspace-and-enhance-ux?iframe=true\" scrolling=\"no\" width=\"100%\" height=\"200\" frameborder=\"0\" style=\"width: 100%;height: 200px\"><\/iframe><\/p>\n<p>IT admins are having to deal with many challenges on the rocky road to digital transformation. The importance of security, cloud adoption, cost savings, and the rapid evolution of SaaS-based applications is driving organizations to a hybrid workspace that requires different approaches to how endpoints are deployed, used, managed, and controlled.<\/p>\n<p>While the demand for applications is increasing, organizations are choosing to deploy a variety of platforms that bring together a hybrid mix of on-premises, virtual, and cloud-based workspaces in their environments. Whereas users expect more flexibility to work when and where they prefer, on their endpoint devices of choice with applications that \u2018just work\u2019.<\/p>\n<p>This shift towards cloud-based workspaces promotes a SaaS approach to deploy applications, which combines a number of components to provide expanded functionality as a service. Therefore, it has become vital to deploy tools that allow organizations to not only get an inventory of their used applications but also to understand how they are being deployed and used in their environments.<\/p>\n<p>Stratusphere UX monitors application performance by providing detailed metrics and diagnostics data that reveal blind spots to support IT teams and CIOs in making data-driven decisions.<\/p>\n<p>\u0939\u094b\u0938\u094d\u091f: \u090f\u0902\u0921\u0940 \u0935\u094d\u0939\u093e\u0907\u091f\u0938\u093e\u0907\u0921<br \/>Co-host: Chris Feeney<br \/>Co-host: Jaime Reynolds<\/p>\n<div class=\"transcript\">\n<p><!--block-->\u0935\u0947\u092c\u0935\u0940\u091f\u0940\u091f\u0940<\/p>\n<p>1<br \/>00:00:02.120 &#8211;&gt; 00:00:15.900<br \/>Andy Whiteside: Everyone welcome to Episode 88 of I, Joel Weekly. I&#8217;m your host, Andy White side of have a Chris Feeney with me and Jamie Reynolds. Guys. How&#8217;s it going, Chris? How&#8217;s it? Good? Yeah. Good man. I you know where wolf pack red baby, you<\/p>\n<p>2<br \/>00:00:16.120 &#8211;&gt; 00:00:20.590<br \/>Chris Feeney: That was a good one man loved. I&#8217;m sorry we missed each other at the game, but that was such<\/p>\n<p>3<br \/>00:00:21.350 &#8211;&gt; 00:00:24.400<br \/>Chris Feeney: a great game to watch. Sorry U. And C. Fans<\/p>\n<p>4<br \/>00:00:24.520 &#8211;&gt; 00:00:41.320<br \/>Chris Feeney: about 20 people my group. So I really had no control, and that was fine. I didn&#8217;t want any control. In fact, I didn&#8217;t reach out to people proactively, because I didn&#8217;t want to have any control over that day. But yeah, I&#8217;m sorry I&#8217;m didn&#8217;t get chance. No, it&#8217;s fine. We bought tickets literally like 3&nbsp;h before the game we&#8217;re like, let&#8217;s do it. Let&#8217;s go so.<\/p>\n<p>5<br \/>00:00:41.650 &#8211;&gt; 00:00:47.099<br \/>Chris Feeney: anyway, by yourself. Anything exciting happened over the holidays.<\/p>\n<p>6<br \/>00:00:47.380 &#8211;&gt; 00:00:51.079<br \/>Chris Feeney: Oh, I&#8217;m sorry. Was that for Jamie? Sorry? Yeah, go ahead. Jamie.<\/p>\n<p>7<br \/>00:00:51.530 &#8211;&gt; 00:01:04.389<br \/>Jaime Reynolds: Yeah, I spent some time with the family, went to the the Smoky Mountains, and just glad to be back. We had a good time, and if we&#8217;re talking sports, I&#8217;m riding high since yesterday since my Purdue boil makers are number one right now. So<\/p>\n<p>8<br \/>00:01:04.640 &#8211;&gt; 00:01:08.409<br \/>Andy Whiteside: that&#8217;s basketball. Honestly, yes, it is. Yes.<\/p>\n<p>9<br \/>00:01:08.950 &#8211;&gt; 00:01:14.899<br \/>Jaime Reynolds: you know, gotten started in college basketball. Yeah, this year that&#8217;ll come in a week or 2, I guess.<\/p>\n<p>10<br \/>00:01:15.320 &#8211;&gt; 00:01:25.119<br \/>Andy Whiteside: So. Let&#8217;s see, today is November 20, eighth, 2023. And the blog we&#8217;re gonna review for today is share my screen.<\/p>\n<p>11<br \/>00:01:25.900 &#8211;&gt; 00:01:54.169<br \/>Andy Whiteside: Blind spots get in the know reveal blind spots in your digital workspace and enhance ux experience. So II think a lot of what we&#8217;re gonna talk about today is around the user experience around digital workspace enhanced ux experience for our users. But in the very first paragraph it calls out security. And we were just having a conversation for you record. I&#8217;ve found it very interesting and enlightening to see my new<\/p>\n<p>12<br \/>00:01:54.380 &#8211;&gt; 00:02:12.349<br \/>Andy Whiteside: newish security team as integral, really taking Igel on as a primary security play, because when they first we first start off security practice, I was having to bring up to that group that Igl, you know, a a read only Linux derivative<\/p>\n<p>13<br \/>00:02:12.370 &#8211;&gt; 00:02:28.820<br \/>Andy Whiteside: was part of a security story, and they immediately didn&#8217;t grasp it. And but within, you know, within a day they were all over it. So I think part of we&#8217;re gonna cover here. Not only is the user experience, but the security benefits of it. Chris. Or you guys, I know you guys as a company are<\/p>\n<p>14<br \/>00:02:28.930 &#8211;&gt; 00:02:41.119<br \/>Andy Whiteside: haven&#8217;t messaging. I draw as a security platform for a long time now, by the whole time, I mean, like 5 years. Is it really starting to hit as a security play across the ecosystem?<\/p>\n<p>15<br \/>00:02:41.600 &#8211;&gt; 00:02:47.839<br \/>Chris Feeney: I think so. Yeah. And a lot of things have kind of emerged. As a result of that, there&#8217;s<\/p>\n<p>16<br \/>00:02:47.900 &#8211;&gt; 00:03:15.640<br \/>Chris Feeney: what you know you didn&#8217;t hear too much about. At least, you know, when I started, you know, was 0 trust architecture. That&#8217;s become a very big thing. Obviously, the Federal government has a big initiative on implementing that. And so that&#8217;s where I started with Igl when I went into that market, it was the first thing we talked about was security, right? Cause you, you can&#8217;t put something on a cover government network without, you know, security looking at it first, and that type of thing.<\/p>\n<p>17<br \/>00:03:15.640 &#8211;&gt; 00:03:33.990<br \/>Chris Feeney: But I&#8217;ve II have told this many times. I&#8217;ve I&#8217;ve never lost a deal because of security problems with Ijos OS at all, never once single at all. But what&#8217;s happened is obviously a lot you know, occurred in the marketplace. We&#8217;ve had many stories where customers got hit<\/p>\n<p>18<br \/>00:03:34.020 &#8211;&gt; 00:03:51.310<br \/>Chris Feeney: by Iran somewhere in a lot of situations their idol devices were not compromised the ones that they had deployed if they weren&#8217;t fully deployed. And that just sort of you know, it&#8217;s a preventive measure. And so you&#8217;re gonna be hearing more about this preventive security model.<\/p>\n<p>19<br \/>00:03:51.310 &#8211;&gt; 00:04:09.049<br \/>Chris Feeney: It&#8217;s more of a you know, proactive approach versus a reactive response. We&#8217;ve definitely had customers where they were reacting to a situation by running around and plugging ud pockets into devices before they got hit, or something. So looking forward to talking more about that in a future. Podcast.<\/p>\n<p>20<br \/>00:04:09.210 &#8211;&gt; 00:04:31.539<br \/>Andy Whiteside: III didn&#8217;t like what you just said. So people have been using Igl something like a Ud pocket as a reactionary method in once something bad had happened. This as a just a general concept as well as what we&#8217;re gonna talk about today is really trying to be both proactive and reactive. We have to be. But around, you know, user experience and security at the same time, which you know in user compute space. It&#8217;s<\/p>\n<p>21<br \/>00:04:31.540 &#8211;&gt; 00:04:42.189<br \/>Andy Whiteside: end user experience, security security and user experience number 1, 2, 2, one in that order all the time. And it sounds like, you know, people are starting to understand that. I just<\/p>\n<p>22<br \/>00:04:42.190 &#8211;&gt; 00:04:44.070<br \/>Andy Whiteside: users quickly. Yeah.<\/p>\n<p>23<br \/>00:04:44.220 &#8211;&gt; 00:04:53.500<br \/>Andy Whiteside: Jamie, do you have a a a experience around customer? You&#8217;ve seen implement Igl from a security perspective, maybe maybe not say the customer name, but maybe tell their story.<\/p>\n<p>24<br \/>00:04:54.100 &#8211;&gt; 00:05:08.340<br \/>Jaime Reynolds: Yeah, I mean, we&#8217;re seeing it more where we get with customers, and they&#8217;re integrating this as part of their security practice as opposed to what you said from before, where it was viewed as primarily horizon or citrix. But<\/p>\n<p>25<br \/>00:05:08.340 &#8211;&gt; 00:05:24.999<br \/>Jaime Reynolds: I just a lot of health care a lot of you know we we certainly see epic, and and it falls into the security realm now as well. So you know, we&#8217;re just trying to get that message out and make sure. As as Chris said, we&#8217;re we&#8217;re coming up with some new branding and go to market things and and stuff like that. So<\/p>\n<p>26<br \/>00:05:25.600 &#8211;&gt; 00:05:40.670<br \/>Chris Feeney: Chris, specifically, why did you guys bring this blog forward today? So a couple of things? So earlier this year, we launched cosmos, and a big change with that was the introduction of apps and an app portal<\/p>\n<p>27<br \/>00:05:40.690 &#8211;&gt; 00:05:59.109<br \/>Chris Feeney: similar to your mobile platform, where you got an app store, for example. And so initially, we had a few set of apps out there. Liquidware is is a stratosphere is one of the first ones that was actually developed by the vendor on idle, ready vendor. In this case we&#8217;ve long partnered with<\/p>\n<p>28<br \/>00:05:59.280 &#8211;&gt; 00:06:25.520<br \/>Chris Feeney: and so wanted to highlight. Them, I know. Since then we&#8217;ve had a few others that have emerged, but but definitely wanted to kinda highlight the fact that now we&#8217;re we launched cosmos in April. Here we are. November. What? 6, 7 months later? We&#8217;re seeing more and more of that ready ecosystem. Begin to you know, work on and build and then release their their apps. So.<\/p>\n<p>29<br \/>00:06:25.570 &#8211;&gt; 00:06:30.440<br \/>Chris Feeney: and I know you guys have done a lot of work with liquid wear as well so wanted to kind of highlight that today.<\/p>\n<p>30<br \/>00:06:31.320 &#8211;&gt; 00:06:45.540<br \/>Andy Whiteside: So this this first this first section here really talks about what Jamie was bringing up a minute ago. It&#8217;s an end to end complete solution. And it&#8217;s only as good from a user experience or security perspective as any piece<\/p>\n<p>31<br \/>00:06:45.570 &#8211;&gt; 00:06:50.289<br \/>Andy Whiteside: of the story, including in this case the managed secured input<\/p>\n<p>32<br \/>00:06:51.830 &#8211;&gt; 00:06:54.069<br \/>Chris Feeney: yeah, definitely, I think.<\/p>\n<p>33<br \/>00:06:54.470 &#8211;&gt; 00:07:20.829<br \/>Chris Feeney: that&#8217;s that&#8217;s always been the trick sort of that last mile visibility. There&#8217;s a lot of stuff. I mean, going back to the security story earlier. I mean, a lot of what you&#8217;ve probably seen is people focus on the back end infrastructure. Maybe the networking to get there. But you know, endpoint visibility getting into that infrastructure having a tool that can actually show you, hey? What&#8217;s really going on if an issue occurs, or you proactively wanna monitor<\/p>\n<p>34<br \/>00:07:20.870 &#8211;&gt; 00:07:31.879<br \/>Chris Feeney: and notice that, hey? You know, we got a wireless problem, and it&#8217;s affecting endpoints or whatever things like that, or just basic admin, you know, functionality like inventory checking, or whatever. So.<\/p>\n<p>35<br \/>00:07:32.110 &#8211;&gt; 00:07:46.729<br \/>Andy Whiteside: Jamie, would it be fair to say that people now see this as an Indian complete solution, and they may or may not have had good monitoring on the head end in the past, and they certainly don&#8217;t have it on the complete story. And that&#8217;s kind of where the liquid wear product kicks in.<\/p>\n<p>36<br \/>00:07:47.290 &#8211;&gt; 00:07:49.310<br \/>Jaime Reynolds: Yeah, yeah, absolutely for sure.<\/p>\n<p>37<br \/>00:07:50.420 &#8211;&gt; 00:07:55.130<br \/>Andy Whiteside: Chris, it calls out the 1, 2, 3, 4 key features. Here, you wanna just walk us through these.<\/p>\n<p>38<br \/>00:07:55.190 &#8211;&gt; 00:08:14.130<br \/>Chris Feeney: Yeah. So this is great. What I love about. The stratosphere product. Here is you know, we for them. We&#8217;ve just got an agent on the endpoint that can actually monitor things on the ideal device. And and most of the user experiences, you know, be impacted based on a variety of factors. But<\/p>\n<p>39<br \/>00:08:14.130 &#8211;&gt; 00:08:30.040<br \/>Chris Feeney: they can see how the devices doing like the CPU. The networking connectivity. What&#8217;s plugged into the device? A lot of different things that can report into their their console and and then provide some, you know, reporting capabilities.<\/p>\n<p>40<br \/>00:08:30.040 &#8211;&gt; 00:08:51.499<br \/>Chris Feeney: One of the things, for example, that we worked with them on a while back was for customers that were looking at. You know I need to get to windows 11. Can my devices get there? If I were to try to in place upgrade them from 10 to 11 they actually had a tool that could, you know report in kinda give some visibility. And then actually out of that<\/p>\n<p>41<br \/>00:08:51.500 &#8211;&gt; 00:09:17.749<br \/>Chris Feeney: report, hey, these devices are fine. These can these or will not be, but they will be perfectly fine for iglos. And also these use cases like, from a user experience doing user, you know, communications through zoom or teams calls when you wanna leverage the endpoint hardware for that. So a lot of cool metrics and and and reporting features that come with a tool like stratosphere here.<\/p>\n<p>42<br \/>00:09:18.230 &#8211;&gt; 00:09:34.640<br \/>Andy Whiteside: Well, let&#8217;s just walk down. So it&#8217;s metrics for application, performance, device, device, health and network connectivity. That&#8217;s one call out device, inventory and configuration insights. It&#8217;s almost like those are 5 all by themselves. Proactive event logs and alerts<\/p>\n<p>43<br \/>00:09:34.640 &#8211;&gt; 00:09:59.529<br \/>Andy Whiteside: and comprehensive compliance, reporting, you know, obviously, things that have been part of an Indian story all this time easily done in the windows world, but not always thought about in the delivered compute world and inclusive of the endpoints. And that&#8217;s where the liquid where solution kicks in Strasbourg, just in general, on the windows side, but has been available on the Igl piece, for I don&#8217;t know what. 3, 4 years now.<\/p>\n<p>44<br \/>00:09:59.670 &#8211;&gt; 00:10:04.959<br \/>Chris Feeney: Yeah, I think we first announced the integration at Citrix Synergy in early 2020,<\/p>\n<p>45<br \/>00:10:04.970 &#8211;&gt; 00:10:18.469<br \/>Chris Feeney: right before the world came to a halt, if you remember and they had just integrated into OS. 11 at the time. Prior to that, we were using the custom partition mechanism. So it&#8217;s been, you know, coming up on 4 years now<\/p>\n<p>46<br \/>00:10:18.600 &#8211;&gt; 00:10:25.189<br \/>Chris Feeney: and and then. Obviously, they&#8217;ve now built the OS 12 version of that same app that works with their products.<\/p>\n<p>47<br \/>00:10:25.870 &#8211;&gt; 00:10:35.189<br \/>Andy Whiteside: Okay, and then the last section of the blog says, reveal user blind spots didn&#8217;t go to a lot of detail here. But, Jamie, what are they trying to say here?<\/p>\n<p>48<br \/>00:10:39.280 &#8211;&gt; 00:10:40.909<br \/>Jaime Reynolds: Oh, I&#8217;m sorry I was saying<\/p>\n<p>49<br \/>00:10:41.160 &#8211;&gt; 00:10:43.229<br \/>Jaime Reynolds: me, hey, Chris, you wanna take that one?<\/p>\n<p>50<br \/>00:10:43.890 &#8211;&gt; 00:10:54.889<br \/>Chris Feeney: Well, II think from the my interaction with the folks there, I mean, you can see. You know the users complaining about something? Where? Where&#8217;s the problem? Maybe if it&#8217;s.<\/p>\n<p>51<br \/>00:10:54.950 &#8211;&gt; 00:11:02.760<br \/>Chris Feeney: is it something inside the application they&#8217;re accessing, or is it a virtual desktop that is performing<\/p>\n<p>52<br \/>00:11:02.860 &#8211;&gt; 00:11:13.780<br \/>Chris Feeney: seemingly slow. Is it? Actually something where it&#8217;s maybe logging in, you know, taking too long whatever which, as you&#8217;re logging in, you&#8217;ve got things like user persona de details.<\/p>\n<p>53<br \/>00:11:13.790 &#8211;&gt; 00:11:29.720<br \/>Chris Feeney: profiles. You know, all that stuff that that there are tools out there that can kinda help optimize that but do you have something that can kind of really point out where the smoking gun is? And you know, the users generally gonna experience something on the end point.<\/p>\n<p>54<br \/>00:11:29.810 &#8211;&gt; 00:11:35.989<br \/>Chris Feeney: They don&#8217;t know if it&#8217;s an issue. With the end point it might be something completely different. And so this tool<\/p>\n<p>55<br \/>00:11:36.090 &#8211;&gt; 00:11:49.830<br \/>Chris Feeney: can kinda help figure out, you know, hey? If there&#8217;s nothing wrong from the endpoint to the network, maybe there&#8217;s something going on inside the user ex resource desktop application that is is causing an issue.<\/p>\n<p>56<br \/>00:11:49.840 &#8211;&gt; 00:11:51.960<br \/>Chris Feeney: And this is kind of what<\/p>\n<p>57<br \/>00:11:52.130 &#8211;&gt; 00:11:58.749<br \/>Chris Feeney: what that&#8217;s revealing here is is you know, cause I&#8217;m blind. If I don&#8217;t have that data, that information.<\/p>\n<p>58<br \/>00:11:58.770 &#8211;&gt; 00:12:20.459<br \/>Jaime Reynolds: Yeah. Yeah. Sorry. I wasn&#8217;t seen that before. But yeah, I mean, just thinking back to, you know, being an admin back in the days right? And you hear Vdi is slow this morning, right? It&#8217;s always a tough spot, or even a blind spot, getting all the way back to the endpoint if a customer doesn&#8217;t have an end to end solution. So you know, as an example, customers love features like<\/p>\n<p>59<br \/>00:12:20.460 &#8211;&gt; 00:12:38.449<br \/>Jaime Reynolds: the Citrix monitoring, and things like that. But we&#8217;re only looking at the application servers or the the Vdi instances. So this is a great, great utility to have here, or feature right to see a full end to end visibility to what might be going on as far as the blind spots go right. So<\/p>\n<p>60<br \/>00:12:39.130 &#8211;&gt; 00:12:45.419<br \/>Andy Whiteside: set this up by saying this, Jamie, I&#8217;ll ask you a question. How how long has it been since you administer a<\/p>\n<p>61<br \/>00:12:45.680 &#8211;&gt; 00:12:48.950<br \/>Andy Whiteside: an actual end user compute solution at a.<\/p>\n<p>62<br \/>00:12:49.060 &#8211;&gt; 00:12:51.459<br \/>Jaime Reynolds: how long, how long? How long?<\/p>\n<p>63<br \/>00:12:51.600 &#8211;&gt; 00:13:19.620<br \/>Andy Whiteside: Maybe just weeks. Okay? So here&#8217;s the question to you, traditional in user computing where you take a windows computer that&#8217;s joined to a domain or something, talking to servers and things on the back end versus in user compute, where we&#8217;re delivering a virtual workload of some type, maybe apps, maybe desktop. What have you to a a endpoint that is specifically being used to connect to that, you know, delivered compute workload.<\/p>\n<p>64<br \/>00:13:19.930 &#8211;&gt; 00:13:27.060<br \/>Andy Whiteside: would you? Would it be fair to say that Euc has more blind spots than traditional client server computing<\/p>\n<p>65<br \/>00:13:27.830 &#8211;&gt; 00:13:32.780<br \/>Jaime Reynolds: it certainly could be depending on, you know, the the.<\/p>\n<p>66<br \/>00:13:32.850 &#8211;&gt; 00:13:59.159<br \/>Jaime Reynolds: the build of it. But yeah, absolutely. Yeah. And it, it&#8217;s often forgotten. Right? I mean, we think we&#8217;re gonna build these in the data center and deliver them. And everything will be great until there&#8217;s a problem with the endpoint. Right? So my response, absolutely, there&#8217;s more blind spots. And they&#8217;re not where you think they&#8217;re going to be, because you&#8217;re deliver, not deploy. And the truth is, and what you just said and and is, it&#8217;s not. Sometimes it&#8217;s every time.<\/p>\n<p>67<br \/>00:13:59.250 &#8211;&gt; 00:14:10.599<br \/>Andy Whiteside: always, always, always Gremlins in end, user compute solutions. And they&#8217;re fixable. But most people who grew up in a traditional client server compute world have no idea where to start looking.<\/p>\n<p>68<br \/>00:14:10.710 &#8211;&gt; 00:14:34.530<br \/>Chris Feeney: Yeah. Now, this is great cause. And Andy, we&#8217;ve talked a lot about just certainly at events and on this podcast before just you know helping people understand what is their actual endpoint strategy. And I think, you know, going back to the security conversation earlier, we&#8217;re we&#8217;re at a point in time where yet another technical trend is is emerging windows. 10, for example, is gonna end of life. In 2025<\/p>\n<p>69<br \/>00:14:34.530 &#8211;&gt; 00:14:46.610<br \/>Chris Feeney: windows 11 is emerging more and more and more. But you know, and the hardware refresh cycle is back up again, you know, after you know, everybody bought their stuff 3, 4 years ago, and<\/p>\n<p>70<br \/>00:14:46.660 &#8211;&gt; 00:15:10.969<br \/>Chris Feeney: you know. So there&#8217;s this you know, tsunami of of scenarios going on where maybe, you know, they have to consider their endpoints. You know, they they either can&#8217;t upgrade the ones they&#8217;ve got, because the hardware doesn&#8217;t support the new version. But they can go virtualize that. Obviously, or maybe take advantage of some Microsoft licensing. They they own whatever it is.<\/p>\n<p>71<br \/>00:15:10.970 &#8211;&gt; 00:15:22.179<br \/>Chris Feeney: But as you&#8217;ve talked about, you know, don&#8217;t forget the endpoint. It all starts there, you know, the users are gonna walk up and touch something with their hands. And and you know, keyboard and mouse, or whatever you know.<\/p>\n<p>72<br \/>00:15:22.180 &#8211;&gt; 00:15:33.919<br \/>Chris Feeney: You have to have something that can deliver a great user experience that will reject the solution if they don&#8217;t have that. These are all things that you guys have focused on quite a bit, you know, all the time.<\/p>\n<p>73<br \/>00:15:33.920 &#8211;&gt; 00:16:01.720<br \/>Andy Whiteside: And user compute is an asynchronous solution. Where you have a head end, you have an endpoint. But you gotta have both. The head end could be in the cloud. It could be your data center. That endpoint could be full blown windows with the gazillion gigs of memory in it, or it could be a limited thing client or somewhere in between. More than likely, is the answer. But here&#8217;s the main thing I find all the time is people I talk to when I ask this question, do you have a digital workspace strategy? If they even try to answer, it comes out, and it&#8217;s like they really don&#8217;t.<\/p>\n<p>74<br \/>00:16:01.720 &#8211;&gt; 00:16:17.320<br \/>Andy Whiteside: And then, if I say, Do you have a digital workspace strategy that includes an endpoint strategy that fits into that digital Workspace strategy. The answer is almost always, no. We just have to keep beating the drum and sending the message out and trying to get people to think in those 2 ways.<\/p>\n<p>75<br \/>00:16:18.460 &#8211;&gt; 00:16:30.729<br \/>Andy Whiteside: Jamie, you just came from an organization. We&#8217;re not gonna say who it is. Here. The leadership of that organization? Did they have a true digital workspace strategy for the organization? Or was it just a kind of ad hoc<\/p>\n<p>76<br \/>00:16:30.830 &#8211;&gt; 00:16:32.899<br \/>Andy Whiteside: using solutions as needed?<\/p>\n<p>77<br \/>00:16:33.400 &#8211;&gt; 00:16:40.830<br \/>Jaime Reynolds: They. They certainly had a solution, and it was being developed and and<\/p>\n<p>78<br \/>00:16:41.180 &#8211;&gt; 00:16:44.540<br \/>Jaime Reynolds: and streamlined, if you will. So<\/p>\n<p>79<br \/>00:16:44.850 &#8211;&gt; 00:17:01.930<br \/>Andy Whiteside: it&#8217;s good most most organizations, you know, somewhere at the top of the stack, when I ask them the question, they really really don&#8217;t and sometimes you pull back the covers in 80% of the users are, you know, riding around with a windows device and a VPN, and that is.<\/p>\n<p>80<br \/>00:17:02.440 &#8211;&gt; 00:17:13.149<br \/>Jaime Reynolds: it&#8217;s very common. Yeah, by far common. 90 plus organizations are still doing the same thing I did when I got my first job in 1,997<\/p>\n<p>81<br \/>00:17:14.420 &#8211;&gt; 00:17:15.820<br \/>Andy Whiteside: brand new laptop.<\/p>\n<p>82<br \/>00:17:15.859 &#8211;&gt; 00:17:18.849<br \/>Andy Whiteside: no more than 3 years old, with a VPN. On it.<\/p>\n<p>83<br \/>00:17:19.430 &#8211;&gt; 00:17:23.149<br \/>Andy Whiteside: Most organizations still do that. How crazy is that? 2023<\/p>\n<p>84<br \/>00:17:24.829 &#8211;&gt; 00:17:39.419<br \/>Andy Whiteside: alright guys! Well, thanks for jumping on and and covering this. Happy to talk about the look of where solution and what it does in ecosystem in general. Specifically as a relacy user compute Nigel. Really is something that has a lot of value for users.<\/p>\n<p>85<br \/>00:17:39.760 &#8211;&gt; 00:17:49.880<br \/>Chris Feeney: Yes, and I know before we wrap up just kinda tying into just the larger ecosystem you&#8217;re working on. You guys actually worked with liquid wear to set up<\/p>\n<p>86<br \/>00:17:50.080 &#8211;&gt; 00:17:59.479<br \/>Chris Feeney: a service. Now, scenario, where, you know, having a tool like this in their environment that could actually feed into their service. Now, environment, too. So<\/p>\n<p>87<br \/>00:17:59.610 &#8211;&gt; 00:18:04.250<br \/>Chris Feeney: that is just another. You know, thing that you guys focus on and<\/p>\n<p>88<br \/>00:18:04.260 &#8211;&gt; 00:18:10.529<br \/>Chris Feeney: and I know we&#8217;re, we&#8217;ve been talking about a similar thing for Igl, we talked about in this podcast<\/p>\n<p>89<br \/>00:18:10.770 &#8211;&gt; 00:18:15.669<br \/>Andy Whiteside: comes back to it&#8217;s great. If you can get the data. But what are you gonna do with it?<\/p>\n<p>90<br \/>00:18:15.700 &#8211;&gt; 00:18:31.190<br \/>Andy Whiteside: And that&#8217;s where in our world we get that back into service. Now and then you have a fighting chance as to what you then do next, and that that world is going to evolve a ton. Once you start talking about AI. And what artificial intelligence can then do with that data that humans would have taken forever<\/p>\n<p>91<br \/>00:18:31.370 &#8211;&gt; 00:18:39.680<br \/>Chris Feeney: to to do with that same data? Yeah, it is. It is fascinating to see. Kind of what? What&#8217;s emerging<\/p>\n<p>92<br \/>00:18:39.740 &#8211;&gt; 00:18:49.010<br \/>Chris Feeney: with that whole topic the the tremendous benefits of using something like that to, you know. Look for, hey? We&#8217;ve had 12 cases on<\/p>\n<p>93<br \/>00:18:49.150 &#8211;&gt; 00:19:07.879<br \/>Andy Whiteside: this same topic right? Here was the resolution. And you know, feed that back to a user or something rather than a ton of podcasts. This morning, one of them on the advancements in AI. When the last 6 months for example, in one of the AI tools. They told it to go right the the game pong<\/p>\n<p>94<br \/>00:19:07.950 &#8211;&gt; 00:19:10.550<br \/>Andy Whiteside: and it did it in 30 30&nbsp;s.<\/p>\n<p>95<br \/>00:19:10.660 &#8211;&gt; 00:19:13.040<br \/>Chris Feeney: Scratchy. I wrote<\/p>\n<p>96<br \/>00:19:14.070 &#8211;&gt; 00:19:34.270<br \/>Andy Whiteside: crazy apparently the guy who originally wrote Paul took 3 months to get it done. But an example of What you&#8217;d have said, Chris, is you through liquor? Get stuff into service. Now you look at it with artificial intelligence. Find out that it&#8217;s that it&#8217;s been some problem, and through generative artificial intelligence you tell it to write a script to solve that problem. Boom! It&#8217;s done.<\/p>\n<p>97<br \/>00:19:36.860 &#8211;&gt; 00:19:55.479<br \/>Chris Feeney: I think we&#8217;re just on the cusp of the capabilities here. Hopefully, nobody develops Skynet, and we&#8217;re now looking at Terminator 3. But you know, the guy predicted, within 6 months one of the AI tools will be able to create a Pixar movie from scratch. That&#8217;s incredible.<\/p>\n<p>98<br \/>00:19:55.620 &#8211;&gt; 00:19:58.020<br \/>Jaime Reynolds: Yeah, I did see that something else.<\/p>\n<p>99<br \/>00:19:58.150 &#8211;&gt; 00:19:59.070<br \/>Chris Feeney: Wow.<\/p>\n<p>100<br \/>00:19:59.520 &#8211;&gt; 00:20:06.820<br \/>Chris Feeney: thank you.<\/p>\n<p><\/p>\n<\/div>","protected":false},"excerpt":{"rendered":"<p>IT admins are having to deal with many challenges on the rocky road to digital transformation. The importance of security, cloud adoption, cost savings, and the rapid evolution of SaaS-based &hellip;<\/p>","protected":false},"author":7,"featured_media":65861,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_price":"","_stock":"","_tribe_ticket_header":"","_tribe_default_ticket_provider":"","_tribe_ticket_capacity":"0","_ticket_start_date":"","_ticket_end_date":"","_tribe_ticket_show_description":"","_tribe_ticket_show_not_going":false,"_tribe_ticket_use_global_stock":"","_tribe_ticket_global_stock_level":"","_global_stock_mode":"","_global_stock_cap":"","_tribe_rsvp_for_event":"","_tribe_ticket_going_count":"","_tribe_ticket_not_going_count":"","_tribe_tickets_list":"[]","_tribe_ticket_has_attendee_info_fields":false,"footnotes":""},"categories":[5],"tags":[],"class_list":["post-65865","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-podcast"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>88: IGEL Weekly: Get in the Know \u2013 Reveal Blind Spots<\/title>\n<meta name=\"description\" content=\"This week, we discuss a hybrid workspace that requires different approaches to how endpoints are deployed, used, managed, and controlled.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/xentegra.com\/hi\/resources\/88-igel-weekly-get-in-the-know-reveal-blind-spots-in-your-digital-workspace-and-enhance-ux\/\" \/>\n<meta property=\"og:locale\" content=\"hi_IN\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"88: IGEL Weekly: Get in the Know \u2013 Reveal Blind Spots\" \/>\n<meta property=\"og:description\" content=\"This week, we discuss a hybrid workspace that requires different approaches to how endpoints are deployed, used, managed, and controlled.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/xentegra.com\/hi\/resources\/88-igel-weekly-get-in-the-know-reveal-blind-spots-in-your-digital-workspace-and-enhance-ux\/\" \/>\n<meta property=\"og:site_name\" content=\"XenTegra\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/XenTegra\/\" \/>\n<meta property=\"article:published_time\" content=\"2023-12-05T00:00:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-01-30T17:56:59+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/eadn-wc05-13529174.nxedge.io\/wp-content\/uploads\/2024\/03\/IGEL-WEEKLY.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1100\" \/>\n\t<meta property=\"og:image:height\" content=\"600\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Chase Newmyer\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@xentegra\" \/>\n<meta name=\"twitter:site\" content=\"@xentegra\" \/>\n<meta name=\"twitter:label1\" content=\"\u0926\u094d\u0935\u093e\u0930\u093e \u0932\u093f\u0916\u093f\u0924\" \/>\n\t<meta name=\"twitter:data1\" content=\"Chase Newmyer\" \/>\n\t<meta name=\"twitter:label2\" content=\"\u0905\u0928\u0941\u092e\u093e\u0928\u093f\u0924 \u092a\u0922\u093c\u0928\u0947 \u0915\u093e \u0938\u092e\u092f\" \/>\n\t<meta name=\"twitter:data2\" content=\"19 \u092e\u093f\u0928\u091f\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/xentegra.com\\\/resources\\\/88-igel-weekly-get-in-the-know-reveal-blind-spots-in-your-digital-workspace-and-enhance-ux\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/xentegra.com\\\/resources\\\/88-igel-weekly-get-in-the-know-reveal-blind-spots-in-your-digital-workspace-and-enhance-ux\\\/\"},\"author\":{\"name\":\"Chase Newmyer\",\"@id\":\"https:\\\/\\\/xentegra.com\\\/#\\\/schema\\\/person\\\/84736408f096bfd92b80305aea8846a7\"},\"headline\":\"88: IGEL Weekly: Get in the Know \u2013 Reveal Blind Spots in Your Digital Workspace and Enhance UX\",\"datePublished\":\"2023-12-05T00:00:00+00:00\",\"dateModified\":\"2026-01-30T17:56:59+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/xentegra.com\\\/resources\\\/88-igel-weekly-get-in-the-know-reveal-blind-spots-in-your-digital-workspace-and-enhance-ux\\\/\"},\"wordCount\":4201,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/xentegra.com\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/xentegra.com\\\/resources\\\/88-igel-weekly-get-in-the-know-reveal-blind-spots-in-your-digital-workspace-and-enhance-ux\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/xentegra.com\\\/wp-content\\\/uploads\\\/2024\\\/03\\\/IGEL-WEEKLY.png\",\"articleSection\":[\"Podcast\"],\"inLanguage\":\"hi-IN\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/xentegra.com\\\/resources\\\/88-igel-weekly-get-in-the-know-reveal-blind-spots-in-your-digital-workspace-and-enhance-ux\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/xentegra.com\\\/resources\\\/88-igel-weekly-get-in-the-know-reveal-blind-spots-in-your-digital-workspace-and-enhance-ux\\\/\",\"url\":\"https:\\\/\\\/xentegra.com\\\/resources\\\/88-igel-weekly-get-in-the-know-reveal-blind-spots-in-your-digital-workspace-and-enhance-ux\\\/\",\"name\":\"88: IGEL Weekly: Get in the Know \u2013 Reveal Blind Spots\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/xentegra.com\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/xentegra.com\\\/resources\\\/88-igel-weekly-get-in-the-know-reveal-blind-spots-in-your-digital-workspace-and-enhance-ux\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/xentegra.com\\\/resources\\\/88-igel-weekly-get-in-the-know-reveal-blind-spots-in-your-digital-workspace-and-enhance-ux\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/xentegra.com\\\/wp-content\\\/uploads\\\/2024\\\/03\\\/IGEL-WEEKLY.png\",\"datePublished\":\"2023-12-05T00:00:00+00:00\",\"dateModified\":\"2026-01-30T17:56:59+00:00\",\"description\":\"This week, we discuss a hybrid workspace that requires different approaches to how endpoints are deployed, used, managed, and controlled.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/xentegra.com\\\/resources\\\/88-igel-weekly-get-in-the-know-reveal-blind-spots-in-your-digital-workspace-and-enhance-ux\\\/#breadcrumb\"},\"inLanguage\":\"hi-IN\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/xentegra.com\\\/resources\\\/88-igel-weekly-get-in-the-know-reveal-blind-spots-in-your-digital-workspace-and-enhance-ux\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"hi-IN\",\"@id\":\"https:\\\/\\\/xentegra.com\\\/resources\\\/88-igel-weekly-get-in-the-know-reveal-blind-spots-in-your-digital-workspace-and-enhance-ux\\\/#primaryimage\",\"url\":\"https:\\\/\\\/xentegra.com\\\/wp-content\\\/uploads\\\/2024\\\/03\\\/IGEL-WEEKLY.png\",\"contentUrl\":\"https:\\\/\\\/xentegra.com\\\/wp-content\\\/uploads\\\/2024\\\/03\\\/IGEL-WEEKLY.png\",\"width\":1100,\"height\":600},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/xentegra.com\\\/resources\\\/88-igel-weekly-get-in-the-know-reveal-blind-spots-in-your-digital-workspace-and-enhance-ux\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/xentegra.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"88: IGEL Weekly: Get in the Know \u2013 Reveal Blind Spots in Your Digital Workspace and Enhance UX\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/xentegra.com\\\/#website\",\"url\":\"https:\\\/\\\/xentegra.com\\\/\",\"name\":\"XenTegra\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/xentegra.com\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/xentegra.com\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"hi-IN\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/xentegra.com\\\/#organization\",\"name\":\"XenTegra\",\"url\":\"https:\\\/\\\/xentegra.com\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"hi-IN\",\"@id\":\"https:\\\/\\\/xentegra.com\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/xentegra.com\\\/wp-content\\\/uploads\\\/2023\\\/06\\\/1519903807641-min.jpg\",\"contentUrl\":\"https:\\\/\\\/xentegra.com\\\/wp-content\\\/uploads\\\/2023\\\/06\\\/1519903807641-min.jpg\",\"width\":200,\"height\":200,\"caption\":\"XenTegra\"},\"image\":{\"@id\":\"https:\\\/\\\/xentegra.com\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/XenTegra\\\/\",\"https:\\\/\\\/x.com\\\/xentegra\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/xentegra-llc\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/xentegra.com\\\/#\\\/schema\\\/person\\\/84736408f096bfd92b80305aea8846a7\",\"name\":\"Chase Newmyer\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"hi-IN\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d46cd44f0bd433dc5a386cbac549c62fd92266e3951669c705b347be2130cca3?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d46cd44f0bd433dc5a386cbac549c62fd92266e3951669c705b347be2130cca3?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d46cd44f0bd433dc5a386cbac549c62fd92266e3951669c705b347be2130cca3?s=96&d=mm&r=g\",\"caption\":\"Chase Newmyer\"},\"url\":\"https:\\\/\\\/xentegra.com\\\/hi\\\/resources\\\/author\\\/chasenewmyer\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"88: IGEL Weekly: Get in the Know \u2013 Reveal Blind Spots","description":"This week, we discuss a hybrid workspace that requires different approaches to how endpoints are deployed, used, managed, and controlled.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/xentegra.com\/hi\/resources\/88-igel-weekly-get-in-the-know-reveal-blind-spots-in-your-digital-workspace-and-enhance-ux\/","og_locale":"hi_IN","og_type":"article","og_title":"88: IGEL Weekly: Get in the Know \u2013 Reveal Blind Spots","og_description":"This week, we discuss a hybrid workspace that requires different approaches to how endpoints are deployed, used, managed, and controlled.","og_url":"https:\/\/xentegra.com\/hi\/resources\/88-igel-weekly-get-in-the-know-reveal-blind-spots-in-your-digital-workspace-and-enhance-ux\/","og_site_name":"XenTegra","article_publisher":"https:\/\/www.facebook.com\/XenTegra\/","article_published_time":"2023-12-05T00:00:00+00:00","article_modified_time":"2026-01-30T17:56:59+00:00","og_image":[{"width":1100,"height":600,"url":"https:\/\/eadn-wc05-13529174.nxedge.io\/wp-content\/uploads\/2024\/03\/IGEL-WEEKLY.png","type":"image\/png"}],"author":"Chase Newmyer","twitter_card":"summary_large_image","twitter_creator":"@xentegra","twitter_site":"@xentegra","twitter_misc":{"\u0926\u094d\u0935\u093e\u0930\u093e \u0932\u093f\u0916\u093f\u0924":"Chase Newmyer","\u0905\u0928\u0941\u092e\u093e\u0928\u093f\u0924 \u092a\u0922\u093c\u0928\u0947 \u0915\u093e \u0938\u092e\u092f":"19 \u092e\u093f\u0928\u091f"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/xentegra.com\/resources\/88-igel-weekly-get-in-the-know-reveal-blind-spots-in-your-digital-workspace-and-enhance-ux\/#article","isPartOf":{"@id":"https:\/\/xentegra.com\/resources\/88-igel-weekly-get-in-the-know-reveal-blind-spots-in-your-digital-workspace-and-enhance-ux\/"},"author":{"name":"Chase Newmyer","@id":"https:\/\/xentegra.com\/#\/schema\/person\/84736408f096bfd92b80305aea8846a7"},"headline":"88: IGEL Weekly: Get in the Know \u2013 Reveal Blind Spots in Your Digital Workspace and Enhance UX","datePublished":"2023-12-05T00:00:00+00:00","dateModified":"2026-01-30T17:56:59+00:00","mainEntityOfPage":{"@id":"https:\/\/xentegra.com\/resources\/88-igel-weekly-get-in-the-know-reveal-blind-spots-in-your-digital-workspace-and-enhance-ux\/"},"wordCount":4201,"commentCount":0,"publisher":{"@id":"https:\/\/xentegra.com\/#organization"},"image":{"@id":"https:\/\/xentegra.com\/resources\/88-igel-weekly-get-in-the-know-reveal-blind-spots-in-your-digital-workspace-and-enhance-ux\/#primaryimage"},"thumbnailUrl":"https:\/\/eadn-wc05-13529174.nxedge.io\/wp-content\/uploads\/2024\/03\/IGEL-WEEKLY.png","articleSection":["Podcast"],"inLanguage":"hi-IN","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/xentegra.com\/resources\/88-igel-weekly-get-in-the-know-reveal-blind-spots-in-your-digital-workspace-and-enhance-ux\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/xentegra.com\/resources\/88-igel-weekly-get-in-the-know-reveal-blind-spots-in-your-digital-workspace-and-enhance-ux\/","url":"https:\/\/xentegra.com\/resources\/88-igel-weekly-get-in-the-know-reveal-blind-spots-in-your-digital-workspace-and-enhance-ux\/","name":"88: IGEL Weekly: Get in the Know \u2013 Reveal Blind Spots","isPartOf":{"@id":"https:\/\/xentegra.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/xentegra.com\/resources\/88-igel-weekly-get-in-the-know-reveal-blind-spots-in-your-digital-workspace-and-enhance-ux\/#primaryimage"},"image":{"@id":"https:\/\/xentegra.com\/resources\/88-igel-weekly-get-in-the-know-reveal-blind-spots-in-your-digital-workspace-and-enhance-ux\/#primaryimage"},"thumbnailUrl":"https:\/\/eadn-wc05-13529174.nxedge.io\/wp-content\/uploads\/2024\/03\/IGEL-WEEKLY.png","datePublished":"2023-12-05T00:00:00+00:00","dateModified":"2026-01-30T17:56:59+00:00","description":"This week, we discuss a hybrid workspace that requires different approaches to how endpoints are deployed, used, managed, and controlled.","breadcrumb":{"@id":"https:\/\/xentegra.com\/resources\/88-igel-weekly-get-in-the-know-reveal-blind-spots-in-your-digital-workspace-and-enhance-ux\/#breadcrumb"},"inLanguage":"hi-IN","potentialAction":[{"@type":"ReadAction","target":["https:\/\/xentegra.com\/resources\/88-igel-weekly-get-in-the-know-reveal-blind-spots-in-your-digital-workspace-and-enhance-ux\/"]}]},{"@type":"ImageObject","inLanguage":"hi-IN","@id":"https:\/\/xentegra.com\/resources\/88-igel-weekly-get-in-the-know-reveal-blind-spots-in-your-digital-workspace-and-enhance-ux\/#primaryimage","url":"https:\/\/eadn-wc05-13529174.nxedge.io\/wp-content\/uploads\/2024\/03\/IGEL-WEEKLY.png","contentUrl":"https:\/\/eadn-wc05-13529174.nxedge.io\/wp-content\/uploads\/2024\/03\/IGEL-WEEKLY.png","width":1100,"height":600},{"@type":"BreadcrumbList","@id":"https:\/\/xentegra.com\/resources\/88-igel-weekly-get-in-the-know-reveal-blind-spots-in-your-digital-workspace-and-enhance-ux\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/xentegra.com\/"},{"@type":"ListItem","position":2,"name":"88: IGEL Weekly: Get in the Know \u2013 Reveal Blind Spots in Your Digital Workspace and Enhance UX"}]},{"@type":"WebSite","@id":"https:\/\/xentegra.com\/#website","url":"https:\/\/xentegra.com\/","name":"\u091c\u093c\u0947\u0928\u091f\u0947\u0917\u094d\u0930\u093e","description":"","publisher":{"@id":"https:\/\/xentegra.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/xentegra.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"hi-IN"},{"@type":"Organization","@id":"https:\/\/xentegra.com\/#organization","name":"\u091c\u093c\u0947\u0928\u091f\u0947\u0917\u094d\u0930\u093e","url":"https:\/\/xentegra.com\/","logo":{"@type":"ImageObject","inLanguage":"hi-IN","@id":"https:\/\/xentegra.com\/#\/schema\/logo\/image\/","url":"https:\/\/eadn-wc05-13529174.nxedge.io\/wp-content\/uploads\/2023\/06\/1519903807641-min.jpg","contentUrl":"https:\/\/eadn-wc05-13529174.nxedge.io\/wp-content\/uploads\/2023\/06\/1519903807641-min.jpg","width":200,"height":200,"caption":"XenTegra"},"image":{"@id":"https:\/\/xentegra.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/XenTegra\/","https:\/\/x.com\/xentegra","https:\/\/www.linkedin.com\/company\/xentegra-llc"]},{"@type":"Person","@id":"https:\/\/xentegra.com\/#\/schema\/person\/84736408f096bfd92b80305aea8846a7","name":"Chase Newmyer","image":{"@type":"ImageObject","inLanguage":"hi-IN","@id":"https:\/\/secure.gravatar.com\/avatar\/d46cd44f0bd433dc5a386cbac549c62fd92266e3951669c705b347be2130cca3?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/d46cd44f0bd433dc5a386cbac549c62fd92266e3951669c705b347be2130cca3?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d46cd44f0bd433dc5a386cbac549c62fd92266e3951669c705b347be2130cca3?s=96&d=mm&r=g","caption":"Chase Newmyer"},"url":"https:\/\/xentegra.com\/hi\/resources\/author\/chasenewmyer\/"}]}},"_links":{"self":[{"href":"https:\/\/xentegra.com\/hi\/wp-json\/wp\/v2\/posts\/65865","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/xentegra.com\/hi\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/xentegra.com\/hi\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/xentegra.com\/hi\/wp-json\/wp\/v2\/users\/7"}],"replies":[{"embeddable":true,"href":"https:\/\/xentegra.com\/hi\/wp-json\/wp\/v2\/comments?post=65865"}],"version-history":[{"count":1768,"href":"https:\/\/xentegra.com\/hi\/wp-json\/wp\/v2\/posts\/65865\/revisions"}],"predecessor-version":[{"id":716291,"href":"https:\/\/xentegra.com\/hi\/wp-json\/wp\/v2\/posts\/65865\/revisions\/716291"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/xentegra.com\/hi\/wp-json\/wp\/v2\/media\/65861"}],"wp:attachment":[{"href":"https:\/\/xentegra.com\/hi\/wp-json\/wp\/v2\/media?parent=65865"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/xentegra.com\/hi\/wp-json\/wp\/v2\/categories?post=65865"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/xentegra.com\/hi\/wp-json\/wp\/v2\/tags?post=65865"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}