What 'Consumerization of IT' Really Means For IT 214
snydeq writes "Nathan Clevenger examines the impact that the 'consumerization' of information technology will have on IT organizations, a trend fueled in large part by employee interest in the latest mobile devices, notably the iPhone and iPad. The growing practice of introducing new technologies into consumer markets before industrial markets stands to cause a sea change in the IT/user relationship, Clevenger writes, adding that this will likely involve 'painful changes in the status quo of corporate IT,' including the need to 'shed our arrogance' to give the underlying technology a chance to succeed. 'Although the debate around the impact of consumerization will no doubt continue for some time, the adoption of mobile technologies and enterprise applications is moving forward, whether or not IT departments are on board,' Clevenger writes, in large part because the trend provides companies with a strong opportunity to improve efficiency, productivity, and profit."
Sarbanes-Oxley (Score:3)
'Nuff Said.
Re: (Score:2)
In addition to the regs, I'm just curious as to how the consumer is going to run out and buy things with product names like "Clariion", "Catalyst 6509", "F5 big-ip", "vSphere", "Oracle RAC", "Xeon", and the like. Hell, you'd have a very rough time finding desktops/laptops with SAS drives, dedicated RAID cards, or anything near to using fiber. I also serio
Sure, some things and components can be consumerized, but I'm just not seeing this 'consumerization of IT' being as all-pervasive as TFA implies that it i
Re: (Score:2)
heh - forget the "I also serio" part... stupid half-completed thoughts... :)
Re: (Score:2)
Sure, some things and components can be consumerized, but I'm just not seeing this 'consumerization of IT' being as all-pervasive as TFA implies that it is.
I had one user tell me that we *have* to support AirPrint so users can print from their iPads. He said that as soon as we do that, IT will save a bundle since people will start abandoning desktops and laptops and move solely to the iPad since printing is the last thing keeping them on traditional computers.
So I pulled out the last 10 purchase requisitions for computers and pointed out that all of them included dual monitors (even for laptops), and wondered why if people are so willing to work on a 10" iPad
Re: (Score:2)
Users like fads?
Re: (Score:2)
Those dual screens are stacked vertically, right? Since that's the only way to make modern monitors useful.
So Arrogent...but, typical of todays IT department (Score:2)
A user has asked for Airprint to be supported. a quick google search of "windows airprint", gives instructions how to do it. its an easy fix.
However, you rather tell your users they should be using windows 7 instead.
Re: (Score:2)
A user has asked for Airprint to be supported. a quick google search of "windows airprint", gives instructions how to do it. its an easy fix.
However, you rather tell your users they should be using windows 7 instead.
No, you're reading too much into my post. I told him to come back to me when he has a corporate supported iPad (we do have some) since we don't allow personal devices on our internal network, and we'll help him make printing work. Unlike users, I have a regulatory mandate to protect our network from rogue devices.
I certainly didn't recommend Win7 as a solution since 30% of the devices on our network run OSX (including the laptop on my desk).
If the company is willing to relieve me of my responsibility to pr
Re: (Score:2)
Re: (Score:2)
>In the enterprise, the tablet will replace the laptop once efficient docking, keyboard, mouse and multiple monitor support exist.
I'm trying to figure out if this is a sarcastic jab at the current iPad trend.
I.e., tablets will be good enough for business they have integrated keyboards, mice/trackballs, docking support, and monitor output: i.e., a laptop computer.
Re: (Score:2)
Re: (Score:2)
'Nuff Said.
Not really. Its like saying OSHA makes it mandatory for all businesses to provide uniforms for personnel; after all clothing is a safety issue for virtually all non-desk jobs.
...yep (Score:2)
Re: (Score:3)
If the device cannot be properly secured so as to ensure the requirements of these laws are met, then, yes, these laws very much preclude the use of the device.
Re: (Score:2)
This soundss exactly like the reaction of an 80s MIS shop to personal computers. At first they were banned, then they supported by the finance guys (Visicalc, Lotus 1-2-3) who brought in contractors (that was me) to get the tech support not available from the mainframe guys. Now look, we can't function without Outlook and Google, and the PC IT folks are gearing up to ban the next generation.
Consider this: Information is something you cannot control, any more than you can control people.
Re: (Score:2)
Especially when computer led "productivity" enhancements in reality are all about replacing people with computing power and also replacing expensive skilled people with cheaper partly trained button pressers. Technically the more powerful the devices, the fewer people required and the lower the skill set needed, hmm, until something goes wrong, then kablowie, it's somebody else's problem and the implementers are out of there with their bonuses and golden parachutes. Mainly because the efficiencies gained d
Re: (Score:2)
Re: (Score:2)
That's not 'HIPPA', it's 'HIPAA', as in Health Information Protability and Accountability Act.
Re: (Score:2)
What's wrong with IT? (Score:2, Insightful)
The parent post demonstrates many of the problems with modern IT departments.
Firstly, note the unnecessary and repetitive use of derogatory terms for customers and general profanity. Hardly professional.
Second, complaints that the users are undermining IT perfect systems by buying devices or installing software. Basic economics tells us that users are investing money and time in these thing because they deliver value. Value that It is not delivering to a demand from their user base.
Thirdly, complaints about
Re: (Score:2)
Second, complaints that the users are undermining IT perfect systems by buying devices or installing software. Basic economics tells us that users are investing money and time in these thing because they deliver value. Value that It is not delivering to a demand from their user base.
Value to whom? Value to the user doesn't imply value to the company. It can very well mean negative value to the company, when the user is unable to run software or access server functions that the company requires, the user needs support for a device that IT has no idea how to support, or the company loses data because the device isn't backed up, or when HR is unable to figure out just who downloaded child porn during work hours, only that it wasn't on company equipment.
Or, and this is a real example fro
Ah obviously your not an admin (Score:2)
If you dont know that users are incredibly stupid you should hand in your geek card and leave Slashdot.
If IT is responsible for security so they have every right to be a law unto themselves, as THEY will be held responsible for the secutiry braeches that follow.
I am guessing you wanted to do something stupid and are pissed because IT told you to F off.
Re:What's wrong with IT? (Score:5, Insightful)
Right or wrong, I can tell you from where that originates.
Most people would never fault a paraplegic, who is in a wheelchair, for being unable to do jumping jacks. He would probably love to do them. He really cannot. It is "cannot", not "will not". Likewise, most people would not fault a diagnosed mentally retarded person for being unable to understand simple things. Chances are, no one has a harder time not hating that than he. There is no point and no profit in blaming either of those, and doing so would indicate extreme heartlessness and lack of understanding.
The problem is, there are large masses of people who have no disabilities of any kind. They are capable of abstract thought, of following simple instructions, of performing at least a minimal search for something and only asking for help if that doesn't find what they are looking for. They can do all of these things. Yet, a great many of them refuse to think. They don't want to use whatever thinking they can perform. By that I don't mean anything extreme or over-the-top or unreasonable. By that I mean an unnaturally high degree of helplessness, a freakishly strong desire for handholding even when this would take much more time than a two-minute Google search they are more than capable of performing.
Thinking is for "the help". That's grunt work for the computer janitors to do for them. It would not even occur to them to try. Thus, for most tech support lines, the one person who truly has a real problem that really does require the attention of a technician gets to wait on hold for 10-45 minutes because the lines are tied up by people who failed to read page 1 of the manual, the help file, the README file, the FAQ, the Web site, and the last e-mail they received.
This is the mentality with which you are dealing. You can gloss over it and cover it up with your grand notions of service, but you're patting yourself on the back to forget how much youre tempted to apply a cat-o-nine-tails to theirs. In a way, it truly is a trophy to be able to deal with that without getting a severe headache. After a while you can start to believe that you're just that eager to serve. I consider it a coping mechanism. The truth is, that mentality invites failure, asks for failure, begs for preventable problems, and tries very hard to defeat itself with problems of its own creation. It just so happens that they hired you to stand between themselves and any such consequences.
So you end up having to defend a network from both outside threats and the self-defeating, shortsighted actions of insiders who meant well. This isn't a fun position in which to find oneself. Oh, and if you lock it down too much, you will be swamped with complaints about functionality. It's like trying to simultaneously satisfy multiple contradictory conditions.
Most of those conditions wouldn't be contradictory if only users would attain the slightest clue pertaining to the tools they use every day. I am not talking about the knowledge of a skilled mechanic. I am talking about knowing how to drive. Lots of highway accidents didn't require an auto mechanic to prevent; they required a driver who understood how to drive. IT is like this. I do not refer to the skill needed to smelt iron ore, forge pig iron, and craft a hammer. I refer to the fact that a carpenter knows how to use his tools, even though they are not the goal of his job. So it is with workers who use computers but should not need to become experts. They only need to know basics. They refuse to learn them in a way that a driver could never refuse to learn to drive and expect to get away with.
Just as there's no point in being well-adjusted to a sick society, there's no point in seeing all of this and telling yourself that it is normal and should not change. The crux of the matter is whether you can know how fucked up it is and still deal with it patiently, educating those who will be educated and assisting the rest as much as you can. Making excuses for it and debasing yourself is just weak.
Re: (Score:2)
I'm sure someone will post the obligatory XKCD... but it truly is amazing how many of the user's problems the technician solves by reading the documentation. Of course, the user has convinced themselves that this stuff is impenetrable, and so the words are just so much line noise to them. Oh and by the way, they have no idea what a line is, or what noise is. Best to just enjoy job security because the world is complicated, people specialize because you can't learn everything, and at the end of the day, not
Re: (Score:2)
I'm sure someone will post the obligatory XKCD... but it truly is amazing how many of the user's problems the technician solves by reading the documentation. Of course, the user has convinced themselves that this stuff is impenetrable, and so the words are just so much line noise to them. Oh and by the way, they have no idea what a line is, or what noise is. Best to just enjoy job security because the world is complicated, people specialize because you can't learn everything, and at the end of the day, not all of us can be geeks. Whether that's a good or bad thing, we could debate until 1 became 0.
The commentary was more about the way human beings choose to deal with the world, their refusal to invest anything in it, the fact they are still so willing to complain, etc. Job security wasn't what I was addressing.
The difference between a technician and a babysitter is more like what I was writing about. Many, many "babies" are well into middle age...
Re: (Score:3)
... No.
Firstly, note the unnecessary and repetitive use of derogatory terms for customers and general profanity. Hardly professional.
If you think auto mechanics don't tell stories about the twit stepford wife who drives a $100,000 sports car for a year and a half without having the oil changed?
If you think that electricians don't tell stories about the moron who tries to splice cable themselves and gets a good jolt or goes to the hospital for their trouble?
I could go on, but every profession has a word (or
Couple of items ... (Score:2)
Complete agreement. But I think some editing would help your case.
... and ...
Re: (Score:2)
Re: (Score:2)
have you so little faith in your network that you cant defend yourself from the users?
No, but often defending the network from the users means that certain things have to be handled in a way that you wouldn't do in someone's home network environment.
Believe it or not, IT security concerns for a University, Hospital, or large-scale (or even smaller-scale) business, from a law firm to department store chain, make it so that they are a completely different environment from the knocked-together, wide open "home
Re: (Score:2)
Re: (Score:2)
Believe it or not, IT security concerns for a University, Hospital, or large-scale (or even smaller-scale) business, from a law firm to department store chain, make it so that they are a completely different environment from the knocked-together, wide open "home network" involving someone bringing a $25 router home from Best Buy, plugging it into a DSL modem, plugging their home PC in and setting their laptop to talk to a wide-open wireless network that has named itself "Netgear", and never bothering to configure the security setup or even make sure that their laptop's administrator password isn't blank.
Did you find that straw man a satisfying opponent? GP said that your infrastructure should be able to handle attacks from within, and GP is right. You argue that you have to take this stuff more seriously than the average user, but then you tell us that you're incapable of doing so. What happens when some jerkoff who's not even supposed to be there tries to get on your network? If you're prepared for that, you'll be prepared for doctors trying to use poorly-secured IOS devices.
Re: (Score:2)
If you're prepared for that, you'll be prepared for doctors trying to use poorly-secured IOS devices.
Sigh.
The proper response to the poorly-secured devices is to not let them onto the network. The entire argument going on here is that people who don't understand what they are doing want to simultaneously have a "secure network" while letting any random device that someone may bring from home onto it.
Now, can you set up a "walled garden" for guest-level devices to play in? Sure. But I can guarantee you, a "w
Re: (Score:2)
If you're prepared for that, you'll be prepared for doctors trying to use poorly-secured IOS devices.
Sigh.
The proper response to the poorly-secured devices is to not let them onto the network. The entire argument going on here is that people who don't understand what they are doing want to simultaneously have a "secure network" while letting any random device that someone may bring from home onto it.
Now, can you set up a "walled garden" for guest-level devices to play in? Sure. But I can guarantee you, a "walled garden" won't touch the stuff that Mr. Gotta Have New Shiny Toy wants it to touch.
And we are telling you that saying no to everything IS NO LONGER VIABLE. The barbarians are at the gate, my friend. Will you be Denethor or Theoden? While you stand in your fortress or will you ride out to the Rohirrim?. It is fools like you i enjoy steamrolling in I.T. meetings. Your entrenched position is no longer safe. We are coming for YOU.
Re: (Score:3)
Oh please.
You are the exact sort of fuckwit Denethor was. He ruined his country by insisting on using an illicit Palantir behind the firewall.
Maybe you were forgetting that little part in your haste to misquote Tolkien?
Re: (Score:2)
>No one is saying let any old cheap chinese crap android tablet on your network,
Lol! I think he means that expensive iStuff from the same Chinese factory as the cheap stuff should be allowed.
Anyway, what is the security difference supposed to be between the cheap and expen$ive stuff?
Re: (Score:2)
Firstly, you are a superior dick.
Secondly, there are laws that would put me in jail if I was negligent in protecting corporate data.
Thirdly, I'm not paid to troubleshoot your screwed up home network.
Fourthly, you have no fucking clue what you are talking about. Yes, basic key separation is superior, but you do not protect a high security key with 4 digits, especially when research shows that 80% of the time, you can get in within 10 tries. Your phone is not a PC, but it is storing data that needs to be se
Re: (Score:2)
Re:What's wrong with IT? (Score:5, Insightful)
Wish I had modpoints to mod this up.
This is precisely the problem. In an ideal world, users would stick within usage policies and requirements. When there was a policy for equipment requests, for support of personal devices, they'd follow it.
That's fantasyland. In the real world, IT is stuck between a rock and a hard place. Between "supporting the users" and defending the network from the users. Damned if they do, damned if they don't, and taken through the wringer the moment some bad-apple employee makes off with company property or leaks trade secrets that have been copied to a USB memory stick. Or lets loose something on the network because they just can't resist clicking on "OMG FREE PUPPY SCREENSAVER."
The problem is that IT has to deal with five categories of user. They're easy to categorize.
1. Knows nothing. KNOWS they know nothing. Ask questions often, but ask questions before they cause trouble. Not a major source of trouble, just use up a certain amount of time.
2. Technically savvy, follows procedures. When these guys call, it's going to be a doozy, but they've got a ton of troubleshooting steps ready and a list of things they have done for you to look at. When they come in with a new gadget, they're willing to give IT the time to research how best to support it.
These two categories are not the problem, because they approach IT as coworkers to work with.
3. Knows just enough to cause trouble. Believes themselves technically savvy. Will lie out their asses rather than admit to flailing around and making the problem worse.
4. Knows nothing, but wants the Latest Shiny Thing and wants it to Just Work Like It Does In The Commercials.
These are the problem. These types of users are the ones who get into large amounts of trouble and take up the majority of troubleshooting time, mostly because they are not treating IT as co-workers to be collaborated with, but someone to be bossed around. These are the sort of user who treats passwords as a hindrance, rather than keys to important locks. They wouldn't leave the combination to the company safe in the open, but they think nothing of leaving their username and password on a sticky-note under the keyboard.
The final type of user, the one every IT person dreads and prays never to encounter but has to protect against anyways, is the user who is actively trying to sabotage the network or do something outright illegal on it. And yes, sometimes protecting against these users inconveniences the other users.
Name a profession where "customers" hold a dual position of know-nothing and know-it-all, and you'll name a profession where the true masters have derisive stories to tell behind "customers'" backs.
One of the arguments is about a person who is berating her IT department for the fact that her laptop won't work at home. Apparently, they told her repeatedly to call her ISP, and she refused to do so. The very picture of the uncooperative user who refuses to work with IT to solve the problem.
And yet, Mr. DeathSquid accuses the GPP of being incompetent, saying "a competent network engineer could diagnose that in minutes". Well, I reread GPP's post, and it appears that they did in fact have it correctly diagnosed, but that the problem was an intractable, uncooperative user who simply shouted "you fix it" at the IT department rather than holding up her end of the bargain to call her home ISP.
I'm willing to bet that this is the kind of stuff Mr. DeathSquid does to people in IT all the time. When you're dealing with coworkers, you have to be willing to look at things from their perspective. When IT says the problem appears to be with your home connection, and that you're the one who will need to call your ISP to have it checked, the proper response is to call your ISP, not shout at IT and yell at them for "not fixing it."
Re: (Score:3)
I will quote from the GPPPPP:
"but she wouldn't admit the possibility or even call AT&T until we made her try it when she was visiting her brother in another state and her laptop worked fine in his house (with his open wireless connection). Instead, we were treated to 3 weeks of "why can't you fucking people make my laptop work at home" from her."
It sure as hell looks to me like they knew for a hell of a long time that her DSL was down, but she was refusing to call them. In other words... the user was be
Re: (Score:2)
You complain that IT should be involved by co-workers "from the start". Perhaps you should to reflect on how your behaviour might be anathema to your goals?
This line is 100% spot on, if you want to be involved from the start them make your coworkers problems your own and help them solve the business problem. Build that relationship and you'll find you'll be invited to things from the start.
Re: (Score:2)
Re: (Score:2)
Excellent point.
You have a large business where lawyers and MBA's have made the rules, and IT is expected to implement the rules they wrote.
In a hospital in the US, you have to implement policies in line with medical privacy and records security policies that have a basis in federal law.
In a university in the US, you have to implement policies in line with student record privacy and records security policies that have a basis in federal law.
In most other places, you are bound by some level of law and PHB-le
Re: (Score:2)
Hate to rain on your parade but the world is changing, employees and customers are becoming technologically enabled and corporate IT will have to adapt. I work for a global healthcare company and this is how we address the issues you raise.
- thousands of morons with newly bought insecure devices grab them from the shelves and expect to plug them in behind the firewall at corporations or businesses where trade secrets, GLBA, HIPPA, FERPA, and other privacy or security regulations exist.
Don't let them plug them in behind the firewall, but as important give them a means to access the Internet and come in via your external secure gates into your corporate network. We do this via having a wifi network which is effectively air gapped from the corporate netwo
This article was written by Upper Management (Score:5, Insightful)
"As perceptive CIOs seek to transform their rigid, legacy ridden infrastructures into agile, efficient, service-driven delivery mechanisms, they must adopt a pragmatic approach to managing the risks of consumer IT while embracing the benefits.
I stopped reading right there.
Re: (Score:2)
Written by Upper Management, for Upper Management, who will then use their special Upper Management powers to make this the norm in their businesses, including probably yours.
If I were you, I'd keep reading so that I'd make sure to stay one step ahead of my Upper Management, and keep my job.
Re: (Score:2)
Know how I know that? It's four pages long, yet doesn't say anything.
"As perceptive CIOs seek to transform their rigid, legacy ridden infrastructures into agile, efficient, service-driven delivery mechanisms, they must adopt a pragmatic approach to managing the risks of consumer IT while embracing the benefits.
I stopped reading right there.
Upper management? Nope. Some lucky consultant got a high paying gig that probably only cost him a decent meal for a buddy.
Re:This article was written by Upper Management (Score:4, Insightful)
Well, nice way to judge based on a Gartner quote. It's a shame you stopped reading right there - the very next paragraph shows why this is important.
In 2005, the idea promoted by Gartner that consumerization would be the most important trend of the next decade might have been controversial. But traction from the iPhone, which went from 0 percent adoption to 80 percent of Fortune 100 companies between June 2008 and June 2010, undeniably demonstrates the powerful impact of this trend.
Management and business leaders have their own technical language, funnily enough. Just as technologists have developed a specialized terminology to efficiently and unambiguously communicate their thoughts, other niches also have ways of saying things which might appear cumbersome or unwieldy (or downright impenetrable) to outsiders but which have a crisp meaning to the users.
That paragraph has a fair few buzz words, admittedly, but it's pretty clear what it actually says. Innovation is happening at the consumer device level, and CIOs can look to that arena and figure out a strategy to get the best technology into their environment, or they can let their networks stagnate. Seriously, how hard is that to parse out?
If you'd gone on further, you'd have seen a fantastic exceprt at the bottom of page two about an IT department for Hyatt Hotels taking the iPad and proving how it could really help the organization. And it's even relatively business buzz word free, for your convenience.
Ironically, just a wee bit further on is this snippet:
IT groups have to "shed our arrogance" to give the underlying technology a chance to succeed.
Next time, get over yourself and read the damn article. You might learn something. Or, there again, with your attitude, you might not.
Re: (Score:2)
Most of the time it's pretty darn obvious that the upper managers just want the latest toys to show off to their upper manager friends so they can compare their iPenis sizes. Another reason is because CIOs don't like it when their kids have better technology then they do. So they tell IT to take this technology, implement it now and we can figure o
Re: (Score:2)
I can't disagree with you. In fact, the article even supports this by talking openly about the security issues.
Believe me, I have clients who just don't understand why they can't go to dell.com and order a server and have us plug it into out network. I well remember many years ago when someone circumvented IT and specced out a server on IBM's web site and talked procurement into buying it. They saw big, honking fast, expensive, had to be amazing, right? Problem was the server they ordered was ideal for a sp
Re: (Score:2)
I'm a firm believer that upper management should never make the fine-grained decisions (which hardware to buy, which software package to implement). Those decisions should only be made b
Re: (Score:2)
By saying "No", a lot of the time.
Obligatory car-related analogy: "But waiting at the crosswalk for the light to change is boring, and it takes too long, I want to use this vaulting pole!" where waiting for the light to change is securing your communications, and the pole is your iGadget device.
Management needs to be forced to understand that you can have neat gadgets/convenience, or you can have security. Not
Re: (Score:2)
This comes up every couple years when there's a new doo-hickey-thing-a-ma-bob released (now with Sprinkles!) and the users of the world clamor for it.
When IT insists these devices be vetted for "security and compatibility" they're accused of "foot-dragging, turf-protection, and ivory-tower arrogance!" If they just allow people to use anything and there's a security breach IT is blamed for being "lax about security." The classic Kobayashi Maru "No-win scenario" for the IT admin.
Your best hope is to state you
Re: (Score:3)
It's the internet. Get off your high horse.
Re: (Score:2)
In 2005, the idea promoted by Gartner that consumerization would be the most important trend of the next decade might have been controversial. But traction from the iPhone, which went from 0 percent adoption to 80 percent of Fortune 100 companies between June 2008 and June 2010, undeniably demonstrates the powerful impact of this trend.>/quote>
Buying your CxOs and allowing other suits to use an iPhone to for phone calls and pictures of their children doesn't imply "adoption". It's a perk, not an adoption.
Once you buy them for the janitors and sysadmins (but, I repeat myself), teach help desk how to support them, and redo your internal applications so they actually work with an iPhone, then you have adopted the iPhone.
Re: (Score:2)
Know how I know that? It's four pages long, yet doesn't say anything.
"As perceptive CIOs seek to transform their rigid, legacy ridden infrastructures into agile, efficient, service-driven delivery mechanisms, they must adopt a pragmatic approach to managing the risks of consumer IT while embracing the benefits.
I stopped reading right there.
Why did you quit reading? Did you get a Bingo?
Re: (Score:2)
"arrogance"? (Score:5, Insightful)
I don't think you understand what "underlying technology" means.
This isn't about the wireless standards that the phones adhere too.
Or any of the other REAL technologies.
This is about security and accountability.
Who is responsible for the data on your iPad when it is stolen?
What is the process AFTER it is stolen?
Re: (Score:2)
Watch all the companies run for the hills the first time Anonymous or Wikileaks gets a ton of data some fool stored on an insecure, wide-open "Cloud Service" like Dropbox...
Re: (Score:2)
Some of the requirements are that the device be kept locked and that they grant the company the ability to remote wipe it.
IOW the device becomes the company's.
How about putting the data in some format where it won't be cached on the handheld and letting mobile users access it while connected? Like, say, in flash? Oh wait, IOS devices don't have flash. Since Apple is a dick, I guess the remaining option is to write some kind of dynamic application that delivers the data in a form the user can't conveniently save, such as image data.
There are other security related requirements, but that is just the cost of being able to use your phone/tablet.
Giving someone else the right to remote wipe the device is not a working solution. That gives awa
About time. we are talking about this (Score:2)
Re:About time. we are talking about this (Score:5, Insightful)
Your computer is going to be a MID that docks when you get to your desk and then syncs to the cloud storage (intra/inter-net). When it docks up it will be much like a traditional desktop you see now.
Right. So you're going to take your corporate desktop home with you in your pocket, and when you accidentally leave it on a train...
No corporation in their right mind wants people walking out the door with documents and software that they don't have to take out of the building with them.
Re: (Score:2)
Right. So you're going to take your corporate desktop home with you in your pocket, and when you accidentally leave it on a train...
If it's actually protected by a password, and the documents are encrypted, no problem.
If not, it sounds like IT forgot to remind people of how to secure data, and instead were relying on people not copying things from their unsecured network.
I'll field this one. (Score:3)
Didn't you get the memo? IT is "legacy" now. It's all about empowering the end-users to develop their end-user creativity without the restrictions of the IT way.
If keeping un-encrypted documents on an un-managed device without a password helps that end-user be more "productive" then who are YOU to say no?
IT didn't forget to remind anyone. This is about t
Re: (Score:3)
Yes, IT is holding back the end-users and their iPads.
It's always the end-user's responsibility to safeguard data, whether it's on their iPhone or printed out in their briefcase.
IT, by trying to be in control of everything, insists on disempowering users by refusing to allow them to use any such devices.
It's false security. It costs more than the problem you're trying to prevent. Give the user an encrypted container and show them how to use it and tell them that's where all business data goes.
Enterprise S
Have you ever worked with end-users? (Score:2)
No. There is a HUGE difference between physical documents and electronic files. The end-user cannot be relied upon to know how to make sure all the copies of a document are deleted from their toy-of-the-month. Nor can they be relied upon to perform the necessary actions even if they did know.
Re: (Score:2)
For example, don't wait for them to figure out how to access their email from their iPad to educate them about security, implement a secure container system like Good and tell everyone, "If you want to use your iPad to access work email, go to this website to set it up."
The problem with Good is that it doesn't actually integrate with the user's device - it sits on the top like an unsightly wart. We implemented it in our company and the initial "great, I can get email on my iPhone and iPad" has quickly turned into "why can't we have proper email and calendar access?" Usage (traffic) levels have fallen by more than half, but our licensing costs remain absurdly high for a product that offers little more than webmail on iOS. To me, this is the danger of the consumerization con
Re: (Score:2)
Re: (Score:2)
Nobody's ever been given the keys to a company car?
Why do we still have passwords??? (Score:2)
I have conducted user training on password complexity.
Then I did a password audit a few months later and the percentage of users using "password123" or a permutation of that had declined from 20% to 18%.
Disempowring them, was, unfortunately, the only effective solution.
Everyone hates them, the monthly change of password to something that hasn't been uses the last umpteen times, for the sake of security.
A fingerprint reader can be purchased for $50..... So, why, still do the IT departments want to put their staff through the password mangle??
Re: (Score:3)
If not, it sounds like IT forgot to remind people of how to secure data
I remind them *how* all the time. That doesn't mean they understand me, or that if they do understand me, that they are willing to actually do it.
Mod parent up. (Score:3)
From TFA:
There is a HUGE difference between ordering a pizza and keeping confidential documents on your iPhone.
The best part is that the Best Buy CTO cannot identify his ow
Re: (Score:3)
Right. So you're going to take your corporate desktop home with you in your pocket, and when you accidentally leave it on a train...
No corporation in their right mind wants people walking out the door with documents and software that they don't have to take out of the building with them.
Are they hiring? That would free up a good 15GB of code checkouts from my laptop and there'd be no chance of getting work done on the plane trip to the next on-site meeting.
Re: (Score:2)
Do you have a VPN to securely access your environment?
The iPad can't do that.
To be fair, there *is* a Cisco AnyConnect VPN client for iOS devices. I use it on my iPod Touch from time to time. There's also an integrated IPSEC client.
Re: (Score:2)
And we've never heard of laptops being lost and compromising vast amounts of corporate data. Let's let even the lowliest of n00bs have everything on their phone!
Re: (Score:2)
MIDS are going to march into corporate I.T. like a storm. A huge sea change in the way we develop and deploy solutions is coming. We are seeing the beginning of the end of MS as the corporate go-to solution, at least their current offerings. Sure people will still use MS infrastructure crap for decades, but the desktop as we know it is going to die. Your computer is going to be a MID that docks when you get to your desk and then syncs to the cloud storage (intra/inter-net). When it docks up it will be much like a traditional desktop you see now.
I really don't understand the whole MIDS thing -- why would I want a device in my pocket powerful enough to run my financial forecasting spreadsheets and display them across 3 monitors? Seems much better to have a central repository for my data (i.e. my office network) and VPN in to access it remotely. Or at the very least, carrying a 32GB MicroSD card around with all of my data seems much more portable and easier than carrying some powerful MIDS. I can keep that MicroSD card in my phone so I can look at a
Re: (Score:2)
Re: (Score:2)
I don't understand this. Cant it do both? Can't it be both a cloud end point for some types of data and a data processor for others?
Yes. And unicorns will fly out of its butt while doing so.
I would rather we design tablets with great peripheral integration, and the ability to become desktop/laptop with accessories.
But you just said that laptops suck. Now you're trying to build a kludgy pseudo-laptop out of a tablet with a ton of accessories, which will cost twice as much as a more capable laptop.
why people should read history. (Score:2)
Re: (Score:2)
Re: (Score:2)
Every decade or so, we have some new consumer computing device come along and people say, "We have to loosen
Consumer devices are not ready for enterprise... (Score:2)
One of our employees rushed us to finish the configuration of a
Re: (Score:2)
Re: (Score:2)
It just gets difficult when we have a user come up and state, "I just bought personal Device XYZ and want you to hook it up to your network." We haven't tested, don't know that particular OS's layout, etc.
And some devices you just can't, for sake of policy reasons, etc. At least not yet. Lotus Domino is JUST NOW beginning to support full push to Android, and we're s
Re: (Score:2)
It would be nice if they built in the enterprise stuff a little more core to the OS, and just left it "turned off" for consumers. Then, if you're an enterprise, you can more closely integrate it into the environment.
It would also be nice to not have to use iTunes to do fine-tuning on the configuration, especially how they tie a device to a computer/Ap
easy: your mom should grok it (Score:2)
a while back I was working sales in a dev shop. My mantra was: our apps should be so easy to use that your mom should be able to use them. Not you, not me, not your GF... your mom. And I'm not talking about that ubercool geeky mom, I'm talking about the one who gets lost because an icon moved 2 inches to the left...
I regularly got shot down for dumbing things down too much... I still sure I was right, though.
Re: (Score:2)
it depends on whether you're talking features or ergonomics. And of whether your app is *supposed* to be usable by all, or only by a select few. I can understand your point, but, also, there's a perverse developer pride in making something so complicated that barely anyone can use it. Complexity != power, nor versatility.
It's OK to have features that very few users ever use. It's no longer OK though, if those "rare" features obscure the "frequent" ones. And, in my experience, oftentimes even barebones apps
Comment removed (Score:3)
Anyone remember what the "P" in PC means? (Score:2)
From my 1970's/1980's perspective, everything started at as consumer technology. The "P" in "PC" stands for "personal computer" -- the PC was IBM's entry into the market to compete against the home computers of the Atari 800, Apple ][, and Commodore 64. To this day, I have this stereotype stuck in my head, and when I think my hotel reservations, bank account info, brokerage account, etc. are probably being handled by Windows or Linux servers I can't help but think, "I can't believe they're storing all thi
Re: (Score:3)
What does the "C" stand for?
Burned at the Stake (Score:2)
In a dictatorial regime heretics are burned.
In a company with a top down command structure those that violate policy without regard will be fired. That's not saying that new technology will be stifled, but to say that the policy will change to accommodate the new technology. The old gaurd will take up positions within the new regime as fast as you can sneeze. Already iphones and ipads in my organization are being hamstrung by old security wonks that were vocal against anything but blackberries. Now they pro
Between a rock and a hard place. (Score:3)
This puts IT departments into a difficult and often untenable position. On the one hand, their users are clamoring for the latest gadgets to be integrated into the company's business tech. On the other hand, new devices may represent major security holes, or best practices for their use and integration may not yet be established.
If some new device results in a system crash or a security breach, it'll be the IT people whose jobs are on the line, not the user who insisted on using the new device.
Hard time finding interesting work .... (Score:2)
History repeats itself (Score:2)
It is sort of like the mainframe to PC transition all over again.
But in an odd twist, we're also coming full circle. Many of the apps that make the iPad and iPhone such compelling tools rely on massive server farms in remote data centers. "The Cloud" is in a sense the modern equivalent of the mainframe.
Re: (Score:2)
Bullshit (Score:2)
Increasingly, IT has been moved from "enablers of capability" to "untrustworthy and ineffectual geeks in a closet". It's been going this way for years, and the trend is clear.
This article just lays it out in a fairly unclear, rambling fashion. The concept held for IT is pretty clear, none the less.
Who's to blame? Personally, I put it on IT and application consulting firms who back their pretty weasel words with... more weasel words. They promise the sky, and due to the timeframes involved and the complexity
Re: (Score:2)
Re: (Score:2)
Consumer-grade services (Score:2)
Consumer devices are fine. It's consumer-grade services that are the problem. If corporate users have devices that are slaves to a consumer-grade service like Apple's or Google's, they can be attacked or disabled through that service. Typically, there's no contractual recourse available.
Microsoft is more careful about this. They offer corporate control over Windows Update. If your corporate apps stop working because Apple pushed an iPhone update, you have no recourse.
Re: (Score:2)
Re: (Score:2)
Look, after years of going around schlepping their drugs to doctors, the pharm companies realized that they were going about it all wrong. Instead, they took their message to the masses, and let self-diagnosing consumers tell the doctors what they wanted.
Now, IT providers are doing the same thing, and if IT service companies (which is all any IT department really is) want to keep their piece of the pie they'll do like the doctors did and get on board.
Have you noticed how med costs have changed the last few years? =)