SlideShare a Scribd company logo
1 of 7
Download to read offline
Workplace of the Future

DIY (Do It Yourself) IT
  A series of white papers by Ade McCormack, Auridian




                        1 Auridian
Introduction

It appears that the consumerization of IT has
released the genie from the lamp. Now everybody
from the CEO to the sales executives seem to
have their own personal ‘lifestyle’ IT strategy
which has resulted in a random array of software
and hardware underpinning the organisation’s
technology infrastructure.

The speed of this phenomenon
has left many IT leaders dazed
and confused. What is their role if
they clearly have lost their grip on
technology management?
This white paper explores this
tsunami-like trend and advises on
how to respond in a manner that
both empowers the users and
protects the organisation.




                                       2 Auridian
Consumerization defined
      There are (at least) two ways to look at
      consumerization in respect of information technology:
•	  usiness-origination: Technology created with business
   B
   in mind eventually finds its way into the consumer market,
   eg. Calculators.
•	  onsumer-origination: Technology created for consumers
   C
   that are increasingly used in the corporate environment,
   eg. Tablets and Twitter.
In both cases one might argue that both users/consumers
and the technology supplier have conspired to cross the
consumer-business divide for mutual benefit.
With the consumer-origination model it is perhaps an
unfortunate side-effect that the IT function appears to be
driven out of the value chain. Or at the very least its critical
role is somewhat reduced.



      Why has this happened?
       Users have felt the IT function has held too much
       power. Whether this is true or not, the perception
exists. Some CIOs will argue that slashed budgets naturally               The IT function saw the danger in such a computing model
                                                                          
result in service degradation which often in turn results in              and found a way to replicate their original model in a
them vetoing what appear to be strategically sensible IT-                 contemporary style, hence the arrival of thin-client computing
related initiatives.                                                      and fully managed desktops. Users continued to enjoy a
As a market observer there appears to be something akin to                graphical intuitive interface, but in every other respect were
a war underway in respect of user-IT relations.                           ‘locked down’. So control shifted back across the DMZ
                                                                          (demilitarised zone) to the IT function.
The first ever (mainframe) computers gave the IT function
control. This included control over what the users could do               The Cloud, mobile computing and browser-based computing
and the ‘look and feel’ of their ‘desktop’.                               have returned control to the users. Shadow-IT (tech
                                                                          mercenaries operating covertly on behalf of the users) is now
Then the PC arrived. This was driven by the users. Now they               replaced by a credit card. Useful apps are just a click away
had their own storage and processing power. So BYOD                       and are available now and not when the IT function says they
(Bring Your Own Device) as a concept started last century.                are ready.
The users were now in control.
                                                                          The proliferation of tablets and mobile devices means that
                                                                          this model is just too compelling for users to ignore.




                                                                   3 Auridian
The DIY trend                                                     The bottom line is that we cannot hold back the tide. We
                                                                        can’t hide this from the CFO who with her new tablet sees
       Of course the ‘IT function industry’ as opposed to the
                                                                        app installations take minutes and not months and who pays
IT industry will quite rightly maintain that such a model is a
                                                                        cents instead of mega dollars. They may even feel that their
security, governance and architectural threat and thus to
                                                                        CIO has been disingenuous by not embracing this user-
varying degrees are fighting this trend.
                                                                        empowering computing model.
But remember what happened a decade or so. The PDA hit
                                                                        So again the genie is running wild. There is no going back.
the market. It was an obvious extension to the organisation’s
                                                                        Given this has the feel of outsourcing on steroids, we might
technology armoury. Enabling users to have access to
                                                                        as well capitalise on what others are good at and let them
information when away from their desks made sense. But
                                                                        build and deliver at least some of the infrastructure and
the IT function labelled them rogue-devices and managed to
                                                                        applications. Clearly the danger of ‘stove pipe’ applications
keep them outside the corporate moat.
                                                                        delivered via a variety of vendors over channels (traditional
But then came the Blackberry and the rest is history. There             / non-browser, public and private Cloud) has a stability akin
comes a point when the needs of the organisation cannot                 to a house of cards. If integration is not your forte then it is
be denied.                                                              worth virtualising the associated risk to a third party.
The BYOD trend, and increasingly the BYOA (BYO Apps)
trend is creating a DIY approach to IT. The IT function
                                                                              What is the new role of IT leaders?
no longer has an IT strategy other than to support the
personalised strategies of every single user.                                  There are a number of actions the IT leaders can
                                                                        take to both remain relevant and value-adding. The
The IT function needs to up its service game from a sheep-              following actions comprise a mixture of risk management
dip model to one that more closely resembles that of a                  and service enhancement.
butler. The IT function no longer has one customer (the
users), but a spectrum of clients which grows with every new
                                                                        Risk management
recruit to the organisation.
                                                                        It would be quite easy to accede to the users’ needs, but
Over the years we have had object-oriented systems and
                                                                        what happens when the so called high risk but highly unlikely
even service-oriented architectures. The IT functions that
                                                                        ‘Black Swan’ event takes place? Ensure the business leaders
will remain relevant in the digital economy will be those that
                                                                        understand the technical, governance and security risks
embrace people-oriented service.
                                                                        associated with a DIY approach to IT services. Better still
Technology infrastructure as a lifestyle statement is now a             obtain their permission to embrace this model. It’s not for you
reality. It reflects the power of consumer branding and also a          to decide whether the associated opportunities outweigh the
desire for users to retain the functionality they enjoy at home         risks.
when they are ‘at work’.
                                                                        CEOs will always side with a money-generating business unit
This trend is not just occurring at the on-style tablet and phone       over a whinging support function. So it is unlikely that you
end of the market. Desktops are changing too. Chances                   will be successful making a case for the recently acquired
are that whether you planned it or not, you likely have Unix            Australian operation to fall into line from a technology
underpinning a growing portion of your client devices.                  architecture if they are pushing the share price north.
The good news is that if this is handled carefully it will in fact      The best you can do is define a data specification which
reduce the technology burden on the IT function, enabling it to         details the data that must be delivered to ‘head office’
focus on being a proactive business partner rather than being           including the format and frequency in which it is delivered.
a reactive technology management supplier. Or at the very               This should be driven by governance requirements and a
least more ‘community police officer’ and less ‘prison warden’.         need to institutionalise client and other important data.




                                                                 4 Auridian
Security                                                            Bridge the chasm
      A security policy appropriate to the organisation and               Develop an architecture that enables integration of the user
      the market in which the organisation operates must be               experience with the corporate enterprise systems. In a pre-
adhered to as part of the technology freedom they will enjoy.             apps world this would entail partitioning the user interface
Again life would be easier for the IT function if there was a             element of the traditional application onto the user device
moat between the organisation and the rest of the world. Such             and the data management onto the server(s). The data
a model is no longer an option in today’s connected world.                processing could be distributed, client and/or server, based
                                                                          on other architectural considerations.
Back up                                                                   These so called apps also have a user interface, data
Certain data will be critical to corporate governance so it               processing and data management element to them.
would be unwise to leave it to the discretion of the individuals          However the IT function has no control over where these
or regional offices to take charge of backing up this data. As            three elements reside. Thus the integration of these modern
mentioned in the Risk management section above, systems                   apps with traditional applications will not be straightforward.
must be in place to ensure that critical data from around the             The integration will also likely vary for each app / vendor thus
organisation is captured and backed up. A data warehouse                  further complicating the issue.
architecture comes to mind.                                               From an infrastructure perspective there is the issue of how
                                                                          these apps and applications are delivered to the users.
Embrace the apps model                                                    Careful planning is required in respect of the integration of
Develop a platform and apps laboratory to test the                        public / private Cloud with the non-Cloud delivery channels.
technologies the users are using or planning to use.                      In fact this needs to be conducted as a priority to ensure
Possibly this is a service a technology vendor could offer.               your technology architecture rests on firm foundations.
Such testing would enable the IT function to ‘traffic light’ the
popular consumer technologies. So a ‘green’ classification                Usage policy
would imply the technology was of ‘industrial-strength’                   Create a highly visible usage policy. If users are to use their
whereas ‘red’ would imply ‘Unacceptable’.                                 own devices they must formally accept that if they or their
As well as technology testing, consideration needs to be                  devices are in any way compromised the IT function will wipe
given to the viability of the app developer. Was this app                 the device clean, including the family photographs. That
developed by an established technology service provider or                stated there are technologies that can help the IT function to
a teenager operating out of their bedroom? In either case                 address this without impacting the user’s personal data.
would you be willing to have your corporate infrastructure be             On a more service-oriented note, there is no reason why the
to some extent at the mercy of the app developer / provider?              IT function couldn’t host the personal data of the users. This
And what sort of service agreement can you expect from an                 could be positioned as a cool corporate benefit. It would take
app that retails for a dollar or less. Again this becomes an              the organisation and its staff one step closer to true work-life
exercise in risk management.                                              integration.
However done properly such an approach could ultimately
lead to the IT function driving consumer technology adoption
rather than being the victim of it. Smart users will increasingly
capitalise on your evaluation investment and opt for
recommended apps rather than learn the hard way.




                                                                   5 Auridian
Support policy                                                               Conclusion
Make it clear to the users which devices and apps the IT                     There is no going back. The days of imposing
function will support and what level of support that will entail.      monolithic Cobol-fuelled mainframes on the users via a
Provide some form of groupware approach to enable users                dedicated terminal room are long gone. The users are
of approved devices / apps to engage with each other if                increasingly driving the technology agenda.
the IT function does not have the resources to cover all               This is all part of a wider change in respect of the nature
technologies. In other words offer a self-service approach.            of work and the tilt of the power axis between workers and
Interestingly such communities, whilst united by their                 employers. IT leaders looking to fight this trend will soon
common usage of say an iPad, will likely engage with each              discover that Nature always wins.
other beyond the subject of their user device, eg. two                 Smart leaders will capitalise on this paradigm shift by not only
marketers sharing experiences from product launches and                supporting it, but by being seen to drive it. This represents
thus learning from each other. Such inadvertent collaboration          a real opportunity for IT leaders to shift their branding from
can only be good for the organisation.                                 CI’No’ to Chief Transformation Officer.




                                                                6 Auridian
Ade McCormack                                                               Previously Published Papers
                                                                            To read the previously published white papers from this series, go
is an opinion columnist with the Financial Times (since 2004). He           to www.hp.com/mobile/white-papers or follow the links below.
is the author of a number of books relating to new technology and
                                                                                                                                          Beyond work-life balance
leadership, including the acclaimed ‘e-Skills Manifesto – A Call to                                                                       by Ade McCormack
Arms’.                                                                                                                                    Paper 1/7
                                                                                                                                          Published: September 2012
He is also a visiting lecturer at MIT Sloan School of Management
where he lectures on digital leadership as part of the MBA
programme. He also helps organisations prepare for the digital
economy through his eWorld Academy www.eworldacademy.com.
                                                                                                                                          Cloud – everything as a service
Ade’s eWorld Radar blog www.eworldradar.com was recently short                              Workplace of the Future

                                                                             Cloud – everything as a service?
                                                                                                                                          by Ade McCormack
                                                                                                                                          Paper 2/7
listed by Computer Weekly magazine as one of the most influential
                                                                                    A series of white papers by Ade McCormack, Auridian




                                                                                                                                          Published: October 2012
blogs in respect of digital leadership.

Ade has worked in over twenty countries across many sectors.
He has a degree in Physics with Astrophysics. You can find more
information here:

www.ademccormack.com



HP is the world’s largest provider of IT infrastructure, software,
services, and solutions to individuals and organizations of all sizes.
We bring the advantages of our scale, the breadth and depth of our
portfolio, our innovation, and our competitiveness to our customers
every day and in almost every country in the world. HP invents,
engineers, and delivers technology solutions that drive business
value, create social value, and improve the lives of our clients.

In Enterprise Services, one of the largest divisions of HP, our strategy
is to deliver high-value solutions to help clients innovate, manage
information and risk, and become more agile so they can better
serve their customers and citizens.

HP wants to take you on a journey to the Mobile Enterprise of
the Future, a flexible “as a service” model, where the user rather
than the device, is driving the computing experience. At its core, we
aim to lower your operational costs, increase employee productivity
and business agility, all within the limits of high IT security. For more
information please visit:

www.hp.com/mobile/future-enterprise




                                                              7 Auridian

More Related Content

Recently uploaded

Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
Google AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGGoogle AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGSujit Pal
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 

Recently uploaded (20)

Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
Google AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGGoogle AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAG
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 

Featured

Product Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage EngineeringsProduct Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage EngineeringsPixeldarts
 
How Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental HealthHow Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental HealthThinkNow
 
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdfAI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdfmarketingartwork
 
PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024Neil Kimberley
 
Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)contently
 
How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024Albert Qian
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsKurio // The Social Media Age(ncy)
 
Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Search Engine Journal
 
5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summarySpeakerHub
 
ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd Clark Boyd
 
Getting into the tech field. what next
Getting into the tech field. what next Getting into the tech field. what next
Getting into the tech field. what next Tessa Mero
 
Google's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentGoogle's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentLily Ray
 
Time Management & Productivity - Best Practices
Time Management & Productivity -  Best PracticesTime Management & Productivity -  Best Practices
Time Management & Productivity - Best PracticesVit Horky
 
The six step guide to practical project management
The six step guide to practical project managementThe six step guide to practical project management
The six step guide to practical project managementMindGenius
 
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...RachelPearson36
 
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...Applitools
 
12 Ways to Increase Your Influence at Work
12 Ways to Increase Your Influence at Work12 Ways to Increase Your Influence at Work
12 Ways to Increase Your Influence at WorkGetSmarter
 

Featured (20)

Product Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage EngineeringsProduct Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage Engineerings
 
How Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental HealthHow Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental Health
 
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdfAI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
 
Skeleton Culture Code
Skeleton Culture CodeSkeleton Culture Code
Skeleton Culture Code
 
PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024
 
Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)
 
How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie Insights
 
Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024
 
5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary
 
ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd
 
Getting into the tech field. what next
Getting into the tech field. what next Getting into the tech field. what next
Getting into the tech field. what next
 
Google's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentGoogle's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search Intent
 
How to have difficult conversations
How to have difficult conversations How to have difficult conversations
How to have difficult conversations
 
Introduction to Data Science
Introduction to Data ScienceIntroduction to Data Science
Introduction to Data Science
 
Time Management & Productivity - Best Practices
Time Management & Productivity -  Best PracticesTime Management & Productivity -  Best Practices
Time Management & Productivity - Best Practices
 
The six step guide to practical project management
The six step guide to practical project managementThe six step guide to practical project management
The six step guide to practical project management
 
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
 
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
 
12 Ways to Increase Your Influence at Work
12 Ways to Increase Your Influence at Work12 Ways to Increase Your Influence at Work
12 Ways to Increase Your Influence at Work
 

Do It Yourself IT | The Future of Working

  • 1. Workplace of the Future DIY (Do It Yourself) IT A series of white papers by Ade McCormack, Auridian 1 Auridian
  • 2. Introduction It appears that the consumerization of IT has released the genie from the lamp. Now everybody from the CEO to the sales executives seem to have their own personal ‘lifestyle’ IT strategy which has resulted in a random array of software and hardware underpinning the organisation’s technology infrastructure. The speed of this phenomenon has left many IT leaders dazed and confused. What is their role if they clearly have lost their grip on technology management? This white paper explores this tsunami-like trend and advises on how to respond in a manner that both empowers the users and protects the organisation. 2 Auridian
  • 3. Consumerization defined There are (at least) two ways to look at consumerization in respect of information technology: • usiness-origination: Technology created with business B in mind eventually finds its way into the consumer market, eg. Calculators. • onsumer-origination: Technology created for consumers C that are increasingly used in the corporate environment, eg. Tablets and Twitter. In both cases one might argue that both users/consumers and the technology supplier have conspired to cross the consumer-business divide for mutual benefit. With the consumer-origination model it is perhaps an unfortunate side-effect that the IT function appears to be driven out of the value chain. Or at the very least its critical role is somewhat reduced. Why has this happened? Users have felt the IT function has held too much power. Whether this is true or not, the perception exists. Some CIOs will argue that slashed budgets naturally The IT function saw the danger in such a computing model result in service degradation which often in turn results in and found a way to replicate their original model in a them vetoing what appear to be strategically sensible IT- contemporary style, hence the arrival of thin-client computing related initiatives. and fully managed desktops. Users continued to enjoy a As a market observer there appears to be something akin to graphical intuitive interface, but in every other respect were a war underway in respect of user-IT relations. ‘locked down’. So control shifted back across the DMZ (demilitarised zone) to the IT function. The first ever (mainframe) computers gave the IT function control. This included control over what the users could do The Cloud, mobile computing and browser-based computing and the ‘look and feel’ of their ‘desktop’. have returned control to the users. Shadow-IT (tech mercenaries operating covertly on behalf of the users) is now Then the PC arrived. This was driven by the users. Now they replaced by a credit card. Useful apps are just a click away had their own storage and processing power. So BYOD and are available now and not when the IT function says they (Bring Your Own Device) as a concept started last century. are ready. The users were now in control. The proliferation of tablets and mobile devices means that this model is just too compelling for users to ignore. 3 Auridian
  • 4. The DIY trend The bottom line is that we cannot hold back the tide. We can’t hide this from the CFO who with her new tablet sees Of course the ‘IT function industry’ as opposed to the app installations take minutes and not months and who pays IT industry will quite rightly maintain that such a model is a cents instead of mega dollars. They may even feel that their security, governance and architectural threat and thus to CIO has been disingenuous by not embracing this user- varying degrees are fighting this trend. empowering computing model. But remember what happened a decade or so. The PDA hit So again the genie is running wild. There is no going back. the market. It was an obvious extension to the organisation’s Given this has the feel of outsourcing on steroids, we might technology armoury. Enabling users to have access to as well capitalise on what others are good at and let them information when away from their desks made sense. But build and deliver at least some of the infrastructure and the IT function labelled them rogue-devices and managed to applications. Clearly the danger of ‘stove pipe’ applications keep them outside the corporate moat. delivered via a variety of vendors over channels (traditional But then came the Blackberry and the rest is history. There / non-browser, public and private Cloud) has a stability akin comes a point when the needs of the organisation cannot to a house of cards. If integration is not your forte then it is be denied. worth virtualising the associated risk to a third party. The BYOD trend, and increasingly the BYOA (BYO Apps) trend is creating a DIY approach to IT. The IT function What is the new role of IT leaders? no longer has an IT strategy other than to support the personalised strategies of every single user. There are a number of actions the IT leaders can take to both remain relevant and value-adding. The The IT function needs to up its service game from a sheep- following actions comprise a mixture of risk management dip model to one that more closely resembles that of a and service enhancement. butler. The IT function no longer has one customer (the users), but a spectrum of clients which grows with every new Risk management recruit to the organisation. It would be quite easy to accede to the users’ needs, but Over the years we have had object-oriented systems and what happens when the so called high risk but highly unlikely even service-oriented architectures. The IT functions that ‘Black Swan’ event takes place? Ensure the business leaders will remain relevant in the digital economy will be those that understand the technical, governance and security risks embrace people-oriented service. associated with a DIY approach to IT services. Better still Technology infrastructure as a lifestyle statement is now a obtain their permission to embrace this model. It’s not for you reality. It reflects the power of consumer branding and also a to decide whether the associated opportunities outweigh the desire for users to retain the functionality they enjoy at home risks. when they are ‘at work’. CEOs will always side with a money-generating business unit This trend is not just occurring at the on-style tablet and phone over a whinging support function. So it is unlikely that you end of the market. Desktops are changing too. Chances will be successful making a case for the recently acquired are that whether you planned it or not, you likely have Unix Australian operation to fall into line from a technology underpinning a growing portion of your client devices. architecture if they are pushing the share price north. The good news is that if this is handled carefully it will in fact The best you can do is define a data specification which reduce the technology burden on the IT function, enabling it to details the data that must be delivered to ‘head office’ focus on being a proactive business partner rather than being including the format and frequency in which it is delivered. a reactive technology management supplier. Or at the very This should be driven by governance requirements and a least more ‘community police officer’ and less ‘prison warden’. need to institutionalise client and other important data. 4 Auridian
  • 5. Security Bridge the chasm A security policy appropriate to the organisation and Develop an architecture that enables integration of the user the market in which the organisation operates must be experience with the corporate enterprise systems. In a pre- adhered to as part of the technology freedom they will enjoy. apps world this would entail partitioning the user interface Again life would be easier for the IT function if there was a element of the traditional application onto the user device moat between the organisation and the rest of the world. Such and the data management onto the server(s). The data a model is no longer an option in today’s connected world. processing could be distributed, client and/or server, based on other architectural considerations. Back up These so called apps also have a user interface, data Certain data will be critical to corporate governance so it processing and data management element to them. would be unwise to leave it to the discretion of the individuals However the IT function has no control over where these or regional offices to take charge of backing up this data. As three elements reside. Thus the integration of these modern mentioned in the Risk management section above, systems apps with traditional applications will not be straightforward. must be in place to ensure that critical data from around the The integration will also likely vary for each app / vendor thus organisation is captured and backed up. A data warehouse further complicating the issue. architecture comes to mind. From an infrastructure perspective there is the issue of how these apps and applications are delivered to the users. Embrace the apps model Careful planning is required in respect of the integration of Develop a platform and apps laboratory to test the public / private Cloud with the non-Cloud delivery channels. technologies the users are using or planning to use. In fact this needs to be conducted as a priority to ensure Possibly this is a service a technology vendor could offer. your technology architecture rests on firm foundations. Such testing would enable the IT function to ‘traffic light’ the popular consumer technologies. So a ‘green’ classification Usage policy would imply the technology was of ‘industrial-strength’ Create a highly visible usage policy. If users are to use their whereas ‘red’ would imply ‘Unacceptable’. own devices they must formally accept that if they or their As well as technology testing, consideration needs to be devices are in any way compromised the IT function will wipe given to the viability of the app developer. Was this app the device clean, including the family photographs. That developed by an established technology service provider or stated there are technologies that can help the IT function to a teenager operating out of their bedroom? In either case address this without impacting the user’s personal data. would you be willing to have your corporate infrastructure be On a more service-oriented note, there is no reason why the to some extent at the mercy of the app developer / provider? IT function couldn’t host the personal data of the users. This And what sort of service agreement can you expect from an could be positioned as a cool corporate benefit. It would take app that retails for a dollar or less. Again this becomes an the organisation and its staff one step closer to true work-life exercise in risk management. integration. However done properly such an approach could ultimately lead to the IT function driving consumer technology adoption rather than being the victim of it. Smart users will increasingly capitalise on your evaluation investment and opt for recommended apps rather than learn the hard way. 5 Auridian
  • 6. Support policy Conclusion Make it clear to the users which devices and apps the IT There is no going back. The days of imposing function will support and what level of support that will entail. monolithic Cobol-fuelled mainframes on the users via a Provide some form of groupware approach to enable users dedicated terminal room are long gone. The users are of approved devices / apps to engage with each other if increasingly driving the technology agenda. the IT function does not have the resources to cover all This is all part of a wider change in respect of the nature technologies. In other words offer a self-service approach. of work and the tilt of the power axis between workers and Interestingly such communities, whilst united by their employers. IT leaders looking to fight this trend will soon common usage of say an iPad, will likely engage with each discover that Nature always wins. other beyond the subject of their user device, eg. two Smart leaders will capitalise on this paradigm shift by not only marketers sharing experiences from product launches and supporting it, but by being seen to drive it. This represents thus learning from each other. Such inadvertent collaboration a real opportunity for IT leaders to shift their branding from can only be good for the organisation. CI’No’ to Chief Transformation Officer. 6 Auridian
  • 7. Ade McCormack Previously Published Papers To read the previously published white papers from this series, go is an opinion columnist with the Financial Times (since 2004). He to www.hp.com/mobile/white-papers or follow the links below. is the author of a number of books relating to new technology and Beyond work-life balance leadership, including the acclaimed ‘e-Skills Manifesto – A Call to by Ade McCormack Arms’. Paper 1/7 Published: September 2012 He is also a visiting lecturer at MIT Sloan School of Management where he lectures on digital leadership as part of the MBA programme. He also helps organisations prepare for the digital economy through his eWorld Academy www.eworldacademy.com. Cloud – everything as a service Ade’s eWorld Radar blog www.eworldradar.com was recently short Workplace of the Future Cloud – everything as a service? by Ade McCormack Paper 2/7 listed by Computer Weekly magazine as one of the most influential A series of white papers by Ade McCormack, Auridian Published: October 2012 blogs in respect of digital leadership. Ade has worked in over twenty countries across many sectors. He has a degree in Physics with Astrophysics. You can find more information here: www.ademccormack.com HP is the world’s largest provider of IT infrastructure, software, services, and solutions to individuals and organizations of all sizes. We bring the advantages of our scale, the breadth and depth of our portfolio, our innovation, and our competitiveness to our customers every day and in almost every country in the world. HP invents, engineers, and delivers technology solutions that drive business value, create social value, and improve the lives of our clients. In Enterprise Services, one of the largest divisions of HP, our strategy is to deliver high-value solutions to help clients innovate, manage information and risk, and become more agile so they can better serve their customers and citizens. HP wants to take you on a journey to the Mobile Enterprise of the Future, a flexible “as a service” model, where the user rather than the device, is driving the computing experience. At its core, we aim to lower your operational costs, increase employee productivity and business agility, all within the limits of high IT security. For more information please visit: www.hp.com/mobile/future-enterprise 7 Auridian