Execs told to 'get out of the way' of Enterprise 2.0 tools
BT Design CIO tells Enterprise 2.0 audience: 'We've lost control of the device'
Computerworld - Whether they like it or not, social networking tools are worming their way into the enterprise so company executives need to just get the heck out of the way.
That was the message today from the Enterprise 2.0 Conference in Boston Tuesday morning.
"Younger workers are really tight with their computers, their laptops and gadgets," said JP Rangaswami, CIO and chief scientist at BT Design, which is an arm of British Telecom. "They have better relationships with their technology at home than their technology at work. ... The age of the locked down desktop is coming to an end. It's accentuated and accelerated by the new generation.
"They want to use their own devices to communicate," Rangaswami said. "They don't know why they shouldn't be able to."
And, Rangaswami said, since younger workers love and trust their technology, they're bringing it into the workplace -- whether it's officially approved or not.
"Enterprises now are more likely to say, 'OK, bring your technology to work and hook it up,'" he added. "People have to agree that we've lost control of the device."
What that means, according to several speakers at the conference, is that workers are increasingly using everything from blogs and microblogs, to wikis and social networks to collaborate on projects, share ideas and find colleagues who can help them.
And if company executives want some semblance of control, they better start participating.
"CIOs have to learn to get out of the way," said Rangaswami. "They need to provide an enabling environment and then different departments can build the services they need. Let the departments decide what they need."
R. Lemuel Lasher, a president and chief innovation officer at CSC, a global technology and business services company, said he saw enterprise 2.0 tools beginning to move into his company and, though he wasn't well-versed in them, decided to go with the flow.
"It was really clear that these social networks were going to have a lot of power in the enterprise," he added. "We put in wikis and blogs and then we started to use Jive as platform for social networking. It was just stunning. I got out of the way and said, 'I know this is important and I don't know what to do. I will get out of the way and let this take off.' "
Lasher also said he didn't delve into Enterprise 2.0 thinking about ROI.
"I wasn't worried about ROI," he said. "I was worried about transforming the culture of the organization. As it turned out, there was a lot of business benefit -- reduced time of cycle for proposals, greater ease in identifying employees company wide. The chairman uses it for his communications with employees. We still have Notes. We still have blogs and wikis. But [the Jive platform] has become the language of the organization. It's the way we operate inside the enterprise."
Sharon Gaudin covers the Internet and Web 2.0, emerging technologies, and desktop and laptop chips for Computerworld. Follow Sharon on Twitter at @sgaudin or subscribe to Sharon's RSS feed . Her e-mail address is email@example.com.
Read more about Web Apps in Computerworld's Web Apps Topic Center.
- The DDoS Threat Spectrum Bolstered by favorable economics, today's global botnets are using distributed denial-of-service (DDoS) attacks to target firewalls, web services, and applications, often simultaneously.
- Need to Replace MS Threat Management Gateway? Read this article to learn how F5's Secure Web Gateway solution provides a full set of features that can help you successfully migrate...
- The Shortfall of Network Load Balancing Applications running across networks encounter a wide range of performance, security, and availability challenges as IT department strive to deliver fast, secure access...
- Leave No App Behind with Software Defined Application Services F5 Software Defined Application Services (SDAS) is the next-generation model for delivering application services that enables service injection, consumption, automation, and orchestration across...
- Keep Servers Up and Running and Attackers in the Dark An SSL/TLS handshake requires at least 10 times more processing power on a server than on the client. SSL renegotiation attacks can readily...
- On Demand: Mastering the Art of Mobile Content Management Mobile device usage in the enterprise has skyrocketed, and it continues to escalate. IT must answer to users who demand access to their... All Web Apps White Papers | Webcasts