IDG News Service - It wasn't long ago that an organisation's choice of IT was dictated to its users by a centralised internal IT function, hand-picking selected devices and favoured suppliers.
This god-mode model dates from an era when expensive IT needed dedicated professionals to steer an organisation and its users through high cost and complexity in order to realise a benefit.
Today it's the users who are helping drive a transition towards zero organisational IT, an inevitable consequence of mass commoditisation and consumerisation. Leading organisations are no longer specifying particular suppliers, products or devices.
Instead there is a relentless focus on the user requirement and the identification of the open standards, interfaces and formats required to provide the necessary capabilities.
Supporting such a flexible organisational model requires organisations to update their legal and human resources policies to adopt a more appropriate approach to risk management.
At Intel, for example, 55 per cent of its employees use their own devices, with claimed employee time savings of 47 minutes a day, a 94 per cent satisfaction rate and no detrimental impact on support. Security has improved, with users more motivated to look after their own equipment than company-provided kit.
The move away from restrictive and inflexible in-house IT infrastructures is being assisted by the move to cloud-based communications and content accessible to users via a diverse range of devices and operating systems. High-end privileged 'enterprise' features, such as remote device tracking, remote wipe and dual-factor authentication, have become commodity consumer services available to all.
The emergence of CloudStore, the pilot of Google Apps in the Cabinet Office and the re-appraisal of government's approach to information assurance provide welcome evidence that the mindset of zero IT is already benefiting Whitehall.
Given that explosions of industrial creativity rarely follow the invention or discovery of a technology, but instead its commoditisation, we can only guess at the changes still to come. Yet the scale of this change is already evident: one organisation has given its users far better and more flexible IT while also reducing costs from around AAPS1000 per user per annum to around AAPS40. Another has cut its communications cost by over 80 per cent.
Proof, if anyone ever needed it, that better services can be achieved at significantly less cost.
This pilot fish is a contractor at a military base, working on some very cool fire-control systems for tanks. But when he spots something obviously wrong during a live-fire test, he can't get the firing-range commander's attention.
- IT Certification Study Tips
- Register for this Computerworld Insider Study Tip guide and gain access to hundreds of premium content articles, cheat sheets, product reviews and more.
- Reduce federal infrastructure risk with compliance management and situational awareness
- IBM continuous monitoring and management solutions deliver real-time situational awareness to help federal agencies understand vulnerabilities, and protect the infrastructure.
- The Shortfall of Network Load Balancing
- Applications running across networks encounter a wide range of performance, security, and availability challenges as IT department strive to deliver fast, secure access...
- Leave No App Behind with Software Defined Application Services
- F5 Software Defined Application Services (SDAS) is the next-generation model for delivering application services that enables service injection, consumption, automation, and orchestration across...
- Five Key Issues for DNS - The Next Network Management Challenge
- Since every icon and URL and all embedded content on a website requires a DNS lookup, loading complex sites necessitates hundreds of DNS...
- Architecting the Network of the Future
- Networks need to change, as does the way IT thinks about and manages them. In addition to reliability, IT must now add higher... All Government IT White Papers
- NSS Labs & Cisco Present: Evaluating Leading Breach Detection Systems Today's constantly evolving advanced malware and APTs can evade point-in-time defenses to penetrate networks. Security professionals must evolve their strategy in lockstep to...
- Will the Real Endpoint Threat Detection and Response Please Stand Up? This webinar explores new technologies & process for protecting endpoints from advanced attackers as well as the innovations that are pushing the envelope...
- What should I look for in a Next Generation Firewall? SANS Provides Guidance With so many vendors claiming to have a Next Generation Firewall (NGFW), it can be difficult to tell what makes each one different....
- Why Are Customers Really Deploying an NGFW? It seems every IT Security expert is talking about the NGFW, but what are people really doing? This webcast covers 5 real-world customer...
- Charting Your Analytical Future - "Making predictive analytics part of your business processes" Webinar This session will show how predictive analytics can be used throughout the organization by anyone looking for answers and how organizations can make...
- All Government IT Webcasts