How can you open up your enterprise to the vast array of consumer devices available without opening it up to risk?
The recent Olympic and Paralympic Games were a perfect microcosm for a BYOD, or ‘Bring-Your-Own-Device’ strategy. The advantages of such a policy for your enterprise are clear: continuous renewal of technology, increased personal productivity and less reliance on support desk functions, to name just a few.
http://bit.ly/M9emb7
All organizations are now looking to the cloud as a possible model for enterprise IT delivery. Zero -capex, pay-per-use and radical scalability become the incentives. But there are risks too, with communication and data security, enterprise standards, compliance and service consistency all causes for concern.
This condensed document summarizes Getronics thinking and position on enterprise cloud adoption.
Bring Your Own Device It’s all about Employee Satisfaction and Productivity, not Costs!
BYOD is becoming more popular globally. For instance, a survey indicated that about 28% of the global workforce in 2011 used personal devices for official purposes. This growth of BYOD is creating doubts in the minds of CIOs. Most focus on BYOD has primarily been from a cost savings perspective, however, our analysis indicates there are more important reasons for CIOs to consider.
All organizations are now looking to the cloud as a possible model for enterprise IT delivery. Zero -capex, pay-per-use and radical scalability become the incentives. But there are risks too, with communication and data security, enterprise standards, compliance and service consistency all causes for concern.
This condensed document summarizes Getronics thinking and position on enterprise cloud adoption.
Bring Your Own Device It’s all about Employee Satisfaction and Productivity, not Costs!
BYOD is becoming more popular globally. For instance, a survey indicated that about 28% of the global workforce in 2011 used personal devices for official purposes. This growth of BYOD is creating doubts in the minds of CIOs. Most focus on BYOD has primarily been from a cost savings perspective, however, our analysis indicates there are more important reasons for CIOs to consider.
Open innovation in a globalized world @ IBMAnders Quitzau
Key note given at Danish Foreign Ministry's conference for the inauguration of 3 new Innovation Center Denmark, locations in Sao Paulo, New Delhi and Seoul,
Organisations maximise staff mobility, flexibility and productivity by using work-styles to define the provisioning of new technologies in a contemporary workplace
Seizing Opportunities, Overcoming Productivity Challenges in the Virtually Co...Cognizant
By following a few simple rules, organizations can overcome the barriers to social and virtual ways of working, including concerns about distractions, personal detachment and business disruption.
One of the most challenging issues in BPM is not the question of "If" it is the question of "How." This two-day program will focus on how to do design and implement efficient and effective business processes, to more effectively support the way our enterprises are adapting.
Enterprise Mobility Solutions: Enterprise operations on the moveSoftweb Solutions
The concept of mobility, the adoption and trends of mobility amongst the enterprises, the benefits acquired from implementing enterprise mobility solutions, and what advantages can be obtained from mobile solutions in the future by the businesses – are explained comprehensively in this White Paper.
Communication and collaboration in the Enterprise 2.0 worldHuddleHQ
This white paper examines what Enterprise 2.0 is, how it impacts organizations across the globe and why IT departments and business users should gain an understanding of it to help better enable business collaboration. As well as providing real-world examples of how businesses use Enterprise 2.0 collaboration tools and services, this white paper provides advice on how to make the leap and introduce a new stream of work methodologies and cloud collaboration into your organization.
Driving Enterprise Mobility Solutions Demand: Understanding End User Requirem...VDC Research Group
VDC Research has been monitoring enterprise and government mobility user requirements through a series of targeted surveys. During this webcast, David Krebs, presented key findings from these 2010 end-user surveys. Some of the topics David addressed include: leading mobility applications enterprise and government organizations are investing in; adoption of/interest in next-generation form factors, such as slate tablets; leading mobile device functionality and form factor requirements; and mobile application development and distribution trends.
How should organizations go about tackling BYOD schemes?
While it is true that BYOD programs can and most likely will liberate and motivate employees, giving them a sense of personal choice, they can also bring with them unforeseen consequences when it comes to cost and security, even productivity, which must be fully considered before a scheme can be implemented. At the recent Olympic and Paralympic Games, the international scope meant Atos had to deal with a vast array of mobile devices coming in from many different sources, each with the requirement of flawless and secure delivery of IT services over the Olympic and Paralympic Games’ vast network.
Can content management be used as an asset to boost productivity and collaboration?
Atos’ performance at the Olympic Games has proved the ideal challenge to improving the way we deliver world-beating business technology for our clients. This new Fast Track Guide on ECM is quick to read and formed from the very latest thinking. It describes how, in the economic climate, enterprise collaboration tools have been embraced by organizations looking to become leaner and more flexible to boost productivity and efficiency across an increasingly dispersed and mobile workforce.
Open innovation in a globalized world @ IBMAnders Quitzau
Key note given at Danish Foreign Ministry's conference for the inauguration of 3 new Innovation Center Denmark, locations in Sao Paulo, New Delhi and Seoul,
Organisations maximise staff mobility, flexibility and productivity by using work-styles to define the provisioning of new technologies in a contemporary workplace
Seizing Opportunities, Overcoming Productivity Challenges in the Virtually Co...Cognizant
By following a few simple rules, organizations can overcome the barriers to social and virtual ways of working, including concerns about distractions, personal detachment and business disruption.
One of the most challenging issues in BPM is not the question of "If" it is the question of "How." This two-day program will focus on how to do design and implement efficient and effective business processes, to more effectively support the way our enterprises are adapting.
Enterprise Mobility Solutions: Enterprise operations on the moveSoftweb Solutions
The concept of mobility, the adoption and trends of mobility amongst the enterprises, the benefits acquired from implementing enterprise mobility solutions, and what advantages can be obtained from mobile solutions in the future by the businesses – are explained comprehensively in this White Paper.
Communication and collaboration in the Enterprise 2.0 worldHuddleHQ
This white paper examines what Enterprise 2.0 is, how it impacts organizations across the globe and why IT departments and business users should gain an understanding of it to help better enable business collaboration. As well as providing real-world examples of how businesses use Enterprise 2.0 collaboration tools and services, this white paper provides advice on how to make the leap and introduce a new stream of work methodologies and cloud collaboration into your organization.
Driving Enterprise Mobility Solutions Demand: Understanding End User Requirem...VDC Research Group
VDC Research has been monitoring enterprise and government mobility user requirements through a series of targeted surveys. During this webcast, David Krebs, presented key findings from these 2010 end-user surveys. Some of the topics David addressed include: leading mobility applications enterprise and government organizations are investing in; adoption of/interest in next-generation form factors, such as slate tablets; leading mobile device functionality and form factor requirements; and mobile application development and distribution trends.
How should organizations go about tackling BYOD schemes?
While it is true that BYOD programs can and most likely will liberate and motivate employees, giving them a sense of personal choice, they can also bring with them unforeseen consequences when it comes to cost and security, even productivity, which must be fully considered before a scheme can be implemented. At the recent Olympic and Paralympic Games, the international scope meant Atos had to deal with a vast array of mobile devices coming in from many different sources, each with the requirement of flawless and secure delivery of IT services over the Olympic and Paralympic Games’ vast network.
Can content management be used as an asset to boost productivity and collaboration?
Atos’ performance at the Olympic Games has proved the ideal challenge to improving the way we deliver world-beating business technology for our clients. This new Fast Track Guide on ECM is quick to read and formed from the very latest thinking. It describes how, in the economic climate, enterprise collaboration tools have been embraced by organizations looking to become leaner and more flexible to boost productivity and efficiency across an increasingly dispersed and mobile workforce.
CEOs now expect IT to provide profitable growth and business agility. Is outsourcing the best way to achieve this?
The Olympic Games is the biggest managed IT services contract in world sport and involves coordinating a multitude of different providers. This new Fast Track Guide on Managed Services is quick to read and formed from the very latest thinking. It shows how providers such as Atos use their experience to build an ecosystem of clients, partners and of course expertise to leverage emerging technologies and market trends.
After each Games, we share the facts and figures and insights of our Business Technologists and the IT systems that help power progress for the Olympic and Paralympic Movements.
The legacy of our work for the Games is that we can bring this experience and the cross business services and solutions to our clients, wherever they are and whenever they need them:
· IT security
· Cloud
· Big Data
· Social Collaboration
· Mobility
As Worldwide IT Partner of the Olympic & Paralympic Games, Atos leads the technology effort for the staging of the Games. This same effort and skills can help your company as you pursue a record-breaking competitive advantage.
The history of technology at the Olympic and Paralympic Games. The enormity and scope of creating an IT management system and infrastructure for the Olympic Games, the world’s largest sports IT contract, presents a host of unique challenges. At every Games Atos executes a carefully honed strategy based on years of experience in delivering comprehensive IT services for major global sporting events.
Trusted Partner for your Digital JourneyAscent Atos
At Atos, through digital transformation we strive to create the firm of tomorrow. We believe that bringing together people, technology and business is the way forward. Every day, we power progress for our clients and partners. It is our unique approach as business technologists that makes this possible.
Accenture publishes its technology vision annually. It is a distillation of our extensive research over the course of the previous 12 months, the experiences of our research teams and the input of our clients. In it, we outline the emerging technology trends that forward-thinking CIOs will use to position their organizations to drive growth and high performance, rather than just focusing on cost-cutting and efficiency improvements.
Business leaders now accept that their organizations’ future success is bound up with their ability to keep pace with technology. CIOs have to play a key role in helping these business leaders recognize and seize the opportunities enabled by new trends—but the price of progress will have to be paid, along with new risks assumed.
We believe six technology trends will influence business over the next three to five years:
Context-based services. Where you are and what you are doing will drive the next wave of digital services.
Converging data architectures. Successfully rebalancing the data architecture portfolio and blending the structured with the unstructured are key to turning data into new streams of value.
Industrialized data services. The ability to share data will make it more valuable—but only if it is managed differently.
Social-driven IT. Realize that social is not just a bolt-on marketing channel. It will have true business-wide impact.
PaaS-enabled agility. The maturing platform-as-a-service (PaaS) market will shift the emphasis from cost-cutting to business innovation, supporting rapid evolution for business processes that need continuous change.
Orchestrated analytical security. Organizations will have to accept that their gates will be breached and begin preparing their second line of defense—data platforms—to mitigate the damage caused by attacks that get through.
It’s up to the CIO and chief information security
officer to make security a board-level concern.
Breaches will happen, and organizations need
to start thinking beyond prevention alone. The
CIO and CISO will need to align with business
leaders to assume a vigilant monitoring
mindset. Data will provide the clues, but both
IT and the business are needed to effectively
detect and respond to attacks that slip past
the gates. Within the next four quarters, the
CIO and CISO had better have good answers
to the CEO’s questions about the myriad
new risks to data security. They should also
be able to display a detailed roadmap for
how they plan to aggregate the data needed
to monitor the breaches that do occur.
The Future of Work is being reshaped by major trends - namely virtualization of work and consumerization of IT. These comprise the four major forces of change - globalization, virtualization, the Millennial mindset and cloud computing. These have drastically changed the way we communicate, collaborate, learn, buy, engage and consume. When the virtualization of work meets the consumerization of IT in the enterprise - and when systems of recod meet systems of engagement - the dynamics of work itself change.
A BYOC program enables the use of employee-owned smartphones, tablets, and laptops for business use. The growing popularity and use of personal devices, such as the iPad, is challenging IT to develop a position on their use in the workplace.
This storyboard explores:
•The objectives for a successful BYOC deployment: reducing cost and complexity of desktop management; improving agility and accessibility; and ensuring that security is not sacrificed in achieving those goals.
•Building out the four pillars of capability to prepare your environment for BYOC: infrastructure, security, operations & support, and policy development.
•Refocusing efforts in the last mile by developing a clear communications strategy to manage expectations and prepare for change.
Success in BYOC can be achieved. Rather than just saying no, focus on how to drive positive, secure change in the desktop environment.
Building it infrastructure framework that drives innovation and business perf...GlobalStep
Whitepaper on Building IT infrastructure framework that drives innovation and business performance by GlobalStep.
The first trend is the buyer’s increased perception of IT Infrastructure service as a commodity which lowers perceived value and forces cost reductions. The second trend is that of increased complexity which is driven by disruptive technologies like cloud, virtualization and others along with innovative service models such as software-as-a-service and desktop-as-a-service.
The challenges of cost, complexity, and compliance are nearly overwhelming today's CIOs. Instead of devising business aligned IT programs, they are forced to concentrate on maintaining and managing a sloppy infrastructure. To tackle these challenges and to align with business goals, IT must shift its focus to become a business-centric line of business. From the large variety of our clients and our interaction with their IT Infrastructure leaders, we understand that they strongly believe that consistent innovation is their only means of meeting user expectations and rapidly evolving business demands within budgetary constraints. This innovation is not just about using a new technology but also about doing the same thing differently, which involves new way of interacting with the customers and vendors.
www.globalstep.com
Running head MANAGING TECHNOLOGICAL INNOVATION IN DIGITAL BUS.docxwlynn1
Running head: MANAGING TECHNOLOGICAL INNOVATION IN DIGITAL BUSINESS
ENVIRONMENTS 1
Managing Technological Innovation in Digital Business Environments
Yolanda McNeil
ENGL 602 Field Project: Final Product
Liberty University
MANAGING TECHNOLOGICAL INNOVATION IN DIGITAL BUSINESS
ENVIRONMENTS 2
Introduction
Background of the Research
Innovation plays a critical role in assisting businesses to sustain and grow their market
shares. It takes place in dissimilar functions and parts of the business and it is significant to
understand the best way to create and manage it effectively. Digital technologies have been
regularly used in business and this has led to digitized workplaces that demand the need to invent
to remain at the top in the market (Kay & Willman, 2018). Digitizing places of work has played
a key role in changing the way business is usually managed and this has similarly affected how
innovation must be managed and embraced in such a novel business atmosphere. Therefore, the
best way to understand technological innovation in the digital business atmosphere is the need to
understand how technology has been shaping the business world.
The reason for choosing technological innovation in digital business environments is that
business owners play a critical role in the identification and application of new technologies. By
investing in initiatives that permit them to deliver efficient and effective services and products,
they discover innovative solutions to complex challenges (Camisón & Villar-López, 2014).
Successful technological innovation needs collaboration, expert project management, planning,
and execution. Worldwide competition and rigorous demand to bring commodities to market
very fast affect decisions.
Research Purpose
1
2
Tess Stockslager @ 2020-03-06T10:07:25-08:00
This wording seems a bit circular: "the best way to understand...is the need to understand." Is there a clearer way you could state this?
Tess Stockslager @ 2020-03-06T10:09:33-08:00
Even without the word "I," you're indirectly referring to yourself here, which isn't necessary in this paper. You don't need to explain why you chose your topic; instead, you should explain why the topic is important in the field (which is exactly what you did in this sentence--you just need to frame it differently).
MANAGING TECHNOLOGICAL INNOVATION IN DIGITAL BUSINESS
ENVIRONMENTS 3
The purpose of this research is to explore the role and importance of managing
technological innovation in the digital business environment. Technological innovation strategies
that a firm pursues can either break or make the company. The current business landscape is
increasingly multifaceted. For an organization to succeed in the modern business environment, it
is critical that it adopts digital innovation which can assist to attain its goals and remain at the top
in the competition (Camisón & Villar-Lóp.
State of ICS and IoT Cyber Threat Landscape Report 2024 previewPrayukth K V
The IoT and OT threat landscape report has been prepared by the Threat Research Team at Sectrio using data from Sectrio, cyber threat intelligence farming facilities spread across over 85 cities around the world. In addition, Sectrio also runs AI-based advanced threat and payload engagement facilities that serve as sinks to attract and engage sophisticated threat actors, and newer malware including new variants and latent threats that are at an earlier stage of development.
The latest edition of the OT/ICS and IoT security Threat Landscape Report 2024 also covers:
State of global ICS asset and network exposure
Sectoral targets and attacks as well as the cost of ransom
Global APT activity, AI usage, actor and tactic profiles, and implications
Rise in volumes of AI-powered cyberattacks
Major cyber events in 2024
Malware and malicious payload trends
Cyberattack types and targets
Vulnerability exploit attempts on CVEs
Attacks on counties – USA
Expansion of bot farms – how, where, and why
In-depth analysis of the cyber threat landscape across North America, South America, Europe, APAC, and the Middle East
Why are attacks on smart factories rising?
Cyber risk predictions
Axis of attacks – Europe
Systemic attacks in the Middle East
Download the full report from here:
https://sectrio.com/resources/ot-threat-landscape-reports/sectrio-releases-ot-ics-and-iot-security-threat-landscape-report-2024/
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Albert Hoitingh
In this session I delve into the encryption technology used in Microsoft 365 and Microsoft Purview. Including the concepts of Customer Key and Double Key Encryption.
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...DanBrown980551
Do you want to learn how to model and simulate an electrical network from scratch in under an hour?
Then welcome to this PowSyBl workshop, hosted by Rte, the French Transmission System Operator (TSO)!
During the webinar, you will discover the PowSyBl ecosystem as well as handle and study an electrical network through an interactive Python notebook.
PowSyBl is an open source project hosted by LF Energy, which offers a comprehensive set of features for electrical grid modelling and simulation. Among other advanced features, PowSyBl provides:
- A fully editable and extendable library for grid component modelling;
- Visualization tools to display your network;
- Grid simulation tools, such as power flows, security analyses (with or without remedial actions) and sensitivity analyses;
The framework is mostly written in Java, with a Python binding so that Python developers can access PowSyBl functionalities as well.
What you will learn during the webinar:
- For beginners: discover PowSyBl's functionalities through a quick general presentation and the notebook, without needing any expert coding skills;
- For advanced developers: master the skills to efficiently apply PowSyBl functionalities to your real-world scenarios.
Epistemic Interaction - tuning interfaces to provide information for AI supportAlan Dix
Paper presented at SYNERGY workshop at AVI 2024, Genoa, Italy. 3rd June 2024
https://alandix.com/academic/papers/synergy2024-epistemic/
As machine learning integrates deeper into human-computer interactions, the concept of epistemic interaction emerges, aiming to refine these interactions to enhance system adaptability. This approach encourages minor, intentional adjustments in user behaviour to enrich the data available for system learning. This paper introduces epistemic interaction within the context of human-system communication, illustrating how deliberate interaction design can improve system understanding and adaptation. Through concrete examples, we demonstrate the potential of epistemic interaction to significantly advance human-computer interaction by leveraging intuitive human communication strategies to inform system design and functionality, offering a novel pathway for enriching user-system engagements.
UiPath Test Automation using UiPath Test Suite series, part 4DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 4. In this session, we will cover Test Manager overview along with SAP heatmap.
The UiPath Test Manager overview with SAP heatmap webinar offers a concise yet comprehensive exploration of the role of a Test Manager within SAP environments, coupled with the utilization of heatmaps for effective testing strategies.
Participants will gain insights into the responsibilities, challenges, and best practices associated with test management in SAP projects. Additionally, the webinar delves into the significance of heatmaps as a visual aid for identifying testing priorities, areas of risk, and resource allocation within SAP landscapes. Through this session, attendees can expect to enhance their understanding of test management principles while learning practical approaches to optimize testing processes in SAP environments using heatmap visualization techniques
What will you get from this session?
1. Insights into SAP testing best practices
2. Heatmap utilization for testing
3. Optimization of testing processes
4. Demo
Topics covered:
Execution from the test manager
Orchestrator execution result
Defect reporting
SAP heatmap example with demo
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Key Trends Shaping the Future of Infrastructure.pdfCheryl Hung
Keynote at DIGIT West Expo, Glasgow on 29 May 2024.
Cheryl Hung, ochery.com
Sr Director, Infrastructure Ecosystem, Arm.
The key trends across hardware, cloud and open-source; exploring how these areas are likely to mature and develop over the short and long-term, and then considering how organisations can position themselves to adapt and thrive.
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
DevOps and Testing slides at DASA ConnectKari Kakkonen
My and Rik Marselis slides at 30.5.2024 DASA Connect conference. We discuss about what is testing, then what is agile testing and finally what is Testing in DevOps. Finally we had lovely workshop with the participants trying to find out different ways to think about quality and testing in different parts of the DevOps infinity loop.
Accelerate your Kubernetes clusters with Varnish CachingThijs Feryn
A presentation about the usage and availability of Varnish on Kubernetes. This talk explores the capabilities of Varnish caching and shows how to use the Varnish Helm chart to deploy it to Kubernetes.
This presentation was delivered at K8SUG Singapore. See https://feryn.eu/presentations/accelerate-your-kubernetes-clusters-with-varnish-caching-k8sug-singapore-28-2024 for more details.
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Tobias Schneck
As AI technology is pushing into IT I was wondering myself, as an “infrastructure container kubernetes guy”, how get this fancy AI technology get managed from an infrastructure operational view? Is it possible to apply our lovely cloud native principals as well? What benefit’s both technologies could bring to each other?
Let me take this questions and provide you a short journey through existing deployment models and use cases for AI software. On practical examples, we discuss what cloud/on-premise strategy we may need for applying it to our own infrastructure to get it to work from an enterprise perspective. I want to give an overview about infrastructure requirements and technologies, what could be beneficial or limiting your AI use cases in an enterprise environment. An interactive Demo will give you some insides, what approaches I got already working for real.
Securing your Kubernetes cluster_ a step-by-step guide to success !KatiaHIMEUR1
Today, after several years of existence, an extremely active community and an ultra-dynamic ecosystem, Kubernetes has established itself as the de facto standard in container orchestration. Thanks to a wide range of managed services, it has never been so easy to set up a ready-to-use Kubernetes cluster.
However, this ease of use means that the subject of security in Kubernetes is often left for later, or even neglected. This exposes companies to significant risks.
In this talk, I'll show you step-by-step how to secure your Kubernetes cluster for greater peace of mind and reliability.
Neuro-symbolic is not enough, we need neuro-*semantic*Frank van Harmelen
Neuro-symbolic (NeSy) AI is on the rise. However, simply machine learning on just any symbolic structure is not sufficient to really harvest the gains of NeSy. These will only be gained when the symbolic structures have an actual semantics. I give an operational definition of semantics as “predictable inference”.
All of this illustrated with link prediction over knowledge graphs, but the argument is general.
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
Atos whitepaper - Is consumerization technology good for business?
1. C
White paper
consumerization
technology
is it really good for business?
Your business technologists. Powering progress
2. Consumerization technology.
Is it really good for business?
Consumerization in the enterprise is one of Contents Legal, regulatory and
the most hotly debated issues today. To take security considerations
advantage of consumerization, CIOs must Definition and scope
ask two questions: “why shouldn’t we?” What are the major regulatory and
Why aren’t organizations exploiting the vast governance issues that stand in the
and “why do employees have access to
array of consumer devices in the world today? way of consumerization?
better, faster, newer technology at home
than at work?”
Enabling diversity – embracing Why stop at devices?
This white paper explores how consumerization consumer choice Are there limits to the concept of Bring Your
can deliver significant benefits to an How can an enterprise give employees the Own in the workplace, allowing employees’
organization, and what the key considerations same technology choices that are available own applications, email platforms and even
are when looking to adopt a consumer or a at home? cloud data?
‘bring/buy-your-own (BYO)’ scheme. Today’s
BYO discussions are limited to device choice,
but shouldn’t BYO extend further into other
The business context – consuming A vision of the future
aspects of the corporate infrastructure? the benefits What lies ahead for business as the
This paper outlines the potential benefits What is the payoff for consumerization? boundary between personal and working
of adopting this way of working. life increasingly blurs, spurred by advances
The technology context – in consumer technology?
breaking down the walls
Taking the first steps
How can businesses prepare for new trends
and employee behavior – and why is the walled
to consumerism
garden approach about to change? What are the simple and feasible moves
to make right now?
2 Consumerization technology is it really good for business?
3. Definition and scope
There are compelling reasons why consumerization can have a
positive impact on the enterprise, but blockers must be removed
to make change possible and benefits clear.
An IT infrastructure provides the backbone of The working environment as we know it This paper will show the compelling reasons
an organization in the 21st Century. Without today is changing. The types of jobs that why consumerism can have a positive impact
the correct infrastructure, an organization exist, the ways of communicating and sharing on the enterprise, highlighting which blockers
risks being inefficient and uncompetitive with others and the demands of the next must be removed in order to make this change
in a highly competitive world. At the same generation of employees are pushing the possible and how a corporate organization can
time, a state-of-the-art infrastructure is not boundaries in every way. ’Cool’ new devices benefit from challenging norms and asking why
going to automatically make an organization and technology is available to consumers first, they shouldn’t be adopting this approach.
a class leader; it is the people who use the and where previously only large organizations
infrastructure that make that possible. A and governments produced and consumed
corporate IT infrastructure covers a wide array information (prosumers), today everyone
of technology, ranging from data centers, connected to the Internet is a prosumer,
business applications and networking to the creating, sharing and storing data from
desktop PC or laptop used to access company a wide range of devices.
data and systems. Traditionally, this has been
an environment restricted and standardized So why has the corporate world stood still and
into a homogeneous environment in order to remained such a monolithic and homogeneous
drive down the cost of management and keep environment when the way of working is
control of corporate assets. evolving, despite legacy foundations? Why
shouldn’t organizations take advantage of the
Towards the end of the 20th Century, corporate vast array of information, skills and consumer
IT infrastructures evolved rapidly. At the same devices in the world today? This is the concept
time, personal computing and the Internet of consumerism. Devices, services or software
were considered to be relatively new concepts that is intended for the mass consumer market
in an embryonic phase. As a result, the use can cross over and equally be used in a
of technology in the home was limited and corporate environment. Bring Your Own
people often only accessed a computer at (BYO) is a core part of this concept, referring
work, using a corporate device. Fast forward to to end users providing their own tools,
today and the inflexion point where consumer typically a computer or smartphone.
IT caught up and was on a par with corporate
IT is now just a distant memory. Computers
and the Internet are a part of everyday life for
almost a third of the world’s population. The
availability of desirable consumer electronics
has escalated, at a growth rate with an uncanny
similarity to that predicted by Moore’s law.
Consumerization technology is it really good for business? 3
4. Enabling diversity –
embracing consumer choice
Corporate boundaries are fading and a new Gen Y generation
workforce demands a new way of working. About to enter the
workforce is Generation Z – digital natives, with life-long use of the
Internet, instant messaging, text messaging and smartphones.
Transforming a business can be complex, and For an organization to support both a Which approach is right for
enabling a consumer-based model requires traditional locked-down estate of technologies which business?
management to show vision. Some key together with a new-world openness may
changes must be implemented. become too cost prohibitive. But not realizing There are a number of different ways in which
the benefits of new ways of working, whilst consumer schemes can be introduced, and
Primarily it is about providing the employee having to continue to support legacy ownership of device is often a topic for debate.
the same level of choice within the corporate processes, may impede progress. Whether the device is the user’s personal PC
environment that they expect in private, (BYO) or whether it is a PC purchased through
but with key control systems in place so Reward a company preferred supplier scheme, via
as not to introduce risk to the business. an online webshop for dual use, similar to a
This is the concept of enabling diversity A BYO scheme can be delivered as part of company car scheme, the end result is similar.
and a key stepping stone in realizing a an employee reward scheme and can have Different approaches each have an impact on
new way of working. a beneficial effect in a number of different procurement, HR and remuneration terms and
ways. Positive feedback from employees and conditions for the end user.
Consumerization will be the most significant an attractive working environment for the
trend affecting IT departments in the coming workforce of tomorrow will have a significant Each approach has different benefits that must
years. It is no longer acceptable to provide positive impact. This, combined with the be reviewed in defining the right approach for
workers with a workplace environment removal of the de-motivating factor of having an organization. What remains common to
technologically less developed than their to struggle with an IT department to be able all approaches is that the end user becomes
workplace at home. At the same time, to work efficiently and an increased level of accustomed to the infrastructure changes
corporate boundaries are fading and a new trust, will be seen as reward enough by many. required to secure such a new way of working.
generation (Gen Y) workforce is demanding a This could even be extended by offering Each approach has different benefits that must
new way of working. And about to enter the supplementary benefits, such as insurance be reviewed in defining the right approach for
workforce is Generation Z; digital natives, born schemes, negotiated prices or other options an organization. What remains common to
in the 1990s, that have had life-long use of the around the core BYO offer. all approaches is that the end user becomes
Internet, instant messaging, text messaging accustomed to the infrastructure changes
and smartphones. They demand even better At Atos, an employee webshop enables required to secure such a new way of working.
information technology tooling. users to choose their own corporate mobile
phone from a wide range of devices.
Choice Budget for purchase, trade-up options and
delivery are all carried out by the user via a
Some people do not like change, nor do they self-service portal, which is integrated into
like choice. It should be recognized that some payroll systems. The BYO phone service has
individuals will be more proactive and embrace over 3,000 satisfied users.
new concepts than others. Some users expect
to be provided with the tools to do their job
role, whilst others strive to gain the freedom to
make their own choices.
Any organization considering the introduction
of BYO equipment must consider whether
whole or part adoption of the concept is
appropriate, together with opt-in, opt-out
or mandatory schemes. Offering choice to
employees may increase complexity, especially
in the short term, with consequences not only
in the technical domain, but also for Human
Resource (HR) policy, employee relations and
many other aspects of business.
4 Consumerization technology is it really good for business?
5. The business context –
consuming the benefits
Personal productivity can increase if workers use a device they
are used to. If an employee uses a device with personal data on,
then they are more likely to respect it and lose less time dealing
with support issues.
If implemented correctly, there can be There are some good examples of where a For example, fixed staff may not benefit from
significant business benefits to adopting a consumer scheme provides benefits. Typically, the approach and a BYO scheme is unlikely to
consumer-based model. These can be a contractor is given a device (or two; a be seen on production lines or in call centers.
realized in a number of different ways. smartphone and a laptop) to use whilst they It is also unlikely that important devices,
are working for an organization, on top of the such as point-of-sale devices or devices in
Given the current economic situation, cost premium price for their services. By supporting hospitals will be found running on someone’s
reduction is a high priority. Whilst some a consumer model, companies can demand personal laptop.
investment is usually required to enable a BYO that the contractor arrives fully equipped with
scheme, it is possible to reduce infrastructure those devices. This reliance on personal devices can help a
costs by removing device hardware costs and business be more reactive and flexible. Faster
replacing them with an employee purse or There is also a risk to the business that the change is possible if the size of the corporate
allowance. Significant savings can be made launch of a BYO scheme without the right infrastructure is smaller and more focused on
by avoiding refresh projects where logistics planning can be costly. Users might choose what is important to the business. By default,
and support costs can be significant. This inappropriate devices or spend too much business continuity measures are built into
direct reduction in cost is compelling to many time distracted by their social life, rather than flexible computing approaches. Separation of
organizations. Finally, there are facilities costs working. It is possible that using a BYO device the user from a device and building means
that corporate organizations must pay. If more is more complicated than using a corporate that a disaster in a building does not prevent
users are mobile or home-based and using device if the right infrastructure changes the user continuing their job.
their own devices then it becomes possible to are not made. Checks can be put in place
reduce the amount of office space required. to mitigate such situations. Two ways to Finally, BYO has strong green credentials
Higher user-to-desk ratios and simplified office safeguard against lost productivity are and can be considered a more sustainable
configurations turn buildings into meeting forcing users to choose devices with approach. This is because the total number
places rather than fixed locations. support warranties and adjusting the of devices managed is reduced significantly.
way personal objectives are measured. By eliminating the corporate laptop the
If implemented correctly, BYO schemes can number of devices an employee has at
improve productivity and efficiency. By focusing As well as the potential for negative user home is also reduced.
on business processes and application delivery behavior, it is possible that BYO simply does
to users, it is possible to improve the way of not fit with a job role or industry sector.
working by simplifying access to applications
and making them more widely available to Role Days Rate Total
users, from a wider set of locations.
Exec Project Board 10 1500 10000
Personal productivity can increase as a result Procurement time 10 900 9000
of the user using a device that they are used
to and that suits their style of working. Also, if Project Management 50 900 45000
an employee is using a device they choose or Planning and testing 50 750 37500
one with personal data on, then they are more
likely to respect that device and as a result Process/documentation 20 750 15000
lose less time dealing with support issues or Rollout time 40 600 24000
worse. Combine this with the fact that the
new found flexibility is highly appreciated by Problem Resolution 20 600 12000
employees and the result is typically more Total $160,000
dedication and commitment.
A recent multi-site mobile phone rollout
If implemented correctly, there can be program for 5000 users managed by Atos
cost approximately $160k. Time spent
significant business benefits to adopting a selecting and testing devices, planning
and performing the physical handover and
consumer-based model. configuration of phones can be avoided by
enabling employees to source and set up
the phones themselves.
Consumerization technology is it really good for business? 5
6. The technology context –
breaking down the walls
It is no longer feasible to manage every single device that interacts
with the business infrastructure. Instead, the environment in which
they operate needs to be managed.
The corporate network is an organization’s Despite the above, cloud-based services will Security – when devices are no
walled garden. It provides an infrastructure take some time to become common place and longer managed
closed off from the outside world with restricted this means that enterprises are at risk of not
access to employees. taking advantage of this new way of working The traditional walled garden model has some
now. So what else can be done? fundamental problems; it neglects what is
Generally, the network is inflexible and important to organizations and where the
can make it difficult to communicate and Network threats to an organization originate from. It is no
collaborate with others (often in their own longer feasible to manage every single device
walled garden environments). However, it is The walled garden approach to corporate that interacts with the business infrastructure.
perceived to be a highly secure solution and, network design is something that must change. Instead, the environment in which they operate
by standardizing what happens inside this safe The traditional approach to corporate LANs, needs to be managed. This will be achieved
haven, costs can be reduced and controlled. WANS, fixed offices and resilient networks through the following approaches:
is, in many cases, no longer fit for purpose.
This is a risk adverse approach to security, It may still have a key role to play in some „„Manage the core network – use advanced
but it has often prevailed and often for very organizations, but these will gradually become Network Access Control (NAC) or Network
good reasons. The challenge of protecting an the minority because the model no longer fits Access Protection (NAP) technologies to
enterprise IT infrastructure from all the threats the requirements of all organizations. protect the environment and also implement
in the world is a significant one, before personal secure network areas where restricted
devices are even introduced into the equation. The need for mobility has acted as a catalyst for access must be maintained for customers
change, but consumerism could speed up the
„„Secure data – by centralizing corporate
But for how long can security be the reason rate of change further. The speed will depend
data and encrypting it whilst in transit
for not changing and is it really the most on the type of organization, but in general
and at rest, (controlling access by)
cost-effective option? How can organizations these trends will be common:
application-based access policies,
prepare for new trends in order to take exploiting SSL VPN technologies
advantage of new ways of working before „„Shrink the corporate network to the edge of
the datacenter and use the Internet instead „„Stolen devices – an organization may
the competition does and what are the key choose to wipe devices once reported stolen,
technology reasons and choices that deploying of a corporate WAN for access to services
regardless of ownership. This might appear
a consumer approach forces an enterprise IT „„Reduce costs by reducing the number of
in the terms and conditions for the employee
organization to think about? office locations through home-working
that, if a device is stolen, then the owner
initiatives and increased mobile working
of data contained on the device is able to
Cloud „„Deploy network access control security remotely ‘kill’ or wipe the device
measures. Enable a quarantine solution
So why is this about to change? Economic „„Maintain Quality of Service for business
where unknown devices can be identified
pressures mean that cash to invest in processes – new ways and basic filtering
and moved to a network segment with
technology improvements is limited. The „„Exploit changing consumer patterns – for
limited services and open Internet access.
advent of cloud-based services is having a instance, increasing bandwidth available
This allows any device to connect to the
positive impact on this. Updating technology, to the home worker through broadband,
corporate network without risk of data loss
providing business users with more reducing the requirement for centrally-
or threats to internal systems. For devices
functionality and capability without significant provided corporate bandwidth
that are identified as ‘known’, enforce checks
CapEx investment is very attractive to many
such as a security patch level, AV signature or „„A change of emphasis – to focus on
organizations. The key industry players are
certificate, before allowing access to the core securing applications, and data in particular,
placing significant investment in changing
network services rather than the device, through the use
the way users store and share data, access
information and communicate via the cloud. „„Enable simple remote access. Allow of secure containers
employees to connect over standard „„Identity is a major consideration in
Once an organization is using cloud services, Internet connections from anywhere, either consumerism – when interacting with
then why shouldn’t the access device be a browser-based or client applications securely services, is the user acting as a private
personal device, such as smartphone, tablet streamed, without the need for a VPN individual or as an employee? The distinction
or netbook? The device is gradually becoming connection and token. This reduces costs will become increasingly blurred as
the platform for communication, email and and improves the end-user experience unification occurs.
calendar applications, as well as a screen or „„Investment is required to make change,
browser for accessing cloud-based services. As but investment can unlock significant
this becomes more of a reality, then so does savings once implemented.
the concept of consumerism.
6 Consumerization technology is it really good for business?
7. Delivering business applications Supporting the workforce „„Unified communications technologies,
and workplace which include presence, instant messaging,
Some changes are required to enable a VoIP and video conferencing, greatly
consumer scheme, shifting thinking towards All too often workplace management is based improve the remote communications
management of the virtual workplace and not on the device first and then the employee experience so remote working is more
the desktop device. Critical to all businesses as the user of the device. This concept must effective and productive
are applications. Without these, employees are change, placing the user at the center. The
unable to carry out their job. Therefore, before „„The changes to the way support is made
introduction of consumer devices can help
considering a BYO scheme, the question of available to users must be provided in a clear
achieve this. BYO will free up valuable time
how to enable access to applications is critical. policy at the outset. This is essential so that
that is spent discussing makes, models and
users have the right level of expectation
versions; conversations that are all too common
As a result, more focus on new ways to about the type and level of support they
and add little value. This will allow CIOs and
distribute applications is required. Options will receive as a BYO user. If users are
their teams to focus on removing costs from
include using Application Virtualization, uncomfortable with the terms of the service,
their service and providing added value back to
App Stores, or a renewed push towards then they can opt to keep a corporate device.
the business.
making all corporate applications web-based.
Technologies similar to Citrix XenApp and Specifically, a Bring Your Own scheme can Some readers may think that this is an
XenDesktop can help enable access without eliminate costs in the following ways: interesting concept, but in reality far too difficult
costly and time-consuming application to implement and manage. Perhaps think of it
redevelopment. Google and Microsoft are „„Hardware, ‘break-fix’ and desk-side support this way; if an organization has weak policy-
already making web-based versions of well- services will be transformed and perhaps based control and users have full administrative
known office applications and so this can also even eliminated, being replaced by a courier rights to their corporate devices, then it already
be an option. service or fully remote support services. The allows freedom to users. Whether they are
user buys a device with a warranty and as a authorized to make changes to the systems or
All of these technologies must function result is fully responsible for hardware fixes not, a large percentage will be doing just that. In
across the Internet as well as the corporate this scenario, the organization has the concept
„„Management overheads will be reduced.
network. Some application redevelopment in place, but without the proper controls.
By entrusting responsibility to the end
may be required so that applications are
user, the amount of contacts with a central
always rendered and delivered to the end user, Others will consider that the scheme is
helpdesk is automatically reduced as is
regardless of device form and screen size. only applicable to technically-competent
the amount of logistics, procurement
people. This is not entirely true as two
and support required
Delivering a corporate image factors contribute to dispel this myth. Firstly,
„„Longer term, once devices are owned technology is getting simpler to use. It is
Distributing an entire corporate workplace by the user, there may not even be a everywhere and the days of computers
(using Virtual Desktop Infrastructure requirement for software compliance being specialist items have long been a thing
technologies) is another increasingly popular processes and tooling of the past. Secondly, the level of technical
option. Standard corporate image management competency of employees is higher now than
will potentially no longer be required as users ever before and this is going to explode as Gen
will bring their own so this removes cost Y and Gen Z begin to dominate the workforce.
and complexity. What is left is much simpler.
New client virtualization technology (Such as
Citrix XenClient) can provide exciting options
for maintaining multiple virtual images on
one device, providing complete segregation
between environments.
Once an organization is using cloud
services, then why shouldn’t the access
device be a personal device, such as
smartphone, tablet or netbook?
Consumerization technology is it really good for business? 7
8. Legal, regulatory and
security considerations
By stipulating which devices and software solutions are used in a
corporate environment, access to information can be controlled
with a reasonable level of confidence. But there are other ways to
manage exposures.
Data security Software compliance HR, personal benefits
Perhaps the biggest current concern for all and licensing and taxation
organizations is the security of information Software compliance is a significant HR policy may have to be adjusted to support
– protecting it from loss or leakage to the consideration when adopting a BYO scheme. consumer models in the workplace. Opt-in
public (which may have legal ramifications) How applications are deployed and how they fit or opt-out clauses and changes to the hiring
or competitors. By stipulating which devices with the licensing terms of a particular vendor is and firing processes as an example. Taxation
and software solutions are used in a corporate very complex. Full consideration of what using law varies from country to country, but in
environment, access to information can a particular piece of software on non-corporate some regions there are tax benefits to the
be controlled with a reasonable level devices or the delivery of applications per organization and to the individual when
of confidence. user, rather than per device, must be fully self-provided equipment is used. How the
understood. Furthermore, steps must be taken device is purchased might vary depending
Encryption technologies, device tracking, to ensure the final solution is fully compliant. on the country where the scheme is being
and now the ability to remotely wipe data implemented in order to mutually benefit
from portable devices, aid in controlling the Solutions such as virtual desktops or terminal employee and employer.
availability of information and reducing risk of services can prevent applications being
exposure. As soon as non-controlled devices installed on an end user’s device, potentially Privacy
and software are introduced, this confidence simplifying the issue. Wider acceptance of
is diminished and risks increase. open-source applications in the workplace The blend of consumer (personal) and
could also enable a smoother transition to corporate information leads to privacy
It is therefore important that the consideration BYO. A robust lifecycle management process concerns – both for the individual and
of self-provided (BYO) solutions by an employer is essential in order to install, manage and the company. Where does the corporate
is backed up and supported by the inclusion of revoke software from unmanaged devices, environment end and private life begin? What
technological measures to continue to manage whilst remaining compliant. is acceptable on a privately-provided device
data security appropriately. that is not acceptable on a corporate device?
The management of these issues will need
Health and safety to mature as both individuals and companies
A company has a duty of care to its employees’ become accustomed to shared environment.
welfare. In an IT context, workstation
assessments ensure that the working
environment is suitable for the employee.
This covers areas such as correct posture,
appropriate lighting and adherence to
recognized standards on device emissions.
However, self-provided equipment may
undermine the ability for organizations to
provide these guarantees. With employee
choice comes employee responsibility to
select appropriate equipment for the working
environment or to accept any shortfall and
associated health and safety risk.
8 Consumerization technology is it really good for business?
9. Why stop
at devices?
Today, collaboration is tightly integrated with corporate directories
to enable integration with office productivity tools, and fast contact
look-up within the corporate environment. But should it be
restricted to this?
‘Bring Your Own’ in the context of physical Bring Your Own email platform editing environments, with multiple users all
end-user devices, predominantly computers simultaneously contributing content. But as
and smartphones has been considered above. Whilst perhaps considered a dangerous with all data stored in non-controlled locations
However it does not end here. Below are a prospect, any email that is transported openly there needs to be a risk assessment on the
series of BYO objects that individuals are now over the Internet (for instance, exchanged impact of loss of access, loss of data and loss
bringing to the corporate world. between different organizations) could be held of privacy.
on an individual’s private email service with no
further loss of security or privacy. The use of
Bring Your Own social public, and often free email services such as
Bring Your Own applications
networking tools Google’s Gmail or Microsoft Live could become Whilst over the past decade there has been a
Services such as LinkedIn and Plaxo have been commonplace – with or without corporate general trend towards Internet technologies
built with the goal of establishing networks branding and corporate email addressing. and cloud delivery, there has been a recent
of professional contacts. These professional resurgence of the application. This has been
social networks have many uses, including Bring Your Own driven by Apple’s App Store concept and now
recruitment and collaboration, and are now collaboration tools the Android marketplace. Whilst originally
being integrated with other services. The targeting consumers with smartphones, these
networks are now even being embraced in The corporate world is introducing applications are now providing improved
classical corporate tools such as Microsoft collaboration technologies to improve and targeted functionality on tablet devices
Outlook. The Outlook social connector communication, reduce travel, associated and are expected to pervade other areas,
transparently brings in the individual’s costs and enhance green credentials. such as television set-top boxes. The choice
professional social network into the Outlook of application and the way of working will
contact list, and thence to any smartphone Today, collaboration is tightly integrated with be made by the individual, rather than by a
that is integrated with Outlook. There are corporate directories to enable integration corporate dictator, with the goal of enabling
privacy concerns with services such as with office productivity tools, and fast contact increased productivity and work satisfaction,
Facebook at the moment, but notwithstanding look-up within the corporate environment. But whilst adherence to standards enables data
these issues, Facebook and similar social should it be restricted to this? Public tools such compatibility across applications.
networking tools further extend corporate as MSN Messenger have historically provided
collaboration opportunities. more advanced collaboration features than Bring Your Own identity
corporate options, and work across company
boundaries. Newer kids on the block include The concept of using federated identity from
Bring Your Own Google Talk, now with voice and video Internet or cloud-based services is relatively
knowledge community communication, and there are other forms new, but could have profound effects in the
The LinkedIn service mentioned above of collaboration such as Twitter. future. Seamless integration of corporate and
has introduced knowledge groups and private identity is something that will scare
discussion forums. This joins other knowledge Bring Your Own data store some, but also provide benefits to users. The
future might include users bringing their own
communities such as Experts Exchange in the cloud identity and authentication mechanism with
(which covers the field of IT) and other
community groups that collaborate with Cloud-based storage enables the sharing of them (e.g. biometrics) rather than traditional
each other to supplement traditional vendor information across companies and reduces LDAP-based authentication.
support channels. email inbox bloat. It facilitates access from
multiple devices and locations, enabling a
user to transfer between laptop, smartphone
and tablet device, as appropriate. Services
such as Google Docs provide collaborative
Consumerization technology is it really good for business? 9
10. A vision of
the future
The relationship between the corporate and personal world
is blurring all the time.
Work and employees The elimination of the Elimination of the business-
Companies will be able to demonstrate corporate infrastructure specific device and
reduced costs as their workforces become Expensive corporate network infrastructures application market
increasingly IT literate and use their own IT with ineffective boundary controls will Today a large percentage of device sales,
resources in order to perform work. become a thing of the past. Workers will use for instance laptops and phones, occur in
current and future Internet technologies for corporate markets. Vendors delivering to
As the boundary between personal and all their communication needs – corporate these markets have specific device ranges for
business life increasingly blurs, spurred by and personal. business. In the short term they will continue to
advances in consumer technology used in a develop business-differentiating technologies
business context, the relationship between Corporate networks will shrink to just core at a price premium in an attempt to keep these
company and employee also changes: infrastructure and data. Outlying offices will markets buoyant.
move to VPN and VPN-less technologies,
„„The business no longer provides equipment accessing remote corporate data at a However, as the value of these differentiators
for employees corporate base location or in the cloud. diminishes, and, for instance, management
„„The business/employee relationship features become more prevalent in consumer
becomes looser Application delivery will predominantly devices, then the premium business market
„„Employees behave more like move to Internet technologies using RESTful will reduce and eventually disappear.
freelance workers architectures. Applications requiring more As consumer technology improves, and
complex and performance-intensive local consumer IT proficiency increases, many
„„Employees increasingly work for interaction will be delivered to remote organizations will consider consumer
multiple companies. devices using Internet-wide delivery and solutions to be ‘good enough’.
control mechanisms.
10 Consumerization technology is it really good for business?
11. Taking the first steps
to consumerism
Consumerization should help all workers, without segregating
users into groups based on historical data or stereotypes.
It maybe that the benefits of a consumer or The HR and taxation aspects of such solutions Resulting benefits range from cost reduction,
BYO scheme are clear, but it is not a viable should not be ignored. The most effective creation of an infrastructure ready to meet the
option at the moment. In that case, there are a approach should also be identified early on. demands of the future mobile workforce, and
number of things that can be done to ensure a focus on securing and providing the services
that the concept and way of working can be Finally, it is important not to focus just on the that really matter to the business. The pressure
applied at a later date. new (Gen Y) staff within the organization. for change from both the current and future
The strategy should help all users, without employee is higher than ever before and this is
To begin with, how control in the infrastructure segregating users into groups based on only going to increase as the pace of innovation
is managed and can be administered in other historical data or stereotypes. Other factors of in ‘cool’ consumer technology continues.
ways that do not negatively impact users can personal preference, lifestyle or job type may
be explored. Infrastructure projects that will arise, other than age, which will see certain Once a consumer approach has been
pave the way for BYO schemes can be planned. people interested in such schemes and others established, it means one less thing for
This way of thinking will bring the organization prefer the security of the traditional approach. the CIO to think about, enabling a shift in
benefits, whether consumerism is the end focus to the added-value services that
game or not. Summary really matter to the business.
Organizations could also engage with Consumerism is not going to work in every
suppliers to identify a wider range of devices organization or be suitable for every person.
on offer from the corporate catalogue and But in the right environment and with the right
provide more choice to the user. They could user base it will have a transformational effect
consider relaxing rules on website filtering and on an organization and the perception of the
the use of personal devices. This could possibly workforce, something which should not be
begin with mobile phones, but must always underestimated. Until traditional norms are
ensure that company policies are revised to challenged and this approach considered, an
align new expectations and levels of trust for organization will not discover the possibilities
this freedom. it can unlock.
The impact of cultural change could be In essence, it is about embracing and enabling
investigated and parts of the organizations that diversity and choice, but with control over
what is really important to the core business.
could work in new and different ways identified
By enabling such a way of working, a company About the authors
with changes made to business processes
in these areas. In combination with process automatically offers users more choices to James McMahon is the Global Domain
analysis and change, pilot schemes could work in a way they prefer and at the same Manager for the Adaptive Workplace
be run, possibly linked to end-user efficiency time remove a significant part of the cost offering from Atos and a member of the
studies, such as Lean. base. The organization gains flexible working, Atos Scientific Community.
positive feedback from employees and creates
This will enable quantification of the impact on an attractive working environment for the Mike Smith is the Chief Architect of
end-user productivity. Running such programs workforce of tomorrow. Atos’ Managed Services business in the
on an optional opt-in basis is considered UK and a member of the Atos Scientific
best and also gives the user population the The de-motivating factor of having to Community.
opportunity to volunteer and be part of struggle with an IT department in order to
something new and exciting. be able to work efficiently should never be This publication has been prepared by
underestimated. Consumer technology can the Atos Scientific Community. Atos
unequivocally help businesses today, but helps its clients make the most critical
ultimately consumerism may not transform choices regarding the future. Our Scientific
a business on its own. A new way of thinking Community, currently a network of some
and challenging why things shouldn’t be done 60 members, represents a mix of all
differently to current corporate norms can have skills and backgrounds, and members
a significant role to play in transforming the come from all geographies in which Atos
perception of corporate IT in the eyes of the operates. Its aim is to anticipate upcoming
users and consequently the customers they technology disruptions and craft a vision
come into contact with. to address the new challenges facing the
IT services industry. Atos is investing in
the Scientific Community’s findings and
making this vision available to its clients
and partners.
Consumerization technology is it really good for business? 11