The Seven Rules of DIY IT
-
Upload
future-of-working -
Category
Technology
-
view
248 -
download
1
description
Transcript of The Seven Rules of DIY IT
THE SEVENRULES OFDIY IT
Learn how to stop worrying and love DIY IT with these seven actions
! Backup
Security
Risk
Management
Embrace the
Apps Model
Bridge the
Chasm
Support
Policy
Usage
Policy
Business technology infrastructure as a lifestyle expression is now a reality. The CEO, the marketing manager, the sales executive - they all have their own lifestyle IT strategy, made possible by the consumerization of IT.
The speed and intensity of the bring your own device (BYOD) and bring your own apps (BYOA) movement caught many businesses by surprise - and many still haven’t got their heads above water, being continuously, uncontrollably swept along by the current. This has led to business tech infrastructures becoming underpinned by a random array of software and hardware.
But while this movement has caused headaches for many IT departments, it’s also given them an opportunity to become proactive business partners rather than reactive technology management suppliers. It’s DIY IT - with IT departments adopting a people orientated service, allowing clients to use their preferred devices and services for the benefit of the business.
Unconvinced? Follow these seven rules and you’ll learn how to stop worrying and embrace DIY IT and everything that goes with it.
What is DIY IT? THE SEVENRULES OFDIY IT
Users are now driving the technology agenda.
The beginning of the BYOD movement
Users gain control
Make business leaders understand the operational and security risks involved with a DIY IT approach.
Loss of data, service agreements and other factors need to be considered.
Risk Management !1
Create a security policy suitable for your organization and the market it operates in.
A one-size-fits-all security model is counter-productive to the user and business needs.
Security2
Create systems that capture and back up critical data.
Don’t leave it to the discretion of the individual when it comes to backing up data critical to corporate governance.
Backup30
111
1
0
0
0
Develop a platform and apps laboratory to test users’ preferred technologies.
Smart users will increasingly take advantage of your evaluations and opt for recommended apps.
Embrace the Apps Model4
1
Security
Build an architecture that integrates the user experience with the corporate enterprise systems.
Prioritizing careful planning of the integration of public/private cloud with the non-cloud delivery channels.
Bridge the Chasm
Create a highly visible usage policy, explaining your right to wipe clean a compromised device, regardless if its corporate or BYOD.
Offer to host users’ personal data. Give them peace of mind and bring work/life integration a step closer.
Usage Policy6
Clarify which devices and apps the IT department will support, and the level of support it will provide.
Encourage a self-service approach to IT support. Promote communication and collaboration between users of approved devices/apps to solve IT problems.
Support Policy7
5
Find out moreDownload the full DIY IT white-paper - written by Financial Times columnist Ade McCormack - over at the HP website.
For more sharp analysis, disruptive opinions and the latest data about the workplace of the future, head over to the Future of Working blog.
1 Auridian
Workplace of the Future
DIY (Do It Yourself) ITA series of white papers by Ade McCormack, Auridian
Produced in association with