Andrew Conry Murray


Upcoming Events

A Network Computing Webcast:
SSDs and New Storage Options in the Data Center

March 13, 2013
11:00 AM PT / 2:00 PM ET

Solid state is showing up at every level of the storage stack -- as a memory cache, an auxiliary storage tier for hot data that's automatically shuttled between flash and mechanical disk, even as dedicated primary storage, so-called Tier 0. But if funds are limited, where should you use solid state to get the best bang for the buck? In this Network Computing webcast, we'll discuss various deployment options.

Register Now!


Interop Las Vegas 2013
May 6-10, 2013
Mandalay Bay Conference Center
Las Vegas

Attend Interop Las Vegas 2013 and get access to 125+ workshops and conference classes, 350+ exhibiting companies and the latest tech.

Register Now!

More Events »

Subscribe to Newsletter

  • Keep up with all of the latest news and analysis on the fast-moving IT industry with Network Computing newsletters.
Sign Up

See more from this blogger

Users Move Faster Than Policy

I moderated a Webcast recently on messaging-based security threats. An analyst on the panel did what analysts always do???provided some very sound advice that happens to be very difficult to implement. His recommendation for enterprises was to accommodate user workflows???that is, to embrace the new technologies that users bring in from the outside to help them do their jobs.

It's great advice, but not always feasible because user-driven technologies are always ahead of enterprise policy, which tends to take a default-deny stance. IM, which was discussed in the Webcast, is a textbook example. Users brought IM into the enterprise because it facilitated communication with clients and coworkers. But IM is a nightmare for IT, particularly for highly regulated industries, because it's an inbound channel for malware and an outbound channel for sensitive data.

User-driven technologies also tend to be ahead of the tools that IT requires to monitor and manage them. Again, IM is a good example. Before dedicated IM proxies emerged, IT had to play the firewall version of whack-a-mole with port-hopping IM services.

Another problem is that IT serves multiple masters. No IT professional wants to stand in the way of user productivity, but they also have to answer to an extremely long list of corporate, industry and federal requirements. Like a parachute behind a race car, these requirements slow IT's response to emergent technologies.

So while I salute the analyst for some good advice, I'm not sure how effective it will be in today's IT reality. And the conflicts we've seen over IM are sure to be played out again over technologies such as the iPhone and enterprise mashups.


Related Reading


More Insights


Network Computing encourages readers to engage in spirited, healthy debate, including taking us to task. However, Network Computing moderates all comments posted to our site, and reserves the right to modify or remove any content that it determines to be derogatory, offensive, inflammatory, vulgar, irrelevant/off-topic, racist or obvious marketing/SPAM. Network Computing further reserves the right to disable the profile of any commenter participating in said activities.

 
Disqus Tips To upload an avatar photo, first complete your Disqus profile. | Please read our commenting policy.
 
IaaS Providers
Cloud Computing Comparison
With 17 top vendors and features matrixes covering more than 60 decision points, this is your one-stop shop for an IaaS shortlist.
IaaS Providers

Research and Reports

The Virtual Network
February 2013

Network Computing: February 2013

Upcoming Events



TechWeb Careers