+ 0 Votes 9:09 a.m.- it begins... Tig2 3 years ago So Jason is giving us the lay of the land here. The topic is supposed to be "The Changing Face of IT". We live in a world of change. At a high level, this is a discussion of new challenges and trends in the world of IT. Tech Republic is in the unique position of being able to advise senior level people in a variety of roles to understand how the "worker bees" in IT perceive IT and their roles. Trends to watch- Consumerization of IT- According to Gartner, the old model of IT is moving. As the workforce changes, ownership of the enterprise platform is moving from the IT department and moving to the enterprise worker. We all have had individuals who want to do what they want to do and on the equipment and tools they want to do it on. Because this is in the name of productivity, IT must adapt and change. Or does it? And how? Borderless network- Old networks are changing as workers reach outside the enterprise. How does the IT department manage security in an environment where end users reach beyond the security of the interior network? How do we re-think security in this world? Clouds in the data center- CIOs see cloud computing as a real direction. How does computing in the cloud impact IT and how do we support this? What about the private cloud? Is the private cloud just virtualization with a different name? What does that mean to the IT professional? Outsourcing, the good, the bad, the ugly- Is outsourcing just a new way to approach resource management? Does it make sense for the enterprise to "own" their own IT or their own data centers? Is it better to let IBM have the "reins" of YOUR data center? What do you tell leadership when they want to move away from the in-house model? Mobilization- How do we manage that? Should IT own this or should we allow the individual to choose their own devices and we just manage? Or does the IT department define this? Knowledge workers want to be able to work on the go. So do people in a variety of other roles. How do we decide what tools work best and how do we advise the people "in the trenches" on devices that will best meet the need? Is the desktop device dead? We're going to discuss these topics. In the room, we will get around 15 minutes. You can take all the time you want... + 0 Votes 10:07- Social Media Policy in the Enterprise Rick Vanover Tig2 3 years ago How does the enterprise manage the social media policy? What are the points that should be considered? The enterprise needs to protect it's interests. That includes trade secrets, insider information, etc. By putting this in writing, the enterprise can remove ambiguity and clearly communicate standards and practices to the end users. While we are good with the idea because we are familiar with Internet use policies. But social media is a slightly different animal. The end user could ignore the Internet policy by simply going home and using their own computer. Social media is a different animal. What tools can help the enterprise to monitor employees? Are those tools mature enough to meet the needs? Are disclaimers effective? Why or why not? Is the statement "On the internet, no one knows you are a dog" true? Does the fact that you are a dog change the way people think of your owner? To what extent? How do you enforce your policy when your employee goes home? What do you do when your employee is disgruntled and takes your corporate name in vain? There is enough here to discuss for a very long time. What are your thoughts? Edit: Typo + 0 Votes The Twitter hashtag is #TRLive jasonhiner Moderator 3 years ago Here's the link: http://twitter.com/#search?q=%23TRLive You can see what people are posting about the event on Twitter, and then come back here and discuss it, of course. :-) + 0 Votes 11:06- Blogging Toni Bowers Tig2 3 years ago "Your picture is ugly" This was a real email received by Toni some years back. Blogging is as simple as starting a discussion and hitting "enter". Frankly, that is a lot of power in the hands of the individual. Toni shares with us some of the email (anonymously, of course) that she has received as a blogger on Tech Republic over the years. Blogging FOR TechRepublic is a joy. I know this as I have done it. But doing so constantly reminds you that there are opinions everywhere and everyone has one. The question to you all is, "What do YOU think is an effective blog? What words of advice would you give to the bloggers on TR? How can we improve the quality of our posts?" + 0 Votes Waves hello !!!!! Shellbot 3 years ago Hows eveyone doing?? Having fun?? Wish I was there .. + 0 Votes On my way! Scott Lowe Contributor 3 years ago It's 10 PM Thursday night and I'm heading out to drive to Louisville... wish I could have made day 1, but I will be there for day 2! Scott + 0 Votes 9:00 a.m. Consumerization of IT- Bill Detweiler Tig2 3 years ago IT consumerization has been something that we have seen but tried to ignore for years. It is believed that we no longer have the luxury of doing this. "Consumer IT will affect every enterprise. Attempts by enterprise to deny this are doomed to failure, just as previous attempts to deny Wi-Fi, "smart" mobile phones, the Internet, and even the PC itself failed". - Gartner- Consumerization refers to devices that appeared in the consumer driven market that moved into the business space and vice versa. Consumerization has been driven by equipment manufacturers who perceive the consumer as a revenue stream, the Internet and its ability to meet multiple needs for the average individual, and the Millenials- people born after 1980 who have never been without technology. Consumers are the largest consumers of technology. According to Paul Ortellini, President and CEO of Intel, the primary focus of the manufacturer is this group. Millenials bring a new attitude to the IT table. They have grown up with technology so they are more inclined to look to the technology solution to accomplish tasks. The Millenial is less inclined to respect barriers to the use of technology including corporate policies around IT. Risks in consumerization include security, loss of control, regulatory and legal issues, increased support costs, loss of productivity, and loss of user dissatisfaction. It becomes necessary to strategize to counter these risks. Consider how consumerization impacts your workplace and how you, the IT professional manage the risks while providing a flexible enough environment to maintain both productivity and user satisfaction. + 0 Votes Photos of the event jasonhiner Moderator 3 years ago Here are my live photos from the event (via a Flickr). We'll be publishing a larger gallery next week with a lot more photos. http://www.flickr.com/photos/jasonhiner/sets/72157624399975570/ + 0 Votes 10:00 IT Crimewatch- Deb Shinder Tig2 3 years ago To the tune of "Who Are You" by The Who... Deb is a former law enforcement officer, police academy instructor, Criminal Justice instructor and more. Cybercrime is a way to differentiate illegal activity that is committed using a computer network or the Internet. The computer might be a tool of the crime, a target of the crime, or used incidentally as a part of the crime. "Behavior reflects personality" - John Douglas, FBI profiler. Motivation can be emotional, "just fun", monetary profit, sexual impulse, political motivation, and psychiatric illness. Means are the ability to access the tools used in the commission of a crime. Opportunity is the ability to actually be present to commit the offense. These are the three necessary points to actually be considered a suspect for a criminal charge. 23% of malicious activity originates in the US. Not so good. Technologies that cybercriminals use include broadband, wireless, web 2.0, online banking, e-commerce, social networking, mobile computing, standardization, and the cloud. Obviously, we aren't going to stop using these tools... but neither will they. Fighting cybercrime requires appropriate and enforceable laws, law enforcement that understands technology, victims and witnesses that are willing to report, a court system that is able to appropriately weigh the evidence presented, and a corrections system that understands the difference between a hacker, a white collar criminal, and the so-called average criminal and rehabilitates appropriately. IT and law enforcement need to align in order to fight cybercrime. This requires that we consider the things that might keep us from working together. The tools we have available to us are basic. Monitor and document activity on your network. Report the crime when it is detected. Know the law or get to someone who does. Understand jurisdictional issues or get to someone who does. Finally, educate, educate, educate. Prevention and awareness are strong tools to fight cybercrime. Choose to get involved and educate others. + 0 Votes Streaming Open Mic Tig2 3 years ago There's a link on the front door to the live stream. Check it out!