Can you sack your IT department?

Between the credit crunch, the consumerisation of IT and the rise of cloud services, the role of the IT department is going to change.

Simply setting and measuring service level agreements (SLAs) isn't enough either, warns Ian Emery, vice president of email appliance vendor Sendmail.

"Email it is a mission critical system. You can have SLAs but if something happens, it's all well and good to say You owe us 200,000 for August' but you still don't have your email working," he said. "The IT department needs to have a good understanding of what the infrastructure is, how it operates, how it integrates with services in the cloud, and what can go wrong."

But that still won't take as much time as running the service yourself. That could mean you end up with an IT department that can get on with the projects users want that they haven't had the time and resources for, a much smaller IT team that does little more than support laptops and keep the network running while business users design their own tools and processes or an IT team with a very different set of skills that's far closer to the rest of the business.

Case study: Serena Software Google Gadgets and mashups are the new VB

Advertisement
Advertisement - Article continues below

Jeremy Burton, the chief executive of Serena Software, carries a BlackBerry like many executives. But his BlackBerry doesn't connect to a Blackberry Enterprise Server and Exchange, because he's part of the company's trial group using Gmail instead.

The man who came up with no email Fridays' at Veritas blogs from his BlackBerry as he travels instead of sending all-hands email announcements. He's replaced the nightmare' corporate intranet with a Facebook group. It's all part of practicing what Serena preaches: that for the next generation of applications and users who will have wide experience with Web 2.0 and consumer technology, linking information together and having a process engine is more important than re-inventing the repository. And that new generation of applications are likely to be mashups.

Featured Resources

Application security fallacies and realities

Web application attacks are the most common vulnerability, so what is the truth about application security?

Download now

Your first step researching Managed File Transfer

Advice and expertise on researching the right MFT solution for your business

Download now

The KPIs you should be measuring

How MSPs can measure performance and evaluate their relationships with clients

Download now

Life in the digital workspace

A guide to technology and the changing concept of workspace

Download now
Advertisement

Most Popular

Visit/operating-systems/25802/17-windows-10-problems-and-how-to-fix-them
operating systems

17 Windows 10 problems - and how to fix them

4 Nov 2019
Visit/strategy/28115/the-pros-and-cons-of-net-neutrality
Business strategy

The pros and cons of net neutrality

4 Nov 2019
Visit/domain-name-system-dns/34842/microsoft-embraces-dns-over-https-to-secure-the-web
Domain Name System (DNS)

Microsoft embraces DNS over HTTPS to secure the web

19 Nov 2019
Visit/social-media/34844/can-wikipedia-founders-social-network-really-challenge-facebook
social media

Can Wikipedia founder's social network really challenge Facebook?

19 Nov 2019