Feeds

The state of desktop support

Tell us your views

  • alert
  • submit to reddit

Securing Web Applications Made Simple and Scalable

Mini-Poll This week we've been looking at desktop management from the point of view of supporting users. It can be a jungle out there, as one reader illustrated:

Somehow, people still sneak through with all kinds of configurations and it's killing us - so many deskside visits it's unbelievable.

But is that the norm, or are some of you managing to keep the peace when it comes to keeping your desktop users happy? To find out we've assembled a short poll to go with your elevenses. Three questions, tick and bash – let us know what you're being asked, why you're really being asked and what you would do with your desktop users if you had the option. Shotguns optional.

READER POLL

Questions – what are the most common things you get asked about? (5 = very common, 1 = rare occasions)

  5 4 3 2 1
Application not responding properly or performance problem
System or service has failed or is not responding
Can't access particular application, files or service (for security reasons)
Loss of information – can you get something back from backup?
Need to reset passwords or change access rights
Security problems and breaches
Don't know how to do something
Receipt of inappropriate/unsolicited email
Loss or damage to equipment
Other (please state)

Causes – what are generally most things that you deal with down to? (5 = major cause, 1 = only on rare occasions)

  5 4 3 2 1
User ignorance or inexperience causing misunderstandings
User having made a change (they shouldn't have done)
User having installed something
User bringing in "kit" bought themselves and expecting support for it
User negligence, e.g. loss, theft of kit
Unreliable/outdated PC equipment
Unreliable IT environment in general
Policies needing to be stuck to
Other (please state)

Fixes – what would lighten your load?

  Major need Work in progress Already sorted No need
Locking down desktop and laptop software configurations
Improving IT reliability as a whole
Modernising the desktops and laptops used
Better remote monitoring/management tools
Better support / call desk tools (Inventory / Asset Management, Help Desk, Knowledge tools)
Provide access to community support options for users to help each other
Defining and implementing more workable policies
Offering more self service (e.g. for passwords, access)
Implement a "pay per call" charge back policy
Enforcement of policy (e.g. through disciplinary)
User training and awareness
Remove all users from the picture
Other (please state)

Application security programs and practises

More from The Register

next story
iPad? More like iFAD: We reveal why Apple fell into IBM's arms
But never fear fanbois, you're still lapping up iPhones, Macs
For Lenovo US, 8-inch Windows tablets are DEAD – long live 8-inch Windows tablets
Reports it's killing off smaller slabs are greatly exaggerated
Microsoft unsheathes cheap Android-killer: Behold, the Lumia 530
Say it with us: I'm King of the Landfill-ill-ill-ill
Cheer up, Nokia fans. It can start making mobes again in 18 months
The real winner of the Nokia sale is *drumroll* ... Nokia
Seventh-gen SPARC silicon will accelerate Oracle databases
Uncle Larry's mutually-optimised stack to become clearer in August
EU dons gloves, pokes Google's deals with Android mobe makers
El Reg cops a squint at investigatory letters
Apple orders huge MOUNTAIN of 80 MILLION 'Air' iPhone 6s
Bigger, harder trouser bulges foretold for fanbois
prev story

Whitepapers

Top three mobile application threats
Prevent sensitive data leakage over insecure channels or stolen mobile devices.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Top 8 considerations to enable and simplify mobility
In this whitepaper learn how to successfully add mobile capabilities simply and cost effectively.
Application security programs and practises
Follow a few strategies and your organization can gain the full benefits of open source and the cloud without compromising the security of your applications.
The Essential Guide to IT Transformation
ServiceNow discusses three IT transformations that can help CIO's automate IT services to transform IT and the enterprise.