Feeds

If I wanted to get there, I wouldn’t start from here!

An alternative perspective on business productivity

  • alert
  • submit to reddit

The essential guide to IT transformation

Webcast The Register’s panel of experts are discussing alternative perspectives to business productivity in a live webcast from 10am on 3 December. Share your opinions and put questions to the panel, all from the comfort of your desk - register your interest today.

To some, the word 'productivity' just provides a means to squeezing more out of an already-overstretched workforce. To others, it’s about providing the tools necessary to cope with the seemingly uncontrollable escalation in the amount of information and communication needed. Both share a common foundation in making the best of things by optimising the way the world works at the moment.

An alternative does exist, however, one which involves looking up from the day job, taking note of some of the advances in place both in technology and business practices, and actually challenging the way some things are done. This is not about being either aggressive or defensive, it’s about structuring things, organising things and doing things more intelligently.

In this live Webcast, Dale Vile of Freeform Dynamics will start out by asking the question: “With the capability we have at our disposal today, if we could start all over, would we ever design our businesses to function in the way they do at the moment?” Many don't have the luxury of wiping the slate clean, but this not a bad place to start to focus minds and challenge constraints and assumptions that may no longer apply.

With the help of IBM’s Gary Gomersall, the panel will move on to discuss some very practical ways on which step changes in productivity can be achieved by using IT as a catalyst or enabler, leveraging existing as well as incremental investments.

Reg event moderator Tim Phillips will be on hand once again to oversee proceedings and ensure attendee questions and opinions are put to the panel throughout.

Tuning in and taking part in this Webcast couldn’t be easier. If you can't make the live broadcast leave us your details and we will email you when the on-demand edition is ready. Sign yourself up.

Secure remote control for conventional and virtual desktops

More from The Register

next story
6 Obvious Reasons Why Facebook Will Ban This Article (Thank God)
Clampdown on clickbait ... and El Reg is OK with this
BBC: We're going to slip CODING into kids' TV
Pureed-carrot-in-ice cream C++ surprise
TROLL SLAYER Google grabs $1.3 MEEELLION in patent counter-suit
Chocolate Factory hits back at firm for suing customers
Twitter: La la la, we have not heard of any NUDE JLaw, Upton SELFIES
If there are any on our site it is not our fault as we are not a PUBLISHER
Facebook, Google and Instagram 'worse than drugs' says Miley Cyrus
Italian boffins agree with popette's theory that haters are the real wrecking balls
Sit tight, fanbois. Apple's '$400' wearable release slips into early 2015
Sources: time to put in plenty of clock-watching for' iWatch
Facebook to let stalkers unearth buried posts with mobe search
Prepare to HAUNT your pal's back catalogue
Ex-IBM CEO John Akers dies at 79
An era disrupted by the advent of the PC
prev story

Whitepapers

Endpoint data privacy in the cloud is easier than you think
Innovations in encryption and storage resolve issues of data privacy and key requirements for companies to look for in a solution.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Advanced data protection for your virtualized environments
Find a natural fit for optimizing protection for the often resource-constrained data protection process found in virtual environments.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.
Next gen security for virtualised datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.