Feeds

Just how special are Power Users?

Standard kit will do them just fine

  • alert
  • submit to reddit

SANS - Survey on application security programs

Workshop Power users are often at the cutting edge of an organisation’s revenue generation, product development, operational excellence or strategic core, and as such they require excellent IT systems to support their role. In years gone by, the needs of these specialist workers often necessitated that their PCs be customised and configured precisely to their needs.

Advances in technology raise the question as to whether desktop systems have now become so powerful in terms of processing power, memory, networking and storage capacities or bandwidth, that the demands of these high performance users can be met by “standard” equipment - or at least a common base with manageable options?

Where power workers are responsible, critical or important business functions, it is important to understand not only the “physical’ requirements of the PC kit in terms of performance, but also to factor in the entire working environment, including the licensing costs of the applications, business risk exposure, time constraints or the cost of lost productivity when something goes awry.

The cost to the business of each of these could easily outweigh the cost advantages of trying to run common machines and support processes across high performance users and less critical ones. This factor alone may justify making use of specialist hardware, but only if this kit is demonstrably more reliable than that of the standard issue equipment.

It is likely that modified, or even dedicated, support processes will be required, not only for the customised workstations but potentially for application packages or other software tools.

If it is decided that power users require special equipment, it needs to be remembered that the support team may also have to implement specialist hardware recovery or break/fix processes. Clearly, such customised support requirements, potentially making use of dedicated “hot spares”, will come with additional costs.

Companies where over 50 per cent of users are classified as “demanding” are far from rare, as seen in the figure above. For these organisations, the question posed at the start of this article needs to be inverted - it becomes one of whether there are economic benefits to be realised in supplying the minority of non-demanding users with PCs or laptops of a lower specification.

Instead of buying dedicated new machines, this could be achieved by phased refreshes where high performance users receive the newest machines, and older kit moves to the more “casual” users. This approach needs to be balanced against other options, such as dividing the user base into a few “pools” with a standard configuration for each use case.

Whichever way it happens, the process of device selection is rarely straightforward. There is also another factor to be considered beyond the normal cost of acquisition and support. This is the “personal” component that is always involved in PC selection.

If the organisation does decide to “downgrade” power users to the same devices supplied to the rest of the user base, it may well have to take a diplomatic approach when explaining its decision to those who previously utilised specialist kit.

The culture of users is still to regard the PCs they use as their personal device rather than as equipment supplied by the business for productivity enhancement. Perceptions of being “downgraded” are likely to lead to a degree of discontent, something that often results in friction. ®

SANS - Survey on application security programs

More from The Register

next story
WTF happened to Pac-Man?
In his thirties and still afraid of ghosts
Reg man builds smart home rig, gains SUPREME CONTROL of DOMAIN – Pics
LightwaveRF and Arduino: Bright ideas for dim DIYers
Leaked pics show EMBIGGENED iPhone 6 screen
Fat-fingered fanbois rejoice over Chinternet snaps
Microsoft signs Motorola to Android patent pact – no, not THAT Motorola
The part that Google never got will play ball with Redmond
Apple patent LOCKS drivers out of their OWN PHONES
I'm sorry Dave, I'm afraid I can't let you text that
Happy 25th birthday, Game Boy!
Monochrome handset ushered in modern mobile gaming era
Rounded corners? Pah! Amazon's '3D phone has eye-tracking tech'
Now THAT'S what we call a proper new feature
Zucker punched: Google gobbles Facebook-wooed Titan Aerospace
Up, up and away in my beautiful balloon flying broadband-bot
Slip your finger in this ring and unlock your backdoor, phone, etc
Take a look at this new NFC jewellery – why, what were you thinking of?
prev story

Whitepapers

Securing web applications made simple and scalable
In this whitepaper learn how automated security testing can provide a simple and scalable way to protect your web applications.
Combat fraud and increase customer satisfaction
Based on their experience using HP ArcSight Enterprise Security Manager for IT security operations, Finansbank moved to HP ArcSight ESM for fraud management.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
SANS - Survey on application security programs
In this whitepaper learn about the state of application security programs and practices of 488 surveyed respondents, and discover how mature and effective these programs are.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.