Feeds

My work-from-home setup's better than the office. It's GLORIOUS

And I pay less for top-notch gear than my employers. Good, innit?

Securing Web Applications Made Simple and Scalable

Storagebod I’ve been fairly used to the idea that my PC at home is substantially better than my work one; this has certainly been the case for me for more than a decade. I’m a geek and I spend more than most on my personal technology environment.

However, it is no longer just my home PC. I’ve got better software tools and back-end systems. My home workflow is so much better than my work workflow that it’s not even a close comparison any more.

Add the integration with my mobile devices and my home setup is in a completely different league altogether. I can edit documents on my iPad, my MBA, my desktop, even my phone and they’ll all sync up and be in the same place for me. My email is a common experience across all devices. My media? It’s just there.

The only real exceptions are games; it doesn’t matter which device I’m using to do stuff.

And what's more, it’s not just me. My daughter has the same setup for her stuff, as does my wife. We’ve not had to do anything clever and there’s no clever scripting involved: we just use consumer-level gear.

Yet our working experience is so much poorer. If my wife wants to do work for her job at home, she’s either got to email it to herself or use "GoToMyPC" provided by her employer.

Let’s be honest. For most of us, our work environment is quite frankly rubbish. It has fallen so far behind consumer IT, it’s sad.

It’s no longer the technology enthusiast who generally has a better environment: it’s almost everyone who has access to IT. And not only that, we pay a lot less for it than the average business.

Our suppliers hide behind a cloak of complexity. I’m beginning to wonder if IT as it is traditionally understood by business is no longer an enabler but instead has become a choke-point.

And yes, there are many excuses as to why this is the case. Go ahead – make them! I’ve made them myself, after all, but I don’t really believe them any more … do you? ®

The Essential Guide to IT Transformation

More from The Register

next story
Manic malware Mayhem spreads through Linux, FreeBSD web servers
And how Google could cripple infection rate in a second
EU's top data cops to meet Google, Microsoft et al over 'right to be forgotten'
Plan to hammer out 'coherent' guidelines. Good luck chaps!
US judge: YES, cops or feds so can slurp an ENTIRE Gmail account
Crooks don't have folders labelled 'drug records', opines NY beak
FLAPE – the next BIG THING in storage
Find cold data with flash, transmit it from tape
Seagate chances ARM with NAS boxes for the SOHO crowd
There's an Atom-powered offering, too
Intel teaches Oracle how to become the latest and greatest Xeon Whisperer
E7-8895 v2 chips are best of the bunch, and with firmware-unlocked speed control
prev story

Whitepapers

Top three mobile application threats
Prevent sensitive data leakage over insecure channels or stolen mobile devices.
The Essential Guide to IT Transformation
ServiceNow discusses three IT transformations that can help CIO's automate IT services to transform IT and the enterprise.
Mobile application security vulnerability report
The alarming realities regarding the sheer number of applications vulnerable to attack, and the most common and easily addressable vulnerability errors.
How modern custom applications can spur business growth
Learn how to create, deploy and manage custom applications without consuming or expanding the need for scarce, expensive IT resources.
Consolidation: the foundation for IT and business transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.