Feeds

What does people-centric IT mean, anyway?

Nadella has news for IT users

Choosing a cloud hosting partner with confidence

Make it easy for the user...

The appearance of tablets in the last few years shouldn't be underestimated either, and neither should the evolution of smartphones, says Conway. The cloud and mobile management go hand in hand.

He describes the use of Microsoft's cloud-based mobile management software, InTune, to keep work resources on devices safe. "We can wipe only corporate email, and only those apps that have been installed via corporate through the InTune management experience. So work would be wiped but personal wouldn't" he says.

If tech dept doesn't provide attractive services, users will "self-serve"...
and no one wants that.

All of this cloudiness is driving the need for IT departments to compete for their users' business. "IT functions need to figure out that if they don't provide or enable attractive services, then users will go out and self-serve," Langley says. "You won't know who's using what, and where your data is."

Are you experienced?

So far though, this whole conversation has been about infrastructure. It focuses on issues such as how to manage and secure devices, and ensure that users can access the right resources using them. At another level of abstraction, companies should be thinking about the user experience, says Langley.

"A lot of people centric stuff is focused on the interface, but it's the end-to-end experience that's important," he says. He uses Apple as an example. "They have this thing about feeling a certain way about the service from the minute that you open the box. We should feel like this about IT."

For a lot of IT folks, that's a very murky concept. They understand technical design; things like how to automate tasks using Unix scripting, and how to deal with a device that has been compromised. All important stuff, no doubt, but not exactly people-centric, by anyone's definition.

Users care about an entirely different set of issues, explains Brian Prentice, VP of research at Microsoft. What makes it even more difficult is that they often don't even know what they care about.

Traditional IT experiences are created via requirements definition management, he explains. You go and ask customers what they want, and then you build it. That's what produces information about workflows, for example.

But what if the customers don't know what they want? Or what if you ask them the wrong questions? "People-centred design is a different mode, that we call observe, define, build and refine," he says. "So the first step is not to ask, it's about watching." It's a kind of corporate anthropology, he explains, and you see a lot of it going on in user experience design firms.

That's something that few IT departments will have the resource or the experience to do. But it also shows how important it is to build upon these purely infrastructural considerations when considering people-centric IT.

One example involves delivering information in the format that people need it, when they need it. Longbottom wants applications to maintain state across different devices (so that he can pick up where he left off when switching between his laptop and his Lumia).

But he also wants his system to know that he has his tablet with him, and advise him to look at that instead, because it knows that the content he's looking at will fit better on that screen. That's context-aware computing, in a nutshell.

Another example of context-aware computing is hanging out on the Xbox One, and allowing through Skype calls from your friends, but not letting through notifications from work people, because Skype knows that your Xbox One sessions are for downtime. Right now, you have to set those things manually.

These kinds of things are application-level challenges, but they're all a part of a broader, more people-centric approach to IT. Mobile device management and identity control are undoubtedly a core part of that, say experts, but they're only a part. It's about giving users the kind of experience that they want from their applications, on their terms, and as such, it stretches all the way up the stack. ®

Internet Security Threat Report 2014

More from The Register

next story
Be real, Apple: In-app goodie grab games AREN'T FREE – EU
Cupertino stands down after Euro legal threats
Download alert: Nearly ALL top 100 Android, iOS paid apps hacked
Attack of the Clones? Yeah, but much, much scarier – report
You stupid BRICK! PCs running Avast AV can't handle Windows fixes
Fix issued, fingers pointed, forums in flames
Microsoft: Your Linux Docker containers are now OURS to command
New tool lets admins wrangle Linux apps from Windows
Bada-Bing! Mozilla flips Firefox to YAHOO! for search
Microsoft system will be the default for browser in US until 2020
Facebook, working on Facebook at Work, works on Facebook. At Work
You don't want your cat or drunk pics at the office
Soz, web devs: Google snatches its Wallet off the table
Killing off web service in 3 months... but app-happy bonkers are fine
prev story

Whitepapers

Why and how to choose the right cloud vendor
The benefits of cloud-based storage in your processes. Eliminate onsite, disk-based backup and archiving in favor of cloud-based data protection.
Getting started with customer-focused identity management
Learn why identity is a fundamental requirement to digital growth, and how without it there is no way to identify and engage customers in a meaningful way.
10 threats to successful enterprise endpoint backup
10 threats to a successful backup including issues with BYOD, slow backups and ineffective security.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
The Heartbleed Bug: how to protect your business with Symantec
What happens when the next Heartbleed (or worse) comes along, and what can you do to weather another chapter in an all-too-familiar string of debilitating attacks?