Search

Domino Upgrade

VersionSupport end
5.0
6.0
6.5
7.0
8.0
8.5
Upgrade to 9.x now!
(see the full Lotus lifcyle) To make your upgrade a success use the Upgrade Cheat Sheet.
Contemplating to replace Notes? You have to read this! (also available on Slideshare)

Languages

Other languages on request.

Twitter

Useful Tools

Get Firefox
Use OpenDNS
The support for Windows XP has come to an end . Time to consider an alternative to move on.

About Me

I am the "IBM Collaboration & Productivity Advisor" for IBM Asia Pacific. I'm based in Singapore.
Reach out to me via:
Follow notessensei on Twitter
(posts)
Skype
Sametime
IBM
Facebook
LinkedIn
XING
Amazon Store
Amazon Kindle
NotesSensei's Spreadshirt shop
profile for stwissel on Stack Exchange, a network of free, community-driven Q&A sites

« Don't try this at home! | Main| Managed Beans, XPages and Testability »

ShadowIT

In an ideal world a corporate IT department would run a standardized, secure environment that fulfills all user requirement. The members of the CIO office are well respected and often invited, since when they turn up, things start moving. Also everybody loves the flying cars they use for transport.
In reality most IT departments are caught between a rock and a hard place. Under the (justified or not) pretext of standardization (read: saving cost for the IT department) and security IT departments got used to say no or demand outrageous sums of money. When I was working for a bank (and there are quite many on the list) the customer relations department wanted a website to share information with their high net client, something you can use a Domino easily for. The IT guys jumped in and proposed a high availability architecture that had to have a hardware appliance for SSL management. Naturally that blew any budget. I challenged them and they declared: we must make sure it is secure, so I asked them what they think the customer relationship officers do now, sending eMail of course! They looked a little puzzled and declared: "our computing guidelines don't allow confidential information to be send via eMail, so there isn't a problem". So I asked them: what do you think will happen when a billionaire customer calls and says "eMail me that information"? Out through the window go your guidelines
So the trinity of "can't, won't, charge you arm and leg" let to the rise of an interesting animal lurking in the dark: ShadowIT
It is lurking in the dark
The server running on that spare laptop, the pluggable harddrive for backup etc. Even more in software: that word processing macro, the spreadsheet running reports, that little PHP site, that student tool combining CSV exports from the inner sanctum of corporate IT. Interestingly no IT department dares to challenge it, but they should. ShadowIT leads to incompatible data, fragile combination of information, duplicate entries and so on. But of course weeding it out only drives it further away, high into the cloud. The only way to cut it out: fulfil user needs as envisioned when IT was invented. In short transform from "Gibts nicht to Geht nicht, gibts nicht (from "you can have that" to "impossible is impossible")

Comments

Gravatar Image1 - As a good an overview of why I created SuperNTF as I have seen Emoticon

Disclaimer

This site is in no way affiliated, endorsed, sanctioned, supported, nor enlightened by Lotus Software nor IBM Corporation. I may be an employee, but the opinions, theories, facts, etc. presented here are my own and are in now way given in any official capacity. In short, these are my words and this is my site, not IBM's - and don't even begin to think otherwise. (Disclaimer shamelessly plugged from Rocky Oliver)
© 2003 - 2017 Stephan H. Wissel - some rights reserved as listed here: Creative Commons License
Unless otherwise labeled by its originating author, the content found on this site is made available under the terms of an Attribution/NonCommercial/ShareAlike Creative Commons License, with the exception that no rights are granted -- since they are not mine to grant -- in any logo, graphic design, trademarks or trade names of any type. Code samples and code downloads on this site are, unless otherwise labeled, made available under an Apache 2.0 license. Other license models are available on written request and written confirmation.