Close
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
Read Down
Sign in
Close
Welcome!Log into your account
Forgot your password?
Read Down
Password recovery
Recover your password
Close
Search
Logo
Logo
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
More
    Home Applications
    • Applications

    Finding Middle Ground in Office Use of Collaboration Tools

    Written by

    Jim Louderback
    Published May 24, 2004
    Share
    Facebook
    Twitter
    Linkedin

      eWEEK content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More.

      Todays networking and collaboration tools present IT with the same challenges as the personal computer did in the 80s. And predictably, IT is reacting in the same ways.

      I had a fascinating conversation with a CIO the other day. He was complaining about how users at his company were running roughshod over corporate systems and networks.

      The most recent problems came to light when a network failure cut off e-mail and Web access throughout the companys far-flung operations.

      Instead of simply calling it a day, creative employees quickly implemented workarounds. One group installed a quick and dirty Wiki to enable team communications.

      Another took advantage of America Online Inc.s Instant Messenger application to route files and messages between geographically remote employees. Others used Web e-mail and wireless networking to keep the companys business flowing.

      The CIOs response was predictable: He moved quickly to lock down corporate desktops and laptops to prohibit users from installing unapproved software or accessing unsupported Web services.

      Its not the first time Ive seen such a dramatic, knee-jerk response to user-supplied productivity tools. In fact, the rise (and attempted squashing) of new collaboration tools, social networks and wireless connectivity today has eerie parallels to early PC adoption. And despite the best intentions of corporate IT, the results will be the same.

      Back in the mid-1980s, when I worked at Chase Manhattan Bank, PCs were coming in the back door. Many divisions found that an IBM PC running Visicalc or 1-2-3 provided better information—and better decision-making support—than the approved, mainframe-based infrastructure.

      The IT priesthood was not amused. Corporate systems auditors went on an anti-PC jihad, releasing a 20-page book of rules that these newfangled devices had to adhere to. Had we complied in full, those PCs would have been no more useful than a doorstop.

      We all laughed, ignored the rules and kept working to improve Chases bottom line. Today, theres a PC on almost every desk at the financial powerhouse, and I suspect that those auditors and anti-PC leaders are all now happily retired.

      Fast-forward to today. The PC has become an indispensable tool, but yet again, users are running rings around IT. These new products and services will transform business, just as the PC did in the 80s.

      But just as predictably, many IT groups will resist—wrapping themselves in up in Sarbanes-Oxley compliance, application and network security and preserving the integrity of critical systems.

      Wondering what those key applications are that will change corporate systems? Heres a quick list for IT—so they know what to forbid—and, for users, to help them hide. Ive also added my own recommendations, to bridge the gap between the two.

      Next Page: Wireless networking is here to stay, so how can it be secured?

      Securing Wireless Networks


      Wi-Fi

      Wireless networking lets users compute from any office or conference room in your building, as well as from home, Starbucks, etc. Most new notebooks have wireless networking built in, as will tomorrows PDAs and cell phones.

      /zimages/2/28571.gifIn an attempt to prevent the spread of unsecured access points, Intel has announced that the wireless tech in its Grantsdale chipset will be turned off by default. Click here to read more.

      IT: To catch a thief, think like a thief. Outfit a notebook with the latest version of Netstumbler, and leave it running around the clock. Do a daily walk-around with the system to try to pick up any rogue access points. Confiscate and destroy immediately.

      Users: Turn off SSID broadcasting to hide your access point from ITs prying eyes. Make sure you use some sort of security, so that when you do get caught, you can at least plead intelligence.

      /zimages/2/28571.gifClick here to read about Aruba Networks WLAN monitors to sniff out rogue access points.

      Install Groove Networks nifty synchronization software, Laplink Software Inc.s Laplink Remote or Citrix Systems Inc.s GoToMyPC to let you sneak inside the firewall while at your local coffee shop.

      Middle ground: Lets face it, wireless is here to stay. Its an incredible productivity boost, and your users are demanding it. Set up a secure wireless network at the office and install VPN software to let users easily and securely connect while on the road, down the street or at home.

      Instant Messaging

      “Why do we need IM?” Ive heard some IT managers complain. “Weve got e-mail.” Well, its the difference between a letter and a phone call. IMs instant and provides an easy way to share info and keep track of far-flung employees.

      Plus, it offers a quick and dirty replacement should your corporate e-mail system go on the fritz. Advanced versions allow for quick file-sharing and will even set up free Internet voice and video calls.

      IT: Use policies to prohibit installation of any unapproved application. Block IM ports on your firewall. Instruct your staff to keep a listen out for the telltale “boop-beep” that signals in incoming IM. Quickly delete and warn offenders.

      Users: Web versions of AIM and other popular IM clients make discovery unlikely. Use Trillian or another cross-IM client in case IT shuts access to one or the other.

      Middle ground: Its not just for the pimpled and tattooed crowd anymore. My advice: Try it. For quick communications and figuring out if someones reachable, theres nothing like IM.

      If your corporate policies or the law require tracking and retaining instant messages, then consider a secure solution. Yahoos got a decent one, as does Groove.

      Next Page: Bloggers could expose company secrets.

      Company Secrets

      Blogs

      Essentially an online diary, blogs make it easy to post text to the Web from anywhere. A new form, the “moblog,” uses camera-enabled cell phones to post pictures from anywhere, too.

      /zimages/2/28571.gifRead more here about new styles of blogs and RSS.

      IT: If your companys bigger than about 1,000 people, youve probably got a blogger in your midst. And since these public journalists spend most of their days at work, theyll probably end up exposing your company secrets online.

      Make it someones job to assiduously search blog engines—such as Technorati and Feedster—for any mention of your company. When you find a blogger, shut em down under threat of termination!

      Users: Blogs are a great way to share information among workgroups, as well as a wonderful exercise in narcissism. If you want to talk about your company, though, better use a pseudonym.

      Middle ground: Internal blogs, inside the firewall, can be great for sharing project information or communicating from management to employees. Theyre even free.

      Microsoft shops should consider the open-source, dot-net based Dot Text (what we use for our blogs here at Ziff Davis Media), while Googles Blogger and Movable Type will set you up with secure blogs as well.

      /zimages/2/28571.gifClick here to read about Movable Types decision to charge for its update.

      And take a cue from famously secretive Microsoft. A public blog, written by a well-informed and coached employee, can be a great thing for your corporate perception.

      The Scobleizer is a great read, and a good thing for everyone as well. Set up guidelines for what can and cannot be posted, and make sure your users agree to them.

      Wiki

      Groupware from the ground up. An inverted form of Notes, these Web sites allow anyone with a user name and password to change or add pages at will. Sort of a multiuser blog, but so much more.

      IT: Locking down Wikis will be tough. Set your routers and firewalls to support only outbound traffic to certain key, trusted domains.

      Users: Since they behave just like any other Web page, just dont tell anyone youre using it, and youll be fine.

      Middle ground: Lotus Notes shops will be amazed by how much more useful and productive effectively managed and supported Wikis can be. I recommend that users and IT meet in the middle here.

      Create a Wiki server that fits within your permission and access hierarchy and sits inside the firewall. Take a look at Ross Mayfields SocialText for a Wiki thats at least trying to be corporate-friendly.

      Next Page: The ups and downs of peer-to-peer capabilities.

      Peer to Peer

      Peer to Peer

      Popularized by Napster, P2P software lets users exchange music, files, movies—pretty much anything—without a server sitting in between.

      IT: This means war! Anything that uses Napster-like technology must be bad. Again, here, lock down your PCs and notebooks. Create severe penalties for transgressors.

      Ruthlessly root out any programs exhibiting peer to peer-like behavior. Set your layer 4-7 switches (aka gateways) to inspect for peer-to-peer-like behavior.

      Users: If youre illegally downloading music and movies on the company dime, Ive got little sympathy for you. But there are some decent P2P applications that can help replicate key file folders and create shared workspaces. You can always plead ignorance if you get caught.

      Middle ground: There are some excellent and secure peer-to-peer systems out there that enable workflows that just arent possible otherwise.

      Groove, developed by Notes creator Ray Ozzie, has been successfully and securely used to aid the Iraqi redevelopment. Dont throw out the baby with the bath water.

      Social Networks

      The corporate version of online dating, these sites automate the concept of “six degrees of separation.” Users upload their contacts and create a Web of connections—allowing them to reach through their contacts to other potentially useful professionals.

      /zimages/2/28571.gifDoes social networking lead to employees not working? Click here for a column on its impact at work.

      At best, they can help maintain and grow a network of colleagues. At worst, they become little more than online versions of the high-school cliques.

      /zimages/2/28571.gifFor more details, read my column on having too many fake friends.

      IT: To protect against your users putting their company contacts up on outside Web sites, lock down access to the following domains: LinkedIN.com, Orkut.com, Friendster.com, Plaxo.com and Tribes.com. Or simply let users access only a handful of approved Web sites.

      User: These sites can be useful—although Im hesitant about sharing my contacts with a third party. To hide your social networking, print out your contacts and connect up at home. Ive found LinkedIn Ltd. best for business.

      Middle ground: Plaxo and LinkedIn can be very useful to help your employees stay connected and up to date. But before allowing your employees full rein, find out just how secure these systems really are.

      The last thing you want is for the equivalent of your corporate phone book and sales-contact list to be exposed on the Internet for anyone to snag. But learn from these sites.

      Perhaps you can set up some sort of social network for your customers or suppliers. Thats what we did, in fact, in our new version of our 1Up.com gaming site.

      If you want to explore how a social network can bind your customers even closer to you, head over to our prototype.

      /zimages/2/28571.gifCheck out eWEEK.coms Messaging & Collaboration Center at http://messaging.eweek.com for more on IM and other collaboration technologies.

      /zimages/2/77042.gif

      Be sure to add our eWEEK.com messaging and collaboration news feed to your RSS newsreader or My Yahoo page

      Jim Louderback
      Jim Louderback
      With more than 20 years experience in consulting, technology, computers and media, Jim Louderback has pioneered many significant new innovations.While building computer systems for Fortune 100 companies in the '80s, Jim developed innovative client-server computing models, implementing some of the first successful LAN-based client-server systems. He also created a highly successful iterative development methodology uniquely suited to this new systems architecture.As Lab Director at PC Week, Jim developed and refined the product review as an essential news story. He expanded the lab to California, and created significant competitive advantage for the leading IT weekly.When he became editor-in-chief of Windows Sources in 1995, he inherited a magazine teetering on the brink of failure. In six short months, he turned the publication into a money-maker, by refocusing it entirely on the new Windows 95. Newsstand sales tripled, and his magazine won industry awards for excellence of design and content.In 1997, Jim launched TechTV's content, creating and nurturing a highly successful mix of help, product information, news and entertainment. He appeared in numerous segments on the network, and hosted the enormously popular Fresh Gear show for three years.In 1999, he developed the 'Best of CES' awards program in partnership with CEA, the parent company of the CES trade show. This innovative program, where new products were judged directly on the trade show floor, was a resounding success, and continues today.In 2000, Jim began developing, a daily, live, 8 hour TechTV news program called TechLive. Called 'the CNBC of Technology,' TechLive delivered a daily day-long dose of market news, product information, technology reporting and CEO interviews. After its highly successful launch in April of 2001, Jim managed the entire organization, along with setting editorial direction for the balance of TechTV.In the summer or 2002, Jim joined Ziff Davis Media to be Editor-In-Chief and Vice President of Media Properties, including ExtremeTech.com, Microsoft Watch, and the websites for PC Magazine, eWeek and ZDM's gaming publications.

      Get the Free Newsletter!

      Subscribe to Daily Tech Insider for top news, trends & analysis

      Get the Free Newsletter!

      Subscribe to Daily Tech Insider for top news, trends & analysis

      MOST POPULAR ARTICLES

      Artificial Intelligence

      9 Best AI 3D Generators You Need...

      Sam Rinko - June 25, 2024 0
      AI 3D Generators are powerful tools for many different industries. Discover the best AI 3D Generators, and learn which is best for your specific use case.
      Read more
      Cloud

      RingCentral Expands Its Collaboration Platform

      Zeus Kerravala - November 22, 2023 0
      RingCentral adds AI-enabled contact center and hybrid event products to its suite of collaboration services.
      Read more
      Artificial Intelligence

      8 Best AI Data Analytics Software &...

      Aminu Abdullahi - January 18, 2024 0
      Learn the top AI data analytics software to use. Compare AI data analytics solutions & features to make the best choice for your business.
      Read more
      Latest News

      Zeus Kerravala on Networking: Multicloud, 5G, and...

      James Maguire - December 16, 2022 0
      I spoke with Zeus Kerravala, industry analyst at ZK Research, about the rapid changes in enterprise networking, as tech advances and digital transformation prompt...
      Read more
      Video

      Datadog President Amit Agarwal on Trends in...

      James Maguire - November 11, 2022 0
      I spoke with Amit Agarwal, President of Datadog, about infrastructure observability, from current trends to key challenges to the future of this rapidly growing...
      Read more
      Logo

      eWeek has the latest technology news and analysis, buying guides, and product reviews for IT professionals and technology buyers. The site’s focus is on innovative solutions and covering in-depth technical content. eWeek stays on the cutting edge of technology news and IT trends through interviews and expert analysis. Gain insight from top innovators and thought leaders in the fields of IT, business, enterprise software, startups, and more.

      Facebook
      Linkedin
      RSS
      Twitter
      Youtube

      Advertisers

      Advertise with TechnologyAdvice on eWeek and our other IT-focused platforms.

      Advertise with Us

      Menu

      • About eWeek
      • Subscribe to our Newsletter
      • Latest News

      Our Brands

      • Privacy Policy
      • Terms
      • About
      • Contact
      • Advertise
      • Sitemap
      • California – Do Not Sell My Information

      Property of TechnologyAdvice.
      © 2024 TechnologyAdvice. All Rights Reserved

      Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.

      ×