Enterprise IT Watch Blog

Jan 5 2010   9:12AM GMT

2010: The (next) Year of the Power User

Michael Morisy Michael Morisy Profile: Michael Morisy

It’s a bird, it’s a plane … it’s the power user, already at a cubicle near you and posing all manners of threats and opportunities. By day, she’s a mild-mannered employee at a large metropolitan company. But she’s capable of skirting around IT rules and restrictions to do things the way she wants, often cutting out busy work but opening up new vulnerabilities.

The old example? Forgoing the sluggish fileshare in favor of thumbdrives that cut the process of sharing files across the office down to minutes, or let her take her work home at night. But what if that thumbdrive contained 7,000 social security numbers, and was lost?

The new example: The employees who routes all their corporate communications through their GMail account, their iPhone, and their Twitter.

And “hacking work” is now pitched not as the sole province of the uber-geeky but as a necessity to staying ahead in a tough tech-based economy. Steve Rubel issues a call-to-DIY IT arms, which ends with the somewhat inspiring, somewhat frightening appeal (emphasis mine):

Those who embrace using new technologies and tools will not only survive, but thrive. No one will teach you necessarily how to do this on your own. Each information worker needs to take matters into their own hands.

So how will you adjust in 2010 to the continued rise of the Power User? What benefits and what dangers lurk ahead? Let me know in the comments or at Michael@ITKnowledgeExchange.com.

 Comment on this Post

There was an error processing your information. Please try again later.
Thanks. We'll let you know when a new response is added.
Send me notifications when other members comment.

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to:

Share this item with your network: