Last Updated on August 8, 2021 by addihetja

Welcome to postmodern.management. This site contains a collection of my thoughts on the end-user computing field–the part of Information Technology that end-users use, be it laptops, mobile phones, or even Wi-Fi.

Because I’m just starting with this blog, I don’t have a lot of content yet, but I do have a plan:

  • to write articles about the EUC field in broad strokes, while giving necessary detail about the important stuff and skipping the minor details
  • to write it in a way that gives technology, people and the workflows equal coverage
  • to explain how the technology works by breaking it down into its atomic parts
  • to bust a bunch of myths and assumptions that people have–especially the ones perpetuated by the various vendors
  • do it all in a “blog as wiki” kind of format: the articles will have a wiki approach that I’ll update as time allows
  • introduce a new modality of management–a new way of thinking that aims to not only simplify deployments but also give you more flexibility to adopt new technologies and hopefully help you avoid getting “consumed” by a single vendor
  • to try to do it all in an honest, fair, informative, and understandable manner, even for non-techs

I honestly believe that one of the more common pitfalls admins fall into is to take vendor documentation as “The Way It’s Done” instead of what it really is: product documentation. The more you look at the different products in the market the better you realize that vendors can’t be expected to give you honest advice on best practice on features the do not and/or cannot support. Most vendors do a good job of documenting their products and the EUC blogosphere is full of people who teach us how to implement a new feature in an operating system or on a device using their chose management product. But I feel like there aren’t isn’t enough talk about the technology and the pitfalls most of us face, issues like “What are the downsides of fully managing all devices?” and “The company I worked for wants to enroll my phone into their management system in order for me to be able to read email. Will the be able to see what web pages I visit and can they see and/or delete the apps I have installed?”. I’m maintaining an article on this blog which will serve as a to-do list of the Topics I wan’t to cover, where I’ll link to the articles I write when they’re done. Stay tuned.

In my day job, I’m a consultant for businesses large and small and government agencies large and small, where I advise the customers on how to achieve the results they want. This means that:

  • I do IT; not business administration. If a search engine brought you here for business management tips, I suggest you give Duck Duck Go a try
  • I’m currently not doing day-to-day operations (terms and conditions apply), which means that if you’re looking for up-to-the-minute technical trivia about how to fix a server application broken by a new security update, you will probably be better served elsewhere
  • I’m exposed to many different types of environments and requirements, which means that I tend not to use cookie-cutter methods
  • I’m often constrained by what infrastructure the customer already has [decided upon], which means that my experience is also limited by what I’m asked to do. After all, we only know what we know

I hope that these pages will give you some insight and help you think differently, at least for a while, about end-user computing and how you use