Well, there they go again. Having worked in IT for almost 30 years, this looks very familiar. In the early 1980's I was a recently promoted central office manager running a busy central office for MCI Telecommunications in New York City. Our MIS group (what the people running information and communications technology for internal use was called in those days) did not want me (and those revolutionaries like me) to have a personal computer. Everything I needed I was supposed to get form MIS. I could order reports, have them arrive in a box outside my office door days or weeks later (when the data was pretty much useless) and so on. You get the idea.
Well, we all know what happened there. The distributed computing revolutionaries (um, that would be us ... right?) took over information technology and MIS is now just another silo. The Old Guard lost its throne. "The king is dead! Long live the king!" was the catch phrase of the Late '80s and early '90s. (To their credit, MCI mail arrived on the scene toward the mid-'80s with one of the first publically available email systems. I had the pleasure of meeting with Vint Cerf for breakfast one morning in 1985 to talk about the concept, but that's another story.)
Fast-forward to the early 1990's, the dawn of real Internet awareness. I was working as a networking consultant to the IT department (that was its name, MIS long since relegated to a quite corner, important, but not in charge) at one of the worlds largest insurance companies located in Hartford, Conn. The IT director was adamant about shutting down Internet access to the desktop. I remember his quote (more or less) "There is no need for Internet access to the desktop. The Internet is a waste of time." We did everything we could at every layer―desktop, protocol, routing, etc.―to prevent access.
And again, we know what happened there. You are after all, no doubt reading this via the Internet, and probably sitting in your office, at work Hmmm.
Jumping ahead to the early 2000's, one of the biggest "security holes" we were trying to patch as an industry was Instant Messaging. IM was considered a threat to corporate security, secrets would be revealed, lawsuits would follow, the sky would fall "The end is near! Plug those security holes, block those ports!" And, yet again, we know how that one went too. Most workers today have Internet access, and most IT departments (theyre still called that, but for how long?) not only allow IM, they even offer an approved IM client as part of the desktop.
So, here we are at the end of 2009 and along comes Gartner's insightful piece on blocking the social web ... Sigh ... the more things change, right?