The growing popularity of bring-your-own-device (BYOD) programs, more smartphones and tablets in the workplace, and new trends in desk-side computing indicate a need to change traditional sourcing practices. Here are some ideas on how to adapt to the changing environment. It’s becoming more obvious by the day: Many companies’ laptop and desktop fleets are quickly becoming outdated, a consequence of their decision to hold off on PC refreshes in order to conserve cash during the 2009 recession. Looking ahead, many companies see 2011 and 2012 as investment years, part of broader efforts to update their old equipment and enable a new generation of technology-savvy workers.Yet far too many sourcing and vendor management (SVM) professionals expect to simply dust off their old refresh RFP and still access both business innovation and substantial PC savings. This approach will be insufficient for several reasons: Not only must RFPs be updated to account for changes in the way PCs are used, but many market changes could also end up marginalizing the sourcing professional’s role. For example, changing from corporate-liable to individual-liable device programs can empower your employees, but it can be done without the involvement of sourcing pros. With the commoditization of PCs driving prices lower, your next refresh cycle could even be eliminated if your company plans to introduce an individual-liable program that shifts the purchase responsibility to the employees.Bottom line: New trends in desk-side computing beckon a change to traditional sourcing practices. With the growing popularity of bring- your-own-device (BYOD) programs and an increased number of smartphones and tablets in the workplace, old RFPs may require a major overhaul and, at a higher level, discussions about the very meaning of mobility, technology and management strategy. However, this change also represents an opportunity for the strategic SVM professional. To help SVM in efforts to align with business mobility demand and possibly increase the role of SVM in mobile device strategy, Forrester recently compiled the following list of opportunities for SVM professionals planning their next refresh. Not all of them may be the right option for your company, but it should give you some ideas on how to adapt to the changing environment: 1. Drive savings that affect your employees’ pockets in an individual-liable environmentIn the new world of BYOD models, companies can do more to provide ways for employees to purchase their devices by negotiating deals with new channels. Organizations considering a switch to individual-liable programs, for example, should talk to their resellers about rebate opportunities that can be made available to employees. If employees have more purchasing options — because sourcing has negotiated the best deal possible with a core set of strategic suppliers — they will have greater flexibility to purchase the best device while also maintaining cost savings for the organization. This represents a win/win and yet another justification for the value proposition of BYOD. SVM professionals can also play a part in developing device management policies by including this as a purchasing option in their company’s individual-liable device policy.2. Negotiate contracts with an eye toward retired device managementLook to add value in individual-liable environments by coordinating efforts to collect retired devices. At the end of the device life cycle, sourcing should ask employees to participate in recycling programs, which promotes sustainability and corporate responsibility. These programs contribute to savings (companies can decide to pocket the cash or redistribute to employees participating in the BYOD programs), and programs offered by Dell, HP, IBM, Intechra, and Redemtech have proven to be successful. In the event your company decides to revert to a corporate- liable model, take note of the existing discounts you have, and negotiate them into the contract. For corporate-liable devices, some companies have trade-in programs established with resellers to refresh upcoming aged tablets. 3. Increase your purchasing power by including tabletsIf your company is planning an RFP for laptops and desktops, consider including the rising demand for tablets in your purchase. Refine your tablet requirements by conducting a survey of your users — particularly your business unit leaders — to understand how they expect to use tablets in coming years. Many business leaders are now actively using tablets but purchasing them outside of centralized IT expenditures, leading to wasted dollars and “shadow IT” spend. Combining the tablets in your refresh RFP can also lead to additional savings with vendors, as you can use the increased investment to negotiate discounts. For Apple’s iPads and HP’s tablets, as an example, added purchase volume contributes to higher discount rates based off of volume purchase programs. Additionally, some resellers will be willing to offer a similar program based off of the increased investments you make with the reseller.4. Include client virtualization as a separate section in your PC refresh RFPSome firms tie their client virtualization investments into a PC upgrade/Windows 7 deployment, while others view VDI as an opportunity to extend the life of existing desktops another one to three years. Both HP and Dell can offer full packages (consisting of client virtualization consulting, implementation, deployment, PCs, and tablets); therefore, you may be able to achieve bigger discounts while also taking the organization through just one wave of change management. One best practice for a client virtualization RFP is to conduct (or support) a user segmentation survey to identify target users and define virtualization requirements. These surveys show what user segments will be good candidates for virtualization and allow you to better define the desktop computing environment that you can attach to your RFP.Clarence Villanueva is a senior analyst at Forrester Research, serving Sourcing and Vendor Management Professionals. Related content opinion Website spoofing: risks, threats, and mitigation strategies for CIOs In this article, we take a look at how CIOs can tackle website spoofing attacks and the best ways to prevent them. By Yash Mehta Dec 01, 2023 5 mins CIO Cyberattacks Security brandpost Sponsored by Catchpoint Systems Inc. Gain full visibility across the Internet Stack with IPM (Internet Performance Monitoring) Today’s IT systems have more points of failure than ever before. Internet Performance Monitoring provides visibility over external networks and services to mitigate outages. By Neal Weinberg Dec 01, 2023 3 mins IT Operations brandpost Sponsored by Zscaler How customers can save money during periods of economic uncertainty Now is the time to overcome the challenges of perimeter-based architectures and reduce costs with zero trust. By Zscaler Dec 01, 2023 4 mins Security feature LexisNexis rises to the generative AI challenge With generative AI, the legal information services giant faces its most formidable disruptor yet. That’s why CTO Jeff Reihl is embracing and enhancing the technology swiftly to keep in front of the competition. By Paula Rooney Dec 01, 2023 6 mins Generative AI Digital Transformation Cloud Computing Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe