SlideShare a Scribd company logo
Ben Mountain
Watercare
THE
USER
REVOLUTION
INTRODUCTION
• End User Compute Platforms Manager
at Watercare
• Passionate about Digital Technology
• Trains Brazilian Jiu-Jitsu
• Loves playing Golf
THANKYOU TO OUR SPONSORS
The User Revolution
How COVID-19 kickstarted a new Watercare Digital Experience
Ben Mountain – End User Compute Platforms Manager, Watercare
The User Revolution - DWCNZ2023
We supply more than 400 millionlitres of water
to Aucklandevery day.
We collect, treat and dispose of around409
millionlitres of wastewaterdaily.
Each day, we provide
lifelineservices to 1.7
million Aucklanders.
From sky to sea
Our scale
Diversity of workplace
Managing & extending
the network
Our teams work night and day to upgrade
and expand our waterpipes, wastewater
pipes (sewers) and other assets.
The User Revolution - DWCNZ2023
The User Revolution - DWCNZ2023
Our challenges in 2019
• End of life technology – Windows XP & Windows 7
• Poor user experience
• IT was getting in the way of the business
• No proactive management or remote support
• Technology friction
We needed to make some changes!
Trends driving workplace transformation
Mobile – anywhere, anytime
5G will be 10x quicker than broadband and allow staff to be connected from almost anywhere.
Distributedworkforce
Many staff expect to work from home, with partial working from home becoming the norm.
Cloud growth
Widespread and accelerated adoption of cloud-hosted workplace technologies to support flexible
workstyles.
Cyber Security
Remains challenging for organizations that have not adjusted technology, processes and procedures to
support a highly distributed workforce.
The User Revolution - DWCNZ2023
The User Revolution - DWCNZ2023
The User Revolution - DWCNZ2023
Our Guiding Principles
1. Self service
2. Devices that fit user needs
3. Work from anywhere at any time
4. Be proactive, not reactive
2020
Deployed 300 laptops in the first 3 days of
lockdown to our most critical workers.
Over the following 3 weeks, deployed a
further 300 laptops to traditionally
desktop bound staff.
Designed and implemented new remote
access solutions.
Beefed up our Cyber Security tooling and
practices.
Rolled out Microsoft Teams to everyone
in the company.
Ran virtual ‘Teams 101’ training sessions
to upskill staff.
What next?
Why doesn’t my laptop work like my mobile?
Easy to deploy
Starts up immediately
Always up to date
Battery lasts for a day
Rarely crashes
Same Experience
Everywhere
?
Legacy Device Deployment
Deploy image to a new
computer, overwriting what
was originally on it
Build & maintain a custom
image, which becomes out
of date quickly
DRIVERS POLICIES
OFFICE & APPS
SETTINGS
Cost significant time and
money, making this very
inefficient
Modern Device Deployment
Un-box and turn on
off-the-shelf Windows PC
Setup process with minimal
user interaction (Windows
Autopilot)
Device is ready
for use
New Device Lifecycle
Key Benefits:
 Less maintenance of images, drivers &
BIOS
 Integration in the device supply chain
 Simple process for users and IT
 No need for IT to touch the devices
 Reset device back to a ‘business ready’
state and redeploy easily!
Business ready
Break fix
Retirement
Management
Procurement Deployment
Self Service
Applications
• Over 150+ applications
available for installation.
• Licensing & governance
happens behind the
scenes.
• Applications are forced
to automatically update
to ensure security.
The User Revolution - DWCNZ2023
Reporting and Analytics
APPLICATION
RELIABILITY
• App ReliabilityScore
• App Performance
• Model Performance
• Device Performance
• OS Version
Performance
STARTUP
PERFORMANCE
• Start Up Score
• Model Performance
• Device Performance
• Startup Processes
• Restart Frequency
PROACTIVE
REMEDIATIONS
• Scripted remediations
• Automaticallydetect &
fix common issues
• Notify end users
• Reduce the number of
Service Desk calls
Real world
examples
Cyber Security
Secure biometrics
• Hardened biometric
implementation in
Windows & hardware
• Biometric never leaves the
device
Strong authentication
via multiple factors
• Uses two factors for
authentication (e.g.: PC +
PIN or Biometric)
• Asymmetrical Keys
(Private/Public)
User credentials
protected by hardware
• Hardware generated
credential (keys)
• Credential isolated and
protected by hardware
Tackling our mobile devices
The benefits
1. Staff get devices fast and can be productive in 30
minutes.
2. People can self service install applications they
need.
3. Staff get devices to match their needs.
4. Device upgrades or replacements are easy.
5. Our solution is easily scalable and secure.
The challenges
1. Staff working in very remote locations
2. Multiple lockdowns complicating device upgrades
3. Long lead times on new IT hardware
4. A very complex laboratory environment, plus a
unique field team use case
5. Unpicking legacy ways of doing things that don’t fit
the “new world”
Where to next?
Legacy Modern Dual Screen Modern Single Screen
Workstation Design
MeetingRooms
Redesigned for productivity, creativity, and ease.
At a time when the PC is playing a more central role in our lives,Windows 11 is designed to bring
you closer to what you love.
Quickly organize open apps. Quickly group open apps.
Windows 365 Cloud PC
Our biggest learning
The User Revolution - DWCNZ2023
THANKYOU TO OUR SPONSORS
EVALUATIONS
We value your feedback!
Please tell use what you thought
(also available on mobile app)

More Related Content

PDF
The CIO Handbook
PDF
September 2 Technology Trends Rpaquet
PDF
September 2 Technology Trends Rpaquet
PDF
HCL Technologies: The CIO Handbook (Edition 4)
PPTX
Consumerization of IT
PDF
Enable Tomorrow's Workplace
PDF
Intergen Twilight Seminar: Constructive Disruption with Cloud Technologies
PPTX
The digital natives are coming
The CIO Handbook
September 2 Technology Trends Rpaquet
September 2 Technology Trends Rpaquet
HCL Technologies: The CIO Handbook (Edition 4)
Consumerization of IT
Enable Tomorrow's Workplace
Intergen Twilight Seminar: Constructive Disruption with Cloud Technologies
The digital natives are coming

Similar to The User Revolution - DWCNZ2023 (20)

PPT
Lime access 2013-en
PDF
Set the Path Forward with Smart Technology Decisions.pdf
PPTX
IT Consumerization – iPad’ing the Enterprise or BYO Malware?
PPTX
Net@Work Client Presentation with Security
PPT
Top 10 IT enterprise trends 2012
PDF
Res Software In Healthcare
PDF
Res Software In Healthcare
PDF
Rethink IT. Reinvent Business. - Dharanibalan Gurunathan
PPTX
Consumerization 5 Steps Ds
PPTX
Aging Services Expo Presentation
PDF
Complimentary report on the current needs of CIOs
PDF
Atos whitepaper - Is consumerization technology good for business?
PPTX
IT is een dienst met de dynamische desktop
PDF
Business Innovation and ICT Strategies Sriram Birudavolu
PDF
End-user computing is not a trend, it's a transformational shift
PDF
Windstream Webinar: The Evolution of the Data Center
PDF
Delivers Business Value For You And Your Customers - A whitepaper by Windows ...
PDF
Business Innovation and ICT Strategies Sriram Birudavolu
PDF
Executive Summary
PDF
Day 2 p3 - automation
Lime access 2013-en
Set the Path Forward with Smart Technology Decisions.pdf
IT Consumerization – iPad’ing the Enterprise or BYO Malware?
Net@Work Client Presentation with Security
Top 10 IT enterprise trends 2012
Res Software In Healthcare
Res Software In Healthcare
Rethink IT. Reinvent Business. - Dharanibalan Gurunathan
Consumerization 5 Steps Ds
Aging Services Expo Presentation
Complimentary report on the current needs of CIOs
Atos whitepaper - Is consumerization technology good for business?
IT is een dienst met de dynamische desktop
Business Innovation and ICT Strategies Sriram Birudavolu
End-user computing is not a trend, it's a transformational shift
Windstream Webinar: The Evolution of the Data Center
Delivers Business Value For You And Your Customers - A whitepaper by Windows ...
Business Innovation and ICT Strategies Sriram Birudavolu
Executive Summary
Day 2 p3 - automation

Recently uploaded (20)

PPTX
The various Industrial Revolutions .pptx
PPTX
Final SEM Unit 1 for mit wpu at pune .pptx
PDF
TrustArc Webinar - Click, Consent, Trust: Winning the Privacy Game
PDF
DP Operators-handbook-extract for the Mautical Institute
PDF
Video forgery: An extensive analysis of inter-and intra-frame manipulation al...
PPTX
MicrosoftCybserSecurityReferenceArchitecture-April-2025.pptx
PPTX
TLE Review Electricity (Electricity).pptx
PDF
Getting Started with Data Integration: FME Form 101
PDF
How ambidextrous entrepreneurial leaders react to the artificial intelligence...
PPT
Module 1.ppt Iot fundamentals and Architecture
PDF
NewMind AI Weekly Chronicles – August ’25 Week III
PDF
NewMind AI Weekly Chronicles - August'25-Week II
PDF
From MVP to Full-Scale Product A Startup’s Software Journey.pdf
PDF
Getting started with AI Agents and Multi-Agent Systems
PPTX
Programs and apps: productivity, graphics, security and other tools
PDF
ENT215_Completing-a-large-scale-migration-and-modernization-with-AWS.pdf
PDF
A novel scalable deep ensemble learning framework for big data classification...
PPTX
TechTalks-8-2019-Service-Management-ITIL-Refresh-ITIL-4-Framework-Supports-Ou...
PPTX
Chapter 5: Probability Theory and Statistics
PDF
Developing a website for English-speaking practice to English as a foreign la...
The various Industrial Revolutions .pptx
Final SEM Unit 1 for mit wpu at pune .pptx
TrustArc Webinar - Click, Consent, Trust: Winning the Privacy Game
DP Operators-handbook-extract for the Mautical Institute
Video forgery: An extensive analysis of inter-and intra-frame manipulation al...
MicrosoftCybserSecurityReferenceArchitecture-April-2025.pptx
TLE Review Electricity (Electricity).pptx
Getting Started with Data Integration: FME Form 101
How ambidextrous entrepreneurial leaders react to the artificial intelligence...
Module 1.ppt Iot fundamentals and Architecture
NewMind AI Weekly Chronicles – August ’25 Week III
NewMind AI Weekly Chronicles - August'25-Week II
From MVP to Full-Scale Product A Startup’s Software Journey.pdf
Getting started with AI Agents and Multi-Agent Systems
Programs and apps: productivity, graphics, security and other tools
ENT215_Completing-a-large-scale-migration-and-modernization-with-AWS.pdf
A novel scalable deep ensemble learning framework for big data classification...
TechTalks-8-2019-Service-Management-ITIL-Refresh-ITIL-4-Framework-Supports-Ou...
Chapter 5: Probability Theory and Statistics
Developing a website for English-speaking practice to English as a foreign la...

The User Revolution - DWCNZ2023

  • 2. INTRODUCTION • End User Compute Platforms Manager at Watercare • Passionate about Digital Technology • Trains Brazilian Jiu-Jitsu • Loves playing Golf
  • 3. THANKYOU TO OUR SPONSORS
  • 4. The User Revolution How COVID-19 kickstarted a new Watercare Digital Experience Ben Mountain – End User Compute Platforms Manager, Watercare
  • 6. We supply more than 400 millionlitres of water to Aucklandevery day. We collect, treat and dispose of around409 millionlitres of wastewaterdaily. Each day, we provide lifelineservices to 1.7 million Aucklanders.
  • 10. Managing & extending the network Our teams work night and day to upgrade and expand our waterpipes, wastewater pipes (sewers) and other assets.
  • 13. Our challenges in 2019 • End of life technology – Windows XP & Windows 7 • Poor user experience • IT was getting in the way of the business • No proactive management or remote support • Technology friction We needed to make some changes!
  • 14. Trends driving workplace transformation Mobile – anywhere, anytime 5G will be 10x quicker than broadband and allow staff to be connected from almost anywhere. Distributedworkforce Many staff expect to work from home, with partial working from home becoming the norm. Cloud growth Widespread and accelerated adoption of cloud-hosted workplace technologies to support flexible workstyles. Cyber Security Remains challenging for organizations that have not adjusted technology, processes and procedures to support a highly distributed workforce.
  • 18. Our Guiding Principles 1. Self service 2. Devices that fit user needs 3. Work from anywhere at any time 4. Be proactive, not reactive
  • 19. 2020
  • 20. Deployed 300 laptops in the first 3 days of lockdown to our most critical workers. Over the following 3 weeks, deployed a further 300 laptops to traditionally desktop bound staff.
  • 21. Designed and implemented new remote access solutions. Beefed up our Cyber Security tooling and practices.
  • 22. Rolled out Microsoft Teams to everyone in the company. Ran virtual ‘Teams 101’ training sessions to upskill staff.
  • 24. Why doesn’t my laptop work like my mobile? Easy to deploy Starts up immediately Always up to date Battery lasts for a day Rarely crashes Same Experience Everywhere ?
  • 25. Legacy Device Deployment Deploy image to a new computer, overwriting what was originally on it Build & maintain a custom image, which becomes out of date quickly DRIVERS POLICIES OFFICE & APPS SETTINGS Cost significant time and money, making this very inefficient
  • 26. Modern Device Deployment Un-box and turn on off-the-shelf Windows PC Setup process with minimal user interaction (Windows Autopilot) Device is ready for use
  • 27. New Device Lifecycle Key Benefits:  Less maintenance of images, drivers & BIOS  Integration in the device supply chain  Simple process for users and IT  No need for IT to touch the devices  Reset device back to a ‘business ready’ state and redeploy easily! Business ready Break fix Retirement Management Procurement Deployment
  • 28. Self Service Applications • Over 150+ applications available for installation. • Licensing & governance happens behind the scenes. • Applications are forced to automatically update to ensure security.
  • 30. Reporting and Analytics APPLICATION RELIABILITY • App ReliabilityScore • App Performance • Model Performance • Device Performance • OS Version Performance STARTUP PERFORMANCE • Start Up Score • Model Performance • Device Performance • Startup Processes • Restart Frequency PROACTIVE REMEDIATIONS • Scripted remediations • Automaticallydetect & fix common issues • Notify end users • Reduce the number of Service Desk calls
  • 32. Cyber Security Secure biometrics • Hardened biometric implementation in Windows & hardware • Biometric never leaves the device Strong authentication via multiple factors • Uses two factors for authentication (e.g.: PC + PIN or Biometric) • Asymmetrical Keys (Private/Public) User credentials protected by hardware • Hardware generated credential (keys) • Credential isolated and protected by hardware
  • 34. The benefits 1. Staff get devices fast and can be productive in 30 minutes. 2. People can self service install applications they need. 3. Staff get devices to match their needs. 4. Device upgrades or replacements are easy. 5. Our solution is easily scalable and secure.
  • 35. The challenges 1. Staff working in very remote locations 2. Multiple lockdowns complicating device upgrades 3. Long lead times on new IT hardware 4. A very complex laboratory environment, plus a unique field team use case 5. Unpicking legacy ways of doing things that don’t fit the “new world”
  • 37. Legacy Modern Dual Screen Modern Single Screen Workstation Design
  • 39. Redesigned for productivity, creativity, and ease. At a time when the PC is playing a more central role in our lives,Windows 11 is designed to bring you closer to what you love.
  • 40. Quickly organize open apps. Quickly group open apps.
  • 44. THANKYOU TO OUR SPONSORS
  • 45. EVALUATIONS We value your feedback! Please tell use what you thought (also available on mobile app)