I just read an article about breaking down the silos in IT. This piece focused on the application development process and the fact that each group does its thing and then tosses the application over the wall to the next group, from developers to QA engineers to performance test engineers. The problem comes in if all this testing is performed on a “utopian network” on the LAN, so nobody sees how it will perform on a WAN. So when users experience problems due to latency or packet loss, they blame the networking guys.
This is classic siloed, need I say territorial, behavior. The irony is, everyone in IT bemoans the fact that so much of the enterprise functions in stovepipes that it’s a huge effort to lead projects that should be joint efforts across departments or functions. Departmental interests, power struggles and personalities get in the way of effective enterprise IT projects so they don’t get off the ground or the end result fails to meet expectations or isn’t strategic after all. In fact, IT could figure out how to break down silos by starting at home.
It’s really not that hard. The next time you have a brainstorming session or launch a project, seek out representatives from across IT. Get their input throughout the process. Figure out what new processes you may need to create to consider their (and in the end, everyone’s) interests so that your outcome is solid and thoroughly represents the best you can do. If it’s an application you’re building, your project committee will include people from the user community; add an IT subcommittee with people from every part of IT that the application will eventually touch.
Inclusion is a management philosophy, and it gets conflict out on the table early on. Better to hash out your differences before spending the company’s money and then needing to spend more to patch something later on. Any eye-rolling or “but…”s around the room will turn into greater pride and less maintenance at the end.
Welcome back! I hope everybody had a merry holiday season. We here at SearchCIO.com took a bit of time off, as I hope you did, too. In case you missed anything, here are some of the pieces we’ve been working on, dealing with security tools, tech gifts and enterprise apps:
- Virtual security tools fill gap in virtual data center — Have the benefits of data center virtualization — streamlined infrastructure, big costs savings — blinded you to computer network security gaps? A virtual firewall promises insight.
- Holiday gifts for the tech savvy — and not – Yes, technically the holidays are over – but now you might have a better chance of getting some of these presents — for the tech savvy and fearful alike – on sale!
- Tough choices ahead in 2009 for enterprise applications — CIOs will face a lot of tough choices with ERP and other enterprise-level application upgrades, SOA projects and BPM initiatives in 2009. Read the full blog and feel free to leave your comments!
CIOs will face a lot of tough choices with ERP and other enterprise-level application upgrades, SOA projects and BPM initiatives in the coming year. If you have to keep a lot of balls in the air most years, this year will be more like juggling flaming clubs while standing on a high wire.
In such a circus, sometimes you just want to put off tough choices. “Just get through it and move on” sounds pretty good, right? Well, the buck may only be worth 79 cents these days, but it still stops on your desk. I think CIOs are going to have to figure a few things out this year besides how to keep the lights on.
And application software is one of those things. SOA, SaaS, cloud, agile development, rich clients – where’s it all headed? The large application vendors, such as SAP, that dominate the major enterprise categories have been rolling out their own SOA-based architectures in upgrades, and the same is true on the dev tools side. It’s likely that you’ll have to make some kind of move in the direction of service-based software well before the Dow returns to 12,000 or risk waking up, like Rip Van Winkle, to a world that makes no sense to you at all.
It’s a confusing mess, and it’s easy to see you could wind up in endless sterile SOA debates about how many software angels can dance on the head of a framework and still have nothing workable. The key to deciphering it may well be to insist on thinking of services as automated business processes instead of abstract technical tasks. At least then you know there’s an intrinsic business value to what you produce. Of course, you really do have to build abstract technical services, too, but making that a focal point is more likely to lead to the dreaded “technology for technology’s sake” dead end.
Many of you are hearing from the CEO and CFO that they’d like IT to pick up the slack from reduced office and factory staffs. That sounds a lot like business process automation. IT has automated many business silos, and now it’s on to the really tough job of automating the transfer of information and decision making between those corporate departments and their disparate applications. Times are right, though, to finally get a mandate to rationalize a lot of redundancy across those different application silos now tightly in the grasp of business owners. If your governance projects don’t include that, don’t expect much in return. Hopefully you can do for software in the coming years what you’ve done with consolidation and virtualization for servers and floor space in the last few years.
Speaking of virtualization, that’s another area where standing still could mean getting left behind, but I’ll leave that for another post.
The holidays are upon us! But before you mentally check out for the week, take a peek at our latest stories from SearchCIO.com:
- File transfer solution improves business process – It’s always a good time to look at streamlining business process, but it becomes even more important when companies are looking to save money. At Christie’s auction house, a managed file transfer solution accomplishes both of these objectives, with strong ROI.
- Employee layoffs pose security risk if systems access not disabled – Unfortunately, this is something a lot of companies are confronting these days. As layoffs rise, IT departments aren’t being vigilant enough in limiting network access and risk the ire of terminated employees.
- Seven steps to securing funding of your disaster recovery plan – In this Forrester Research Inc. report, learn how to sell a disaster recovery plan to your CEO and get the funding you need.
- How desktop virtualization can lower computing costs – Desktop virtualization is on the rise – so how much can it lower your maintenance costs for desktop computing? This podcast discusses specific ways to cut costs through desktop virtualization.
How’s this for a year-end bummer? According to a survey from McKinsey & Co., IT is not living up to anybody’s expectations. The survey, titled “IT’s Unmet Potential,” found that CIOs, CTOs and non-IT executives all agree there is a disjunction “between their IT organizations’ current priorities and what IT could contribute.”
It seems the old IT/business alignment thing still needs aligning.
The silver lining, if you can call it that, is that this disjunction is actually a step forward. Instead of having IT and the business disagree about IT’s purpose, now at least both groups are on the same page.
Both CIOs and their non-IT executive peers have reached concordance on the idea that IT should play an important role “in developing and executing business strategies” by, for example, promoting innovation to “better enable companies to seize new opportunities.”
The bad news is that what’s on that page is not actually what is going on in these companies.
For example, only one quarter of the respondents believe that IT is currently “partnering with the business to develop new business capabilities.” Similarly, only one quarter believe that IT is “proactively engaging with business leaders on new ideas/enhancements to existing processes, systems.”
The other evidence for this disjunction between what is and what could be is the respondents’ answers to questions about current IT priorities versus ideal IT priorities for the next budget cycle.
For example, “reducing IT costs” and “ensuring compliance with regulations,” according to the survey, should ideally be half as important on the IT priority list as they currently are. On the other hand, the respondents said that in an ideal world, IT’s role in “creating new products and service” should be almost double in priority.
For the new year, perhaps CIOs and their business peers can take heart in the idea that the first step in solving a problem is defining it.
The survey was conducted in October, after respondents “had time to absorb the implications of … the deteriorating economic environment,” said McKinsey authors; 548 executives responded, 49% of them identified as C-level executives.
Linda Tucci’s story on SearchCIO.com today on disabling accounts after employee layoffs and the security risks “orphaned” accounts can pose if not properly closed out was a timely one, of course. I’m actually sort of surprised we’re not seeing more stories about disabling employee accounts, considering November saw the loss of 533,000 jobs in the United States, and December layoffs might be just as bad – or worse.
If I may try to add some levity to the situation, the “orphaned accounts” story (particularly the line about one person who was still on the payroll six months after being terminated) reminded me of the first minute from this infamous clip from the film “Office Space.”
Now, I don’t think anybody would question that there are risks associated with leaving employee accounts open following layoffs. When you’re laying off IT folks, it’s even riskier, according to Tucci’s story, since these individuals “usually have the keys to the kingdom” and could wreak absolute havoc. Hmmmm, reminds me of a little IT hack incident earlier this year in San Francisco you may have heard about.
Unfortunately, I think the points touched upon in Tucci’s story might strike a cord with a lot of the people who read this blog – I know they struck me, both on a personal and professional level. It seems unnecessary to immediately disable the accounts of 99% of laid-off employees who wouldn’t dream of downloading sensitive company information. They might have downloaded a picture of a grandkid on their work computer, or may have even been in mid-email when their access disappeared. Yes, their computers belong to the company, but shouldn’t these employees have an opportunity – even if it’s brief and monitored by current staff – to recover those items? I believe so.
Precluding former employees’ access to their contacts and working documents with little or no warning could be bad for the business, too. Particularly if a company is laying off longtime employees who might have hundreds of contacts built up in Outlook, or have files that would be useful to others in their organization. If the employee is immediately locked out, then recovering and piecing through that business information is likely to be a lot more challenging for remaining co-workers.
And yet … I sure wouldn’t want to be the head of IT in a company that took a lackadaisical approach to disabling employee accounts after layoffs and was burned by one of the 1-percenters who caused problems in the system.
So for any of you with experience in layoffs: Have you gone with immediate system lockout, or ever considered a less drastic approach (for the reasons I cite above, or others)? Do desperate times call for Draconian measures, or is there room for a more personal touch?
I hope everybody had a nice weekend! For those playing catch-up, here are the most recent stories from SearchCIO.com:
- Five questions to ask before launching a BI system — An economy in recession puts business intelligence (BI) on the top of the 2009 agenda. But CIOs will have to look at BI differently moving forward. Want five tips for getting it right? Read on.
- Economic downturn will hurt IT hiring in 2009 – Unfortunately, you knew this news was probably coming. A new survey shows fewer jobs, the possibility of layoffs, a flattening of salaries and a rise in the number of qualified IT job applicants ahead.
- Managing user adoption makes the most of a BI solution – A good case study for those looking to manage a BI solution adoption correctly: A user-friendly interface and superior architecture sold Meredith Corp. on a BI solution from MicroStrategy, but it was IT’s rigorous “managed adoption” process that ensured people used it.
- Gartner picks top 30 countries for offshore IT outsourcing – Moving beyond outsourcing giants India and China, learn more about countries like Mexico, Poland and Vietnam, which have strengthened their offerings as outsourcing alternatives.
Cybersecurity initiatives aren’t about just you, the CIO, or your organization. And because of that, the solutions shouldn’t come solely from you, but from shared knowledge from all sectors.The same model applies to the U.S. government’s approach to cybersecurity initiatives. The Center for Strategic and International Studies’ Commission on Cybersecurity for the 44th Presidency, a panel formed in August 2007 “after the United States suffered a wave of damaging attacks in cyberspace,” recommends that incoming President Barack Obama should establish a new White House office and appoint a presidential assistant to oversee a “comprehensive national security strategy for cyberspace,” CNN is reporting.
As we noted last week, 2008 has been a very spammy year, with threats targeting social networking sites. The cybersecurity report takes the spectre of these threats even further, stating that cybersecurity is one of the major national security problems facing the U.S. and “all the tools of U.S. power” – diplomatic, intelligence, military and economic – are needed to deal with cybersecurity, CNN reports.
Some of the recommendations with regard to national cybersecurity should sound very familiar to enterprise CIOs charged with overseeing cybersecurity protocols in their organizations. For instance, the report recommends “requiring better authentication” of digital identities and limiting government purchasing to secure products and services. Research, training and education should also be expanded, the report says.
The lesson here? Your cybersecurity insights and experiences carry far beyond your individuals organizations’ walls. Share your cybersecurity stories and solutions with others. You can start by clicking the “comments” link below!
There’s nothing like a Hewlett-Packard software news announcement to get me a’wondering.
The typical missive usually begins with some global statement about HP helping IT deliver better business outcomes. Then rapidly devolves into a dizzying catalog of product enhancements and new integrations and, of course, the array of HP services for those IT departments that can’t figure out the new integrations and enhancements on their own. The HP point person cheerfully gets on the phone to sort it all out, but in the end, I realize I’d have to be on much closer speaking terms with the world’s largest technology company to understand what was new, newish or just another name for something HP announced seven months ago…
But today’s HP news (enhancements to its business technology optimization, aka BTO, software) came with a little jolt — namely that there is no more business as usual, even in HP press releases. Right there in the headline was a pitch worthy of a car company: “New HP Software and Zero Percent Lease Financing Helps CIOs Respond to Tough Economy.”
It occurred to me that this must be very expensive software to warrant 0% financing. Unfortunately, HP doesn’t get into how much it costs with the press. I did find out the offer ends Jan. 31.
The software, from what I can glean, sure sounds nifty — a big brain to keep track of all your IT parts and help you figure out how best to use them. (According to the release, it saved “a leading health care provider” $30 million. Who knows what it could do for you?)
In case you missed it, we’ve had a very active discussion on FatWire’s sex-site demo at a Boston Web 2.0 conference. Feel free to add your own views and, while you’re at it, check out our stories and virtualization guide from SearchCIO.com this week:
- Six Sigma, ITIL, other business processes cut IT costs in lean times – Looking to cut IT costs? Who isn’t nowadays? Don’t be too hasty: Business processes such as Lean Six Sigma and ITIL are better ways to reduce your IT costs than just blindly making cuts, say Forrester experts.
- Domestic and offshore outsourcing facts CIOs need to know – Think you’re up on the latest trends in outsourcing, which has seen both highs and lows this past year? Take this outsourcing quiz on offshore and domestic outsourcing to determine your knowledge of the IT outsourcing industry.
- Internet search technology shifts from content to intent – You know how it sometimes seems like search engines can read your mind? There’s a reason for that: Internet search is moving from content to intent, Yahoo says. The company’s new open source development tools allow users and developers to customize how their search results look.
- Data center and desktop virtualization guide for CIOs — Data center virtualization has become fairly widespread, but now focus is shifting to the desktop. In addition to general data center and virtualization trends, execution strategies and tools and technologies, this guide addresses decision criteria for extending virtualization to the desktop; hardware and software options; best practices in deployment; cost analysis and network considerations.