Best IT success rests on what IT can deliver to customers. Customers can be internal; those allied people and business elements relying on technical enablements and supports – and customers can be those who purchase and rely on whatever business delivers to the outside: Products, goods, and services.
In the case of the latter, IT generally has more of a tangential role – granting and constantly improving business’ tools and opportunities for the doing of business, be it production and manufacturing, marketing, advertising, communicating, researching, educating… and so on.
When delivering enablement in service to business aims, the higher the quality and reliability of tools and services, the better the standing of the IT department and its associated personnel within their business berth.
As importantly, by bringing consistency and quality, IT can build a stock of good will “capital” in terms of credibility and sincerity. When a particularly hard project comes along, or something unforeseen happens such as the absence of critical key personnel, or perhaps an extreme crimp of budget that impacts go-live dates or scale of solution, the organization knows full well IT’s commitment to quality, speed-of-deliveries, accuracy of solutions, and sincere good will and good faith commitment to delivering excellence.
An important concept to remember: When vetting any suspect effort, ask the simple question: “How does this move business forward?” All activity in service to business, whether direct or tangential, must serve business and move it forward. The question is an effective puncture to suspect activity or conversation and in any specific moment, helps to refocus all involved, leading them back to the business of doing business.
September 29th: On this day in 1951, CBS broadcasts the first American football game in color – between the University of California and the University of Pennsylvania, at Philadelphia.
I happened to catch Dr. Eric Haseltine, Ph.D., on television the other day. He’s formally trained as a neuroscientist, but was presented as a CTO – a position he held recently. You can examine his bio under this link to his article, “Why our economy is on the brink of going down the tubes…forever.” That’s a pretty dire title, but there is some very real danger – the article relates to the topic he discussed in his TV appearance, and to my concerns here.
While he covers a few different issues – all of interest to me – today I’m concerned with his assertion that only 1/5th the number of American students are entering the fields of science, math, engineering and technology, as in decades past.
Dr. Haseltine calls this a “Silent Sputnik” moment. He quotes Harvard Business School Professor, John Kao. Professor Kao, author of Innovation Nation: How America is Losing Its Innovative Edge, Why It Matters and How We Can Get it Back, says “Fifty years ago the Soviet satellite Sputnik burst the nation’s bubble of complacency and challenged America’s sense of global leadership. But we rose to the challenge with massive funding for education, revamped school curricula in science and math, created NASA and put a man on the moon.” [Emphasis added – DS]. Thus, the Space Race.
Today, both men are concerned that we are facing a Brain Race. However, there appears to be no American training for this race on the horizon. They make the point that American science, technology and math education has been in steep decline over the course of decades – with careers in business, law and media taking priority over high tech jobs. Beyond that…
I frequently make the point that it’s not only the reduced numbers going into these disciplines that is dismaying: Individuals inhabiting technical education programs and career fields comprise a troubling population. They are the product of sliding standards and social promotions. There seems to be a “rounding of corners” regarding empirical measures for qualifications, and in-turn what any specific individual can actually deliver – for fields that are themselves highly empirical. This lack of quality impacts the sustaining of systems and a simple ability to keep environments “whole” and reliable. Now consider that nothing is static: We’ve got to mount and sustain progressions and competitiveness – something quite impossible absent the creation of “better brains.”
Meanwhile China, India, and others are becoming much more “tech savvy.” China measures very favorably against the U.S. and Europe regarding patents and technical publications. No wonder: According to the Paris-based Organization for Economic Cooperation and Development, American teens trail their peers in 23 countries as concerns math, and behind 16 countries in science (“U.S. Teens Trail Peers Around World on Math-Science Test,” Washington Post, Maria Glod).
I’ve noticed a slide in quality of personnel even in Fortune 500 environments. What alarms me in those regards is that these companies, presumably, can attract the best candidates and workers, due to supremacy of salaries and benefits and, I would hope,the attraction of interesting and fulfilling work.
I would be interested in what you are experiencing: Is it becoming more difficult to staff your departments? Do you have to solicit outside expertise more often? Are you providing training to staff for knowledge that used to be considered basic “upon arrival” stuff – basic training that is now pushing back the critical “progression training” for new systems, evolving disciplines, and ever-more sophisticated environments?
September 25th: On this day in 1934, Lou Gehrig played in his 1500th consecutive game.
Being efficient, reducing cost, leveraging effort, doing more with less… ever faster – this is all a part of intelligent business design, and properly sized and executed technology design. In fact, it is an all-important concept within the proper weave of business and technology. Things must be mutually reinforcing, mutually enabling, mutually protected, and must thrust the business of doing things forward.
But what of an efficiency of errors? Oh, that happens too.
What of the IT department that images a PC for propagation to dozens, or hundreds, of PCs… but that original image contains a significant error? Now that error manifests across entire domains, environments… quite efficient… and quick.
What of the higher corporate headquarters I heard about recently: They created a budget template for dissemination to all branches and subordinate business offices and units. It was to bring uniformity and wholeness to the budget process and rollup. Control. Efficiency. Completeness. Except – oh oh: Some critical elements were left out of the template. And, more than a few “local” budget wrinkles were not accommodated in this glorious “uniformity.” A blizzard of notes, requests for special accommodations, and exceptions to policy came back, making the original budget process look like a walk in the park.
Quickness and efficiency here did not serve the realization and finalization of the budget; quickness and efficiency served error and its spawn of negative impacts to the process.
Keep a concept firmly in mind when planning anything; when creating new processes; when writing associated instruction sets:
Errors frequently have efficiencies. Take action with care.
September 21st: On this day in 1957 “Perry Mason,” with Raymond Burr, premiers on CBS-TV.
I was perusing a genre online that I hadn’t really thought to peruse prior to this: IT Horror Stories.
I was employing Google and my imagination (a dangerous combo for sure) – in scaring up topics for The Business-Technology Weave. A recent conversation about a very bad Biz-IT outcome led me to wonder about other horror stories. There’s some goodies out there, and you can Google and read any number of them for yourself. (Although for some and maybe most of us… enough real-world horror might make an online revisit masochistic).
But I got to thinking about a certain horror story that I’ve not yet seen chronicled; or perhaps I just didn’t stumble on this particular IT horror twist: an increasing difficulty in holding people accountable – even in a demanding field like IT.
A Fortune 100 environment had a new IT director, who promptly surveyed his new domain: Staff, enterprise, related assets, areas of liability and lag, state of content and backups… Whoa! No backups had been done for three months! But, that’s not the real horror of the story.
The person responsible, “Franklin,” the Network Manager merely said that the drive had failed, and he had been “unable to get it working.” (Names have been changed). What’s a new IT director to do? He made his governance aware of what had happened – and they were sufficiently shaken. HR was also apprised at this general lack of ethics, and specific, stunning, lack of routine IT practice. However, no one in IT’s governance wanted to impose dismissal or any penalty regarding this negligence. They did indicate that this was “Strike 2” against this individual. Three strikes and you’re out.
Fast forward a year: Franklin has been stumbling along this whole time. A phonecall comes in to the Director on a Friday afternoon – it’s “Susan” (names have been changed), a senior executive with the firm:
“My laptop won’t boot; I need it for working at home this weekend.” The Director assures Susan that Franklin (who assists the HelpDesk) will be right down to fix the problem. The Director sends him down, telling him to fix the person’s problem for critical weekend work from home. Toward the end of the day, prior to leaving, the Director asks Franklin if everything went okay with Susan’s laptop.
Franklin: “Yes, everything is ok.”
Everyone departs for the weekend.
On Monday, the Director has a nasty phonecall on his voicemail: It’s Susan, quite irate, complaining that the laptop wouldn’t boot at home, and that she’d had to drive to the office several times during the weekend. The long and short of it? To his utter amazement, when the Director asked Franklin about the status of the laptop Friday afternoon – instead of hearing “Gosh, it was working when I finished with it…” or some such variant, what he heard was this:
“I wasn’t able to get it working; I’m not very proud of myself right now.”
Huh? No amount of querying as to why Franklin hadn’t asked for assistance, or turned the problem over to another HD person, or the Director himself, yielded a response beyond “I’m not proud of myself right now.”
The real horror to this story hasn’t been divulged yet: When the Director, his governance, and HR all uniformly agreed that this was “strike 3,” when the incident was all written, and when the meeting for dismissal was scheduled – a call came from the organization’s higher headquarters in New York, putting the brakes on the dismissal. That’s the horror.
Higher headquarters’ explanation was that there had been too many lawsuits regarding dismissals, and that all such actions were “on hold” – including several at headquarters. Meantime, IT had to carry a worthless employee.
It’s one thing to lack skills – it’s quite another to lie and deceive about statuses and fixes – and customer service, and critical support to business.
Guard your environment: Get rid of hapless people. You do them no favor in carrying them, you do business no favor in carrying them, and they can damage reputations: Yours, and your place of employment’s.
September 20th: On this day in 1519, Magellan begins the 1st successful circumnavigation of the world. I’ll take their word for it… :^ )
Ah, it’s so gratifying when thought leaders catch up to something you’ve known and espoused for 5 or more years.
There’s a very interesting, and quite good, article that I stumbled upon: Living Up to Technology’s Promise.
The article is well worth reading and I enjoyed it. However, I do take some issue with the idea of their “business-technology convergence” concept. Business and technology have not converged – they have become interwoven: There is a weave of business and technology.
You may well ask: Convergence…. Weave – what’s the difference? The difference is both subtle and stark. Convergence is a uniting and joining, but there’s an implication that if a convergence never happened, or if there was a disengagement, either side would survive – at worst, there’d be a missed opportunity for efficiencies and advance of mutual interests.
However, kick out a business’ technical enablements, and it might sustain 5% productivity – if you’re lucky. (Note: I’m speaking of the kind of businesses that the article targets). Therefore, there is a mutual survival at stake here: Business and technology are woven together – and the sooner any business and allied technology element(s) understand this interwoven relationship, the better.
But the “convergence” article excited me. I’ve read very little elsewhere that approaches an understanding regarding the modern – and accelerating evolution of – empowerments and vulnerabilities in the business-technology relationship.
Today I’d like to say: Don’t converge: Weave. As but one recent example from this blog: Security is every person’s business in the organization. Every person is a stakeholder and must be a mini-security officer. That is, they must view every action and activity through security’s prism. Technology – the IT department – must emplace the technical protections – and lead business; bringing awareness, updates, and education regarding proper activity, to the table. That is weaving business’ awareness, ownership, and appropriate doing, into technical and related business security.
Recognize that The BTW does not attempt to make Business and IT one unit, nor does it attempt to overlap discreet duties, talents, and highly specified jobs beyond a point of diminishing returns. Rather, it weaves the common organizational appreciations for the main levers and liabilities, so that everyone brings the proper use, awareness and activity to the shared stakeholder elements.
That is a weave, and that is how you will thwart threats to today’s example – security: unauthorized access; data breach and theft; ID theft; exposures, impacts to business reputation, impacts to trust, and so on.
If there’s enough interest in this subtle yet powerful difference between convergence and the Weave, we can examine it against other areas in the coming days; Budget comes immediately to mind.
September 15th: On this day in 1904 Wilbur Wright makes his 1st airplane flight.
In reviewing some Acceptable Use policies, I’ve noticed the usual cautions about adherence to authorized access, the caveats about protecting your ID and password… There are the usual admonitions guarding against the hogging of shared resources, being vigilant about malware and scams; to remain cognizant of IT warnings referencing same.
There is also a robust caution against using systems for illegal activity, political purposes, advertising (of personal interests), using unauthorized copyrighted material, etc. The policies guard against degradation or harassment – doing many of these things not only runs afoul of the organization’s policies, but can also run against local, State and Federal law, depending on the specific nature of the activity.
By the way, there are many fine AU templates on the web if you need help, and always remember that IT’s AU policy reflects and supports the organization’s established culture of openness and trust; it’s code of ethical and lawful behavior. IT should not drive these things – they are larger to the organization – IT supports these things by making sure that technical empowerments are not misused, and that all parties understand acceptable and inappropriate use. To that end, always look for reinforcing and leading policies, such as those maintained by HR, and reference them accordingly.
However – many of these policies make little to no warning against using internal resources for posting and dissemination to outside entities such as blogs, boards, etc. (short of e-mail liabilities). However, I’m not saying that’s likely to be the case with yours, but check: Many of the policies I’ve been reviewing are remiss.
While it may be true that the organization cannot control an employee on his or her own time, and some postings made on personal time may not be actionable when in too gray an area (“my boss sucks,” for example), there is yet an avenue for monitoring in these regards.
Personal blogging, posting to social networks, comments to news articles, and information sent to various other user forums on the ‘net, should not be done on company time. Further, even the blurry organizational actionability regarding the “my boss sucks” comment to a Facebook page could quite well be actionable – particularly if found to have been posted on company time, with a company workstation and related internet access. And for sure if employees are divulging inside information, hammering the organization’s reputation, or casting aspersions on specific co-workers or management, then it’s time for action.
Your Acceptable Use policy should address the use of company resources in posting and propagating unflattering, and even damaging, information to these arenas.
You want to ensure acceptable use, yet you must keep this in mind: Your organization’s information technology resources are there primarily as business enablements and for business goals. However, almost all organizations grant a certain amount of personal use. Individual users, associated departments and supervisors are all responsible for exercising good judgment regarding the reasonableness and amount of personal use – so long as it comports with the Acceptable Use policy and all supporting policies.
September 10th: On this day in 1966 The Beatles “Revolver” album goes to #1 and stays #1 for 6 weeks.
Greetings fellow business and IT travelers.
Yesterday I opined on “open” data-resource environments. A failing of common sense seems to be inspiring a slide of standards in the most critical areas, and in the face of extreme liabilities. These liabilities include such things as data breach, identity theft, and unacceptable use avenues due to poor training and information: ill-advised e-mails or postings to sites about co-workers, friends, families, and inside information regarding workplaces, etc.
It seems standards are out of fashion these days in certain environments. Requiring adherence to the most common sense practices, and providing protection of systems and data, seems to run counter to having a convivial work environment, in some people’s minds. Who wants to be a nudge and talk about standards?
Yesterday someone told me about a major university and its failings regarding start of the Fall quarter. No names – but I’d like to state that it wasn’t Ohio University, Lakeland Community College, nor the Manhattan Institute of Hair Design and Follicle Massage. Just to be clear.
This particular university had all summer to ensure that workstations were solid, systems and appropriate licensing in place, and that all computer labs and classroom resources were up to snuff. Did they manage to have a solid position of surety regarding systems, access and performance? Nah. How the heck are you going to squeeze all of that into a single summer?
Among other things, there was a licensing problem due to newly installed software: No one checked things prior to the start of the quarter.
It’s one thing for a small company, with limited resources – or perhaps IT folks who are a little green – having a basic problem like this. But universities and schools are supposed to be on some sort of edge given the fact that they’re educating the next generation of people. Underlying that edge should be a solid foundation of “present” circumstances – some really solid technical enablements and supports in the form of documentation and best practices… common practices. We’re not building rockets to the moon – we’re just ensuring that networks, systems, and services are solid.
I can’t divulge all of the details regarding the university’s troubles, lest I give away the identity. But it’s troublesome that an institution of higher learning, which should have a proactive engagement with the present, and a prompt position for the streaming future, can’t manage a simple readiness posture for incoming students and resumption of full-scale business in supporting the Fall quarter.
Any thoughts out there? What are you seeing and sensing? Work and school environments are only going to get more robust and technically dependent. The business-technology weave is going to eat the organization’s lunch, so to speak, if we don’t handle the care and feeding of these environments with the proper maintenance and progressions…
September 9th: On this day in 1977 the first TRS-80 computer was sold.
Lately I’ve stumbled into one of these “open” environments that are in fashion in some quarters.
Maybe you already know what I’m talking about… a zone whereby the (usually) business minds – that is, non-IT – decide that we can’t have too many rules or restrictions lest we inhibit imagination, the free exchange of ideas, collaboration, and some measure of resultant genius.
What does this mean in that particular world? Well… anything goes. Any sort of content or data is fair game for exchange, posting, sharing… any sort of access is granted, everybody come on in! The water’s fine and… we trust that no one is going to pee in the pool. It’s a wonderful world, after all…
This is entirely too liberal and it’s extraordinarily naïve. I liken it to a workshop – the kind with hammers, saws, power tools: Let your imagination run wild. Talk to your peers. Invite anyone in that you like… build anything that you want – but were going to qualify every activity and every person in here for the tools and materials at hand.
You want to use the bandsaw? Fine – you can stand some training; here’s how. We want to ensure no one cuts their hand off, or anyone else’s hand. It would also be nice to know that the circular saw is properly maintained, lest a blade flies off and embeds itself into a wall… or my head.
Obviously to any sane person data and computing resources must involve similar safeguards, limits and maintenance. Our tools (computers, infrastructure, systems) and materials (content, data), deserve our protection in the form of appropriate use, maintenance, and best planning and progressions.
Particularly in, dare I say it, liberal environments such as universities and schools, it is important to ground everyone in a few realities: data and system breaches are on the rise; there are outside entities (and perhaps a few inside people) bent on intent to harm; and plain old human error needs to be minimized as much as possible through training and reinforcing Acceptable Use policies.
As I like to say, “Get on it!”
September 8th: On this day in 1897 Jimmie Rodgers, the “Singing Brakeman,” was born.
Given all the talk regarding Enterprise Resource Planning, and all manner of sub-planning (Disaster Recovery Planning, Change Management, Business Continuity Planning, and on and on…), we often seem to forget that planning must be strategic.
Check a thesaurus… something that is strategic is: Planned; tactical; calculated; deliberate; premeditated; considered; intentional…
Too often, business and IT plans become reactive. However, even strategic planning that starts out ahead of a curve, with foresight and collaboration, suddenly gets upended. More than ever it is important to not only build plans that anticipate and lead changes, but to also put an underlying foundation to plans; a readiness posture for the whole of the organization so business and IT collaborate and succeed on a fluid basis… an ongoing “strategization.”
Regardless how leading and “tight” your planning seems, be certain that the process is flexible enough to adapt to any changes in circumstances. There is always the unforeseen and outside uncontrollables. Resultant implementations of systems or policy will not always necessarily match the initial plan, and ability to efficiently adapt along the way is key. Delivering to the larger objective is still the goal and the ultimate measure of success, regardless of how much prior strategy gets usurped – just be certain it was truly unavoidable. (If you find all of your planning under a constant reality assault, you’d better get better planners into position).
In supporting this, stakeholders, planners and implementers – key strategy personnel – must communicate willingly, aggressively, and with full exposure. Political impairments and battles must be swept away. In any cases where change is embedded in other change (during what should be the constancy of a plan), things can become exponentially difficult quite quickly: make certain to have meaningful milestones and measures along the way; when adjusting them, be as careful as you can be in making those adjustments.
Be certain that IT plans align with enterprise plans and expectations; ensure sanction and support – agreement – from all C-level executives and board or other oversights. IT budget and plans must align and live within larger, organizational budgets, resources and plans.
Also, be sure to balance near-term, medium and long-range deliverables. Hang your items not just on an IT timeline, but take those aforementioned organizational budget, resource and (possibly competing) plans into account.
September 5th: On this day in 1774 the 1st Continental Congress assembles in Philadelphia.
These can be tough times for many organizations, and no one is immune: Whether small, medium, or large business. Of course, prudent fiscal management should always be desired, and in fashion anyway.
But in hard economic times some of us find ourselves tasked with sharpening our pencils with a razor, and looking very hard at areas we thought we’d never have to shave.
Executives are focusing on budget and related potentials for cuts – and everyone down the line is going to be tasked with producing savings. In these regards, once tasked, you’d better serve something up.
Quite naturally, you will shine like a star if you can boost efficiency and effectiveness while simultaneously realizing savings in cost.
The effective IT leader will examine all areas, and areas anew: Cloud computing and its yield of scalable and on-demand resources can reduce cost; virtualization and its yield of most favorable utilization of infrastructure and its grant of very efficient management; examine Software as a Service (SaaS), Platform as a Service (PaaS) and Infrastructure as a Service (IaaS) and benefits that may apply to your environment and organization.
Further, you should be seeking business enablements via online collaboration methods, such as shared work spaces and documents, and web and open source applications. Also look to the increased efficiency granted to staff by use of portable devices such as smart phones, iPods, Blackberries, etc., especially as paired with social websites such as Facebook, LinkedIn, Twitter, and MySpace. (Ensure robust acceptable use and security policies here).
Review your outsourced support, and be certain you are right sourcing. Is there something you are struggling to handle internally that is better shifted outside? Often this shift frees up IT staff to take over other areas that they are more suited to support – you may find that you can change the dynamic to your budget advantage.
Things to keep in mind: When examining cost reductions, also think cost efficiency: Are there things IT can do to enhance revenue? Are there technologies or methodologies that can be implemented to save costs in, for example, utilities? Savings by granting an increase in operational effectiveness?
Is there an opportunity to coordinate the IT budget with other enterprise planning and budgeting in achieving economies of scale?
In all regards, in these trying times, the IT leader should be on constant review and alert for assists to the budget.
September 2nd: On this day in 1944 during World War II, George H. W. Bush ejects from a burning plane.