September 15, 2010

Eat, Pray, Fly

Imagine your airplane flight with 40% more people than today's already crammed cabin...

(Pretty unimaginable right?)

Well check out these new airline seats called Skyriders, marketed by Italian company Aviointeriors.

The catch is that the Skyrider seats are only 23 inches narrow and passengers are expected to be in this crazy, half-sitting, half-standing "ergonomic" position for up to 2 hour flights.

The company's advice to larger size people: "You have to lose some weight!"

This certainly doesn't seem like a very customer-centric attitude, nor a very practical way to fly, no matter how much their spokesperson tries to "sell us the Brooklyn Bridge" on this one.

GONG! Back to the drawing board on this "innovation."
Share/Save/Bookmark

September 12, 2010

The Humanization of Computers

The Wall Street Journal recently reviewed (Sept. 10, 2010) “The Man Who Lied to His Laptop,” by Clifford Nass.

The book examines human-computer interactions in order to “teach us about human relationships.”

The reviewer, David Robinson, sums up with a question about computers (and relationships): “do we really think it’s just a machine?”

Answer: “A new field of research says no. The CASA paradigm-short for ‘computers as social actors’—takes its starting point the observation that although we deny that we interact with a computer as we would with a human being, many of us actually do.”

The book review sums up human-computer interaction, as follows:

Our brains can't fundamentally distinguish between interacting with people and interacting with devices. We will ‘protect’ a computer's feelings, feel flattered by a brown-nosing piece of software, and even do favors for technology that has been "nice" to us. All without even realizing it.”

Some interesting examples of how we treat computers like people:

- Having a heart for your computer: People in studies giving feedback on computer software have shown themselves to “be afraid to offend the machine” if they are using their own computers for the evaluation rather than a separate ‘evaluation computer.’

- Sexualizing your computer: People sexualize computer voices lauding a male sounding tutor voice as better at teaching ‘technical subjects,’ and a female sounding voice as better at teaching ‘love and relationship’ material.

- A little empathy from your computer goes a long way: People are more forthcoming in typing messages about their own mistakes “if the computer first ‘apologizes’ for crashing so often.”

It seems to me that attributing human attributes (feelings, sexuality, and camaraderie) to an inanimate object like a computer is a social ill that we should all be concerned about.

Sure, we all spend a lot of time going back and forth between our physical realities, virtual realities, and now augmented realities, but in the process we seem to be losing perspective of what is real and what is not.

Perhaps to too many people, their computers have become their best friends, closest allies, and likely the biggest time hog of everything they do. They are:

- Doing their work at arms length from computers rather than seriously working together with other people to solve large and complex problems facing us all.

- Interacting virtually on social networks rather than with friends in real life, and similarly gaming online rather than meeting at the ballpark for some swings at the bat.

- Blogging and tweeting their thoughts and feelings on their keyboards and screens, rather than with loved ones who care and really want to share.

We have taken shelter behind our computers and to some extent are in love with our computers—both of these are hugely problematic. Computers are tools and not hideaways or surrogate lovers!

Of course, the risk of treating computers as people is that we in turn treat people as inanimate computers—or maybe we already have?

This is a dangerous game of mistaken reality we are playing.

[Photo Source: http://www.wilsoninfo.com/computerclipart.shtml]


Share/Save/Bookmark

Earned Value Management - Made Easy

Some exceptional Earned Value Management (EVM) instructional videos. These are great whether you are studying for your Project Management Professional (PMP) exam or wanting to apply EVM to your projects at work:

  • Part I: Basic Concepts


  • Part II: Calculating Variances and Indexes


  • Part III: Forecasting Completion


Share/Save/Bookmark

September 11, 2010

A Boss that Looks Like a Vacuum Cleaner


This is too much…an article and picture in MIT Technology Review (September/October 2010) of a robotic boss, called Anybot—but this boss looks like a vacuum cleaner, costs $15,000, and is controlled remotely from a keyboard by your manager.



So much for the personal touch—does this count toward getting some face time with your superiors in the office?


With a robotic boss rolling up to check on employees, I guess we can forget about the chit-chat, going out for a Starbucks together, or seriously working through the issues. 

Unless of course, you can see yourself looking into the “eyes” of the vacuum cleaner and getting some meaningful dialogue going.


This is an example of technology divorced from the human reality and going in absolutely the wrong direction!

Share/Save/Bookmark

Toward A Federal Enterprise Architecture Board


A Federal Enterprise Architecture Board (FEAB) would provide “teeth” to further implementing enterprise architecture across government.

We have a Federal Enterprise Architecture (FEA) that provides a government wide framework for architecture strategy and planning, but we do not have a FEA Board to govern the subsequent IT investments through capital planning and investment control (CPIC). CPIC is the governance process whereby we select, control, and evaluate new IT investments.

Interestingly, The Federal CIO Council’s Architecture Alignment and Assessment Guide (October 2000) specifically calls for complementary EA and CPIC functions (see graphics).

In this paradigm, the enterprise architecture (EA) informs, guides, drives the CPIC, and in turn the decisions from the CPIC governance process updates the EA planning, so that the EA and CPIC processes are seen as mutually supportive.

In the federal government, we have departmental and agency architectures and boards that serve to plan and govern IT investments at their respective levels. However, as we seek to build greater standardization, interoperability, and reuse across government with IT initiatives that cut across traditional government boundaries driven and guided by the Federal CIO and Federal CIO Council, there is a need for a FEAB to review new and major changes to IT investments.

There would be many purposes for the FEAB.

  • Strategic alignment: One would be to ensure strategic alignment not to any single department or agency mission, but rather to the greater federal government strategy and policy. Some examples of this would be data center consolidation, green IT, open government, and more.
  • Streamlining of investments: Additionally, the FEAB would assess IT investments to ensure that there is no overlap or opportunities for consolidation of initiatives. OMB performs some of this function today, but a FEAB would augment their capability with IT subject matter experts from across the government.
  • Other key benefits: Of course, the FEAB would also look at things like return on investment measures, risk mitigation plans, technical compliance to federal architecture standards and mandates (security, privacy, records, FOIA, Section 508, etc.).

The FEAB would not be a substitute for the EA Boards that provide oversight functions at the department and agency levels, but would provide governance for the largest and riskiest IT initiatives and those that cut across different agencies.

While the OMB currently assesses IT investments using Exhibits 300s and 53s, which include EA assessment questions, the FEAB would provide a governance board made up of cross-cutting governmental IT subject matter experts to vet these business cases from an EA perspective thoroughly and provide recommendations to the Federal CIO Council and the OMB on approval or denial. Therefore, and not unimportantly, the stand-up of a FEAB would add an important human factor to the Federal Enterprise Architecture and make it “real.”

Of course, with a portfolio of some 10,000 IT systems, the FEAB would not be able to govern every new Federal IT investment. Therefore, it would be critical to establish thresholds that would be practical for implementation.

I would envision the FEAB being chaired by the Federal Architect and the board being a recommendation body to the Federal CIO Council and the Office of Management and Budget, Executive Office of the President.

Critical initiatives by Federal CIO Vivek Kundra to effectively manage (i.e. CPIC control phase) IT investments through the Federal IT Dashboard and TechStat sessions would be augmented by the FEAB work to carefully recommend for selection (i.e. CPIC select phase) new federal IT investments.

Together, I see the federal select and control mechanisms of CPIC functioning in harmony to enhance governments IT planning, investment decision-making, and execution. Essentially, the FEA (architecture) and FEAB (governance) on the “front-end” will guide new IT investments, and the IT Dashboard and TechStat sessions on the “back-end” will ensure IT investments are properly progressing for the taxpayer based on cost, schedule, and performance measures.

In summary, the Federal Enterprise Architecture Board would be the governance arm of the Federal Enterprise Architecture, and serve as a support to the IT leadership of the Federal CIO, the Federal CIO Council, and the IT budgetary functions performed by the Office of Management and Budget.

Share/Save/Bookmark

September 7, 2010

Enterprise Architecture Panel - Snowmaggedon and the End of the (Desktop) World: The Mobile Workforce


[Pictured (Left to Right): Andy Blumenthal, Chief Technology Officer, Bureau of Alcohol, Tobacco, Firearms and Explosives; Ms. Doreen Cox, Chief Enterprise Architect, U.S. Customs and Border Protection; Mr. Rod Turk, Chief Information Security Officer, U.S. Patent and Trademark Office.]

Introduction:

Good afternoon. I'm Andy Blumenthal, the Chief Technology Officer at the Bureau of Alcohol, Tobacco, Firearms and Explosives (ATF). It's a great honor for me to be here with you today to talk about telework and how EA is shaping it's adoption.

Just coming out of the blazing hot summer, the blizzard this past February seems like ages ago. Yet this storm brought the federal workforce in D.C. to a halt for 6 days, costing more than $100 million in lost productivity per day. This was offset only by the 1/3 of the federal workforce which was teleworking.

Just in case you don't remember take a look at this:

I still remember Snowmaggedon because that was when we shoveled out the wrong car because the snow was so high we couldn't see which was ours.


More seriously though, telework benefits federal agencies in many ways:

1. Increases productivity
2. Enhances work-life balance and morale
3. Helps the environment by keeping cars off the road
4. Can save the taxpayer money by reducing the agency's footprint


Data from the Telework Research Network indicate that telework could save agencies and participants as much as $11 billion annually (on such things as real estate, electricity, absenteeism, and employee turnover) and that if eligible employees telecommuted just one day every other week, agencies would increase productivity by more than $2.3 billion per year (driven by employee wellness, quality of life, and morale).

According to OPM telework adoption is growing. As of 2008, telework increased 9% over the previous year and now slightly more than 5% of the federal workforce are teleworking.

Telework got a boost when the House and the Senate passed similar bills--in May and July respectively--to expand telework opportunities. The two chambers now must reconcile their versions before a final bill heads to President Obama for approval. The Telework Enhancement Act would make employees presumptively eligible and require that agencies establish telework policies, designate a telework managing officer, and incorporate telework into agency's continuity of operations plans.

Five years ago nobody would've thought that EA would inform the discussion on telework. EA was still primarily a compliance only mechanism and didn't have a real seat at the decision table. Now thanks to the efforts of all of you, it's strategic benefit is recognized, and
EA is playing a vital role in planning and governing strategic IT decisions such as in investing and implementing telework solutions for our agencies.


Our distinguished panelists here today will discuss how EA is informing the discussion of telework from both the policy, systems, and security perspectives.

Share/Save/Bookmark

September 6, 2010

ITIL Version 3 - Serving Customers Like A Fine Restaurant

This is not a framework or vendor endorsement, but I liked this simple video explaining ITIL version 3.

It explains the five key IT service cycles by comparing them to business services in a restaurant, as follows:

1) Strategy to headquarters creating restaurant theming
2) Design to chefs developing the restaurant menu (to meet customer needs)
3) Transitions to cooks running the restaurant kitchen (reliably)
4) Operations to waiters/waitresses delivering services (and owning customer satisfaction)
5) Service Improvement to the maitre d' ensuring quality standards

The video is a little quirky in the way it cycles back and forth between ITIL and the restaurant, but overall I think the analogy works!


Share/Save/Bookmark

September 3, 2010

What's In An IT Acronym

In the military and public safety world, information technology is often discussed in broader strategic and operational terms.

For example, in the Coast Guard, it is referred to as C4&IT--Command, Control, Communication, Computers and Information Technology.

In the Department of Defense, they often use the term C4ISR--Command, Control, Communications, Computers, Intelligence, Surveillance, and Reconnaissance.

According to GovTech Magazine, some public safety agencies (i.e. law enforcement and firefighting) often use another version of this, namely 4CI--Command, Control, Communications, Computers, and Intelligence.

The article provides some simple straightforward definitions for these (although perhaps skewed for first responders), as follows:

"- Command: The authority and responsibility for effectively using available resources, and for organizing, directing, coordinating and controlling personnel and equipment to fulfill a mission.

- Control: The ability to issue orders or directions, with the result that those directions are carried out.

- Communications: The most essential element. Communications between responders on the ground and command staff are critical to ensure that both groups have a common operating picture of the situation.

- Computers: They process, display and transport information needed by commanders, analysts and responders. Today this increasingly includes mobile devices, such as laptops and smartphones.

- Intelligence: The product of the collection, processing, integration, analysis, evaluation and interpretation of all available relevant information."

While these capabilities are all critical to mission performance, I am not sure why we have all these variations on the same theme, but at least, we all agree on the 4Cs or is it C4?


Share/Save/Bookmark

Revenge of the Introverts

I am an introvert.

Does this mean I am among a minority of the population that is shy, anti-social, “snooty,” or worse?

Many people have misperceptions like these, which is why Psychology Today’s current issue has a feature story on the realities vs. the myths of introverts. Actually half of the people you meet on any given day are introverts.

According to the story, introverts are:

Collectors of thoughts…(and) solitude is the place where the collection is curated…to make sense of the present and the future.”

Most of us don’t realize that there are many introverts, because “perceptual biases lead us all to overestimate the number of extraverts among us.” (Basically you extraverts take up a lot of attention :-).)

To me, being an introvert is extremely helpful in my professional role because it enables me to accomplish some very important goals:

- I can apply my thinking to large and complex issues. Because I gravitate to working in a quiet (i.e. professional) environment, I am able to focus on studying issues, coming up with solutions, and seeing the impact of incremental improvements. (This will be TMI for some, but when I was a kid I had to study with noise reducing headphones on to get that absolute quiet to concentrate totally.)

- I like to develop meaningful relationships through all types of outreach, but especially when interacting one-on-one with people. As opposed to meaningless cocktail party chatter – “Hello, How are you today?” “Fine. And how are you?” “Fine.” Help, get me out of here!

- I get my energy from introspection and reflecting; therefore, I tend to be alert to areas where I may be making a mistake and I try to correct those early. In short, “I am my own biggest critic.”

So while it may be more fun to be an extrovert—“the life of the party”—and “the party’s going on all the time”—I like being an introvert and spending enough time thinking to make the doing in my life that much more meaningful and rewarding.

[Note: Lest you think that I hold a grudge against extraverts, not at all—you all are some of my best buds and frequently inspire me with your creativity and drive!]


Share/Save/Bookmark

August 31, 2010

Watching Me, Watching You

This is not a vendor or product endorsement, but I saw one of these video collaboration devices in action today and wanted to share.

It is a Polycom CX5000 and it does 360 degree panoramic group video conferencing (in conjunction with Microsoft Live Meeting 2007 and Microsoft Office Communications Server 2007).

The head at the top of the Polycom is a series of cameras and mirrors that takes the video and it can automatically change the camera view to whoever is speaking.

The integration of the voice and video in this unified conference station was functional and fun.

Share/Save/Bookmark

August 30, 2010

Keeping It All In Perspective

Here are some amazing photographs from Yann Arthus-Bertrand.

This is someone who can truly see the bigger picture and help us to see it as well.

If we can all see beyond the minutia every day, I think we could appreciate the opportunities and challenges before us so much more, and be able to address them more effectively--in perspective.

To me, this is the clarity of vision that I aspire to and I hope you do too.

Share/Save/Bookmark

August 29, 2010

Dilbert on Process Management


Share/Save/Bookmark

Why EA and CPIC?

Note: This is not an endorsement of any vendor or product, but I thought this short video on enterprise architecture planning and capital planning and investment control/portfolio management was pretty good.


Share/Save/Bookmark

August 28, 2010

The Search For Servant Leadership in A Chilean Mine

The Search For Servant Leadership in A Chilean Mine

I’ve been following the story this week about the 33 miners trapped half a mile below the surface in the collapsed mine in Chile.

The story of the miners survival is incredible, but so too are the implications of corporate greed and the neglect of the workers safety and how we treat people as objects rather than human beings.

33 people are stuck in a space approximately 500 square feet for 18 days until a 2.3 inch drill hole was used to discover their whereabouts this week.

The miners had lost on average 22 pounds each and were on rationed peaches, milk, tuna, and crackers every other day.

The pictures of the miners and the notes of love and hope that emerged from below the earth’s crust were truly inspiring, despite the way that they got trapped to begin with.

Yet, the miners now have to wait approximately 4 months for a rescue tunnel 26 inches wide to be completed to pull them to safety.

The fear, panic and duress of being trapped 2300 feet down in 95-degree heat in close quarters for so long is something government officials, psychologists, and family members are very concerned about. They have even reached out to NASA to help them deal with the effects of the prolonged isolation.

Amazingly, when we think about how technology could help in this situation, it is not necessarily a “super-duper” drill able to dig them out in hours or minutes that is the focus here or a transporter able to beam the miners up the surface in seconds, but rather a simple tool like a ladder placed near the ventilation shaft (as was supposed to have been for safety purposes) would have enabled the miners to escape to the surface.

Now instead of the mining company having done the right thing for its workers to begin with, they are now facing a lawsuit from the families of the trapped miners and potentially bankruptcy.

This situation is reminiscent of other companies that put their profits before their workers, like we saw recently with BP that didn’t have a simple safety shut-off valve on the leaking oil well, and now they are funding a $20 billion escrow account to settle claims from the Gulf Coast oil disaster.

Plain and simple, it does not pay to skimp on worker safety.

More than that, people are not only our most important asset—as has become cliché to say, but the whole point of our interactions at work is to treat each other right.

Of course, we need and want to be productive, to improve things, to reengineer business processes, enable them with new technologies, and leave the world better from our work, but to me the true test for us as human beings is to make these contributions to our organizations and missions and at the same time not lose our basic humanity.

If the cost of an improvement or promotion is some very real bodies that we must climb over to get there, then I say we are failing the true test before us.

We can make the same gains and more by treating people with kindness and compassion—the way we would want to be treated.

Let’s not deny anyone a ladder or safety valve or even in the smallest ways mistreat our employees.

The test of leadership is how we treat people in accomplishing our goals, and the long-term effects to us from our behavior in this regard are greater than any short-term technology or process improvements we can make by dehumanizing ourselves and hurting others.


Share/Save/Bookmark

August 23, 2010

Putting the Donkey Before the Cart - Or Is He Sleeping Inside?


I didn't know whether to laugh or cry when I saw the "Bufalino" mini RV by designer Cornelius Comanns, profiled in DVICE.


3 wheeler. Seats 2. Fold down bed. Fridge. Stove. Sink (basin). Water tank. (Numbered) Storage. And laptop!

I'd give this an A- on creativity, but a C- for practicality (especially in terms of creature comfort) -- my butt hurts just looking at that seat. :-)

Nevertheless, I appreciate the need to do more with less, and to create eco-friendly vehicles for the 21st century.

I'd like to see Toyota and Chrysler convert their minivans into something with the functionality that this rickshaw was trying to get at.

Who knows if Comanns is on to something with this?

Share/Save/Bookmark

August 21, 2010

Pedal to the Next Tech Level

I just discovered the Ciclotte stationary bicycle.

You may have to take a double take before the bulb goes on and you even recognize the bicycle features--then the seat, the pedals, the handle bars come together in this innovative design by Luca Schieppati.

According to Wired Magazine (Sept. 2010), the concept design for this bike sits in the Milan Design Museum.

The bike is made almost entirely from carbon fiber and the pedals spin the main wheel that "generates a magnetic field and plenty of thigh-burning resistance."

I''ll need to start saving up the $10,700 to own own of these beauties.

Technology speaking, I think the picture speaks a thousand words.

I love it!

Share/Save/Bookmark

August 17, 2010

Social Networking, Blogging, and Tweeting in Plain English

Here are some great little videos that explain Social Networking, Blogging, and Tweeting in Plain English:

1) Social Networking

2) Blogging

3) Tweeting

Check out these and other social media learning resources, policies and procedures, discussion forums and more at the Department of Defense (DoD) Social Media Hub.

Share/Save/Bookmark

August 15, 2010

Engineering An Integrated IT Solution

Traditionally, the IT market has been deeply fragmented with numerous vendors offering countless of products and IT leaders have been left holding the proverbial bag of varied and mixed technologies to interoperate, integrate, optimize, and solve complex organizational problems with.

While competition is a great thing in driving innovation, service, and cost efficiencies, the results of the current fragmented IT market has been that organizations buy value or best of breed technologies from across the vendor universe, only to find that they cannot make them work with their other IT investments and infrastructure.

The result has been a contribution to IT execution that has become notorious for delivering an 82% project failure rate as reported by the Standish group.

Typically, what follows numerous attempts to resuscitate a code blue IT project is the eventual abandonment of the investment, only to be followed, by the purchase of a new one, with hopes of doing it “right” the next time. However, based on historical trends, there is a 4 out of 5 chance, we run into the same project integration issues again and again.

Oracle and other IT vendors are promoting an integration strategy to address this.

Overall, Oracle’s integration strategy is that organizations are envisioned to “buy the complete IT stack” and standup “engineered systems” more quickly and save money than if they have to purchase individual components and start trying to integrate them themselves. Some examples of this are their Exadata Storage Servers and Fusion Applications.

Oracle is not the first company to try this integration/bundling approach and in fact, many companies have succeeded by simplifying the consumers experience such as Apple bringing together iTunes software with the iPod/iPad/Mac hardware or more generally the creation of the smartphone with the integration of phone, web, email, business productivity apps, GPS, games, and more. Similarly, Google is working on its own integration strategy of business and personal application utilities from Google Docs to Google Me.

Of course, the key is to provide a sophisticated-level of integration, simplifying and enhancing the end-user experience, without becoming more generally anticompetitive.

On the other hand, not all companies with integration strategies and product offerings are successful. Some are more hype than reality and are used to drive sales rather than actually deliver on the integration promise. In other words, just having an integration strategy does not integration make.

For the IT leader, choosing best of breed or best of suite is not an easy choice. We want to increase capabilities to our organizations, and we need a solutions strategy that will deliver for our end users now.

While an integration strategy by individual companies can be attractive to simplify our execution of the projects, in the longer-term, cloud computing offers an alternative model, whereby we attach to infrastructure and services outside of our own domains on a flexible, as needed basis and where in theory at least, we do not need to make traditional IT investment on this scale at all anymore.

In the end, a lot of this discussion comes down to security and trust in the solution/vendor and the ability to meet our mission needs cost-effectively without a lot of tinkering to try to put the disparate pieces together.


Share/Save/Bookmark

August 7, 2010

No Real Solution Without Integration

Emergency Management Magazine (July/August 2010) has an article called “Life Savers” that describes how a convergence of new technologies will help protect and save first responder lives. These new technologies can track first responders’ location (“inside buildings, under rubble, and even below ground”) and monitor their vital signs and send alerts when their health is in danger.

There are numerous technologies involved in protecting our first responders and knowing where they are and that their vitals are holding up:

  • For locating them—“It will likely take some combination of pedometers, altimeters, and Doppler velocimeters…along with the kinds of inertial measurement tools used in the aerospace industry.”
  • For monitoring health—“We’ve got a heart monitor; we can measure respiration, temperature. We can measure how much work is being done, how much movement.”

The key is that none of the individual technologies alone can solve the problem of first responder safety. Instead, “All of those have to be pulled together in some form. It will have to be a cocktail solution,” according to the Department of Homeland Security (DHS), Science and Technology (S&T) Directorate that is leading the effort.

Aside from the number of technologies involved in protecting first responders, there is also the need to integrate the technologies so they work flawlessly together in “extreme real world conditions,” so for example, we are not just monitoring health and location at the scene of an emergency, but also providing vital alerts to those managing the first responders. This involves the need to integrate the ability to collect inputs from multiple sensors, transmit it, interpret it, and make it readily accessible to those monitoring the scene—and this is happening all under crisis situations.

While the first responder technology “for ruggedized vital-sign sensors could begin in two years and location tracking in less than a year,” the following lessons are clear:

  • The most substantial progress to the end-user is not made from lone, isolated developments of technology and science, but rather from a convergence of multiple advances and findings that produce a greater synergistic effect. For example, it clearly takes the maturity of numerous technologies to enable the life saving first responder solution envisioned.
  • Moreover, distinct technical advances from the R&D laboratory must be integrated into a solution set that performs in the real world for the end-user; this is when product commercialization becomes practical. In the case of the first responder, equipment must function in emergency, all hazard conditions.
  • And finally, to bring the multiple technologies together into a coherent end-user solution, someone must lead and many parties must collaborate (often taking the form of a project sponsor and an integrated project team) to advance and harmonize the technologies, so that they can perform as required and work together seamlessly. In the case of the first responder technology, DHS S&T took the lead to come up with the vision and make it viable and that will save lives in the future.


Share/Save/Bookmark

August 1, 2010

A Peek at The Future of Information Search, Analysis, and Visualization

I am not endorsing any vendor or product, but here's an impressive video on what Recorded Future is doing with what they call a "Temporal Analytics Engine" to analyze open source information on the web as well as structured data sources.

This goes way beyond search as we do it today--this is a look into the future of iterative search, link analysis, information visualization (both temporally and spatially), and predictive analytics.

The video shows an example of how the technology can be used in counterterrorism efforts to "connect the dots" on the bad guys and protect our nation and its people.

Envision many other applications across government (including law enforcement), business, academia...check it out.


Share/Save/Bookmark

July 31, 2010

Listening to Each Other to Succeed as a Team

There is an oft-cited best practice for conflict resolution called the speaker-listener technique—in which the speaker explains their position and the listener repeats back to the speaker what he heard him say. Then the speaker and listener switch roles.

After both sides have had a chance to express themselves, and the other side has repeated what they heard, both parties are ready to resolve their differences with greater understanding of each other.

The Wall Street Journal, 27 July 2010, in an article called “Fighting Happily Ever After” promotes the speaker-listener technique for improving couples communications and making happier, longer-lasting relationships.

I believe that the speaker-listener technique works not only because it improves the actual information flow and understanding between people, but also because it improves the perception that people have towards each other—from being adversarial to being collaborative.

In the sheer act of reaching out to others through genuine listening and understanding, we establish the trust of the other person that we want to work toward a win-win solution, as opposed to a clobber the other guy with what you want to do, and go home victorious.

In contrast, think of how many times people don’t really talk with each other, but rather at each other. When this occurs, there is very little true interaction of the parties—instead it is a dump by one on the other. This is particularly of concern to an organization when the speaker is in a position of authority and the listener has legitimate concerns that don’t get heard or taken seriously.

For example, when the boss (as speaker) “orders” his/her employees to action instead of engaging and discussing with them, the employees (as listener) may never really understand why they are being asked to perform as told (what the plan is) or even permitted to discuss how best they can proceed (what the governance is).

Here, there is no real two-way engagement. Rather, workers are related to by their superiors as automatons or chess pieces rather than as true value-add people to the mission/organization.

In the end, it is not very fulfilling for either party—more than that when it comes to architecture, governance, and execution, we frequently end up with lousy plans, decisions, and poorly performing investments.

Instead, think about the potential when employers and employees work together as a team to solve problems. With leaders facilitating strategic discussions and engaging with their staffs in open dialogue to innovate and seeking everyone’s input, ideas, reactions. Here employees not only know the plan and understand it, but are part of its development. Further, people are not just told what to do, but they can suggest “from the front lines” what needs to be done and work with others from a governance model on where this fits in the larger organizational context.

Speaking—listening—and understating each other is the essence of good conflict management and of treating people with decency and respect. Moreover, it is not just for couple relationship building, but also for developing strong organizational bonds and successfully planning and execution.

To me, creating a framework for conflict resolution and improved communication is an important part of what good enterprise architecture and IT governance is all about in the organization. Yet we don’t often talk about these human factors in technology settings. Rather the focus is on the end state, the tool, the more impersonal technical aspects of IT implementation and compliance.

Good architecture and governance processes help to remedy this a bit:

With architecture—we work together to articulate a strategic roadmap for the organization; this provides the goals, objectives, initiatives, and milestones that we work towards in concert.

With governance—we listen to each other and understand new requirements, their strategic alignment, return on investment, and the portfolio management of them. We listen, we discuss, we understand, and we make IT investment decisions accordingly.

Nevertheless, at this time the focus in IT is still heavily weighted toward operations. Research on IT employee morale shows that we need to better incorporate and mature our human capital management practices. We need to improve how we speak with, listen to and build understanding of others not only because that is the right thing to do, but because that will enable us to achieve better end results.


Share/Save/Bookmark

July 28, 2010

Newer Isn’t Always Better

I love new technology as much or more than the next guy, but...

Last month, I came across an article in USA Today called “Army Ditches Velcro For Buttons,” which chronicles how after deploying high-tech, “space-age Velcro” in uniforms in 2004, the Army found that the good old button worked better on keeping pants packets closed. The Army is now substituting three buttons for Velcro on the cargo pockets of its pants to keep them from opening up and spilling out.

To me, the point is not whether we use new, newer, or even the newest technology out there (like space-age Velcro), but whether we are right-fitting the technology to our organization (in this case, the button met the needs of the soldier better).

I’m sure you may have noticed, as have I that certain technology enthusiasts like, want and literally crave the “latest and greatest” technology gizmos and gadgets, whether they fully work yet or not.

These enthusiasts are often the first to download a new (still buggy) app and the ones that line up (often bringing their own lounge chairs) the night before a new iPhone or other “hot” consumer technology product goes to market.

Similar, and perhaps well-intentioned, enthusiasm for new technology can end up in pushing new technologies before the organization is ready for them (in terms of maturity, adoption, change, priorities, etc.). In other cases, newer technologies may be launched even before the “ink is dried” on IT purchases already made (i.e. the technologies bought are not yet implemented and there has been no return on investment achieved!).

At the extreme, organizations may find themselves with proverbial IT storage closets full of still shrink-wrapped boxes of software and crates of unopened IT hardware and still not be deterred from making another purchase and another and another…

I remember in graduate school learning about shopaholics and those so addicted to consumerism that their behavior bordered on the abnormal according to the Bible of psychiatry, the Diagnostic Statistical Manual (DSM).

This behavior is in sharp contrast with organizations that are disciplined with technology and strong stewards with their organization’s investment dollars—they tend to follow a well-thought-out plan and a structured governance process to ensure that money is well-spent on IT—i.e. it is requirements-driven, strategically aligned, ROI-based, and technologically compliant with the architecture.

In such organizations, responsibility and accountability for IT investments go hand-in-hand, so that success is not measured by whether new technologies get identified and investments “go through,” but rather by how beneficial a technology is for the end-user in doing their jobs and how quickly it actually gets successfully implemented.

This latter organization model is the more mature one and the one that we need to emulate in terms of their architecture and governance. Like the Army, these organizations will chose the old fashioned button over the newer Velcro when it suits the soldier better and will even come out saving 96 cents per uniform.

New technology is great--the key is to be flexible and strategic about when it is needed and when it is not.


Share/Save/Bookmark