Staying the Course as a CIO. Jonathan Mitchell
Чтение книги онлайн.

Читать онлайн книгу Staying the Course as a CIO - Jonathan Mitchell страница 3

СКАЧАТЬ teenagers with a conscience. It was never like that in Bela Lugosi's day.

      “We don't vanquish vampires so don't call us stakeholders!”

Jackie Sadek

So while a few of our stakeholders may be brandishing wooden sticks, more often their weapon of choice is the pointed word. And you will find plenty of those out there – both words and people. There are of course, a wide range of different stakeholders who are affected by IT. In fact, pretty much everyone in the company, together with all your suppliers and customers, receive the delicate ministrations of your organisation in some form or other. Figure 1.1 shows some of the major stakeholders you will encounter. The strong arrows show the strong connections while the dotted arrows represent a looser stakeholder engagement. There may be some corporate outward-looking IT functions which have very intimate relations with customers and suppliers but for most of us, it is the Board of Directors and the leadership of the company, our beloved middle managers and the common or garden users who will demand most of the management time of an IT leader. We should look at each in turn.

Figure 1.1 The CIO's Major Stakeholders

      Because They're Worth It?

      Let us look first at our user community, or to use a better term – the workers. They are the most voluminous group of your stakeholders and they are comprised of real people doing real jobs. Workers are really cool people. They actually get to do stuff other than emails and meetings. On occasions, what they do get up to can even be useful to the company. It doesn't matter whether they are on the floor of a factory bending metal, or in an office creating what I believe is known these days as “intellectual property”; these people are precious and you have to look after them as best as you can. However, as far as a voice in IT is concerned, most of these folks will strictly be in the silent majority category.

      “Every day I get up and look through the Forbes list of the richest people in America. If I'm not there, I go to work.”

Robert Orben

      That said, the needs of the many are simple and straightforward – at least from their perspective. When I've spoken to computer users over the years about their requirements, the answers they give me are fairly consistent. I'm sure it will be the same for you. These good folk will want the latest models of phones and tablet computers and they will want to change them as frequently as they change their socks. They believe they cannot live without the most powerful laptops and personal computers known to man. They will also want to store infinite amounts of email in their inboxes and send and receive massive PowerPoint files that run into terrorbytes. They will demand full and unfettered access to the Internet, so that they can use whatever social media, home banking or any other e-commerce sites take their fancy. Some will want you to fund small pet projects because they naively believe that technology will make their working lives easier. Finally, everyone wants a helpdesk that is instantly answered by a beautiful, courteous person who has bucket loads of empathy to hand. Some may even want these people to solve their problems.

      While such requests are easy to understand, responding to them sensitively can be tricky. Many IT leaders faced with the enormity of the task just throw up their hands and subscribe to the pleasing mantra “The only good user is a dead user”. The security needs of your network will of course, horribly constrain the things that you can do for them, but it is pointless explaining this to anyone. They won't understand and they won't care. Why should they? Your users will just see a computer that's much the same as the one they have at home, except that this machine is probably older and of course they can't change their wallpaper or replace the arrow cursor with a banana that peels itself. When people come to work, they will demand and expect all the freedoms they enjoy on their virus-laden, spyware-riddled, zombie-bot, home computers, smartphones and tablets. However, despite all the corporate problems, allowing “reasonable personal use” on company computers is a policy you should strongly consider championing. It is a winning (if sometimes painful) strategy. It is particularly helpful if you want to promote computer literacy amongst your workforce. There are of course always unexpected and sometimes unpleasant things that can happen when you give human beings a bit of freedom. Kings worked this out pretty early on, which is why they were so fond of the operating system we know as Feudalism. Basically, they got to be the Lords while the rest of us were “vassals” and had to do what we were told (Abdy, 2012). Back here in the twenty-first century corporate life is slightly more egalitarian. This new freedom allows any miscreants to get up to amazing things. I have seen some horror stories that would make Mary Shelley blush.

      Some years ago I recall that we lost a complete night's worth of backups in a data centre I was managing. This was because a computer operator spent his entire shift downloading gigabytes of video files of his favourite soccer team – it was Manchester United as it turns out. The network was so overloaded that all the applications eventually timed themselves out and backed out of the rather important job of backing things up. Imagine people running all around the computer room like headless chickens. Meanwhile the operator in question, oblivious to the chaos he had caused, quietly sat in the corner of the office repeatedly watching videos of his favourite stars with spray tans and hair transplants kicking a ball and waving garish trophies around.

      Then there was the time when we found an employee who clearly didn't like his job. He spent every single minute of every working day surfing the Internet. He usually started five minutes after he had clocked in and continued until he stopped for lunch. Forty-five minutes later he was at it again, only to finish five minutes before he clocked out. This went on for weeks on end. When we looked at the usage logs, we could even calculate how long it took for cups of coffee to pass through his system. Before you think “too much information”, let me reassure you that we could work it out quite simply from the breaks he had taken in between surfing sessions. It was about an hour and half if you are interested. The incandescent HR Director wanted to fire the individual. He was not amused by my suggestion that we put the employee's name forward for some kind of Guinness Book of World Records nomination. Clearly supervision and motivation had failed this person in abundance in his day job, but I certainly couldn't have surfed with anything like the dedication he showed. The individual's manager was the one who ended up with the biggest rocket however. He was told in no uncertain terms that from now on he was expected to harness the dogged conscientiousness of his loyal employees.

      My all-time favourite “user howler of the century” story however, happened shortly after the 9/11 terrorist attack in New York. A Middle East-based employee, appalled by what he had seen, decided to send an email to every other employee in the company. He wanted to tell everyone that people in his part of the world condemned the terrorist action. His plan was to express solidarity with his colleagues in North and South America, Europe, Asia, Africa, Australasia and even a polar station in Antarctica. Normal controls within the network meant that our intrepid hero was not able to simply send an email to the 105,000 employees on the payroll at that time. Bulk emailing was both discouraged and curtailed by company policy. Nevertheless, undeterred by such a flimsy set of obstacles, our hero spent many, many hours and probably several days putting together a dazzling number of distribution lists. The size of each was carefully crafted so that it slipped just under the “number of recipients” restrictions that the computer administrators had put in place. The results were spectacular. Sending off his emails in batches, the disaster unfolded with delicious slowness. First, local servers became clogged, after which regional servers started to choke. Within a couple of hours network diagrams at Network High Command began to glow with angry tones of red. The “Clark Kents” at Network crisis control struggled into nearby telephone boxes to don their “Superman” outfits. In the command centre confused reports suggested that a virulent virus was spreading uncontrollably across the globe. Blizzards of sandy emails marched across North Africa scattering bloated, overfilled, groaning mailboxes before them. Even Field Marshal Rommel and his Afrika Korps would have been impressed as first Egypt and then Tunisia ground to a halt. It took several more hours of headless chicken СКАЧАТЬ