by clicking on the page. A slider will appear, allowing you to adjust your zoom level. Return to the original size by clicking on the page again.
the page around when zoomed in by dragging it.
the zoom using the slider on the top right.
by clicking on the zoomed-in page.
by entering text in the search field and click on "In This Issue" or "All Issues" to search the current issue or the archive of back issues respectively.
by clicking on thumbnails to select pages, and then press the print button.
this publication and page.
displays a table of sections with thumbnails and descriptions.
displays thumbnails of every page in the issue. Click on a page to jump.
allows you to browse through every available issue.
FCW : May 15, 2015
DAVID WENNERGREN is senior vice president of technology at the Professional Services Council. Commentary | DAVID WENNERGREN In his book “Polarity Management: Identifying and Managing Unsolv- able Problems,” Barry Johnson makes the case that although we are trained from a young age to identify and solve problems, many of the challenges we face don’t reflect a single problem to solve. Far more often, the true challenge is a polarity of two things occurring simultaneously. By limiting our view to a single problem to solve, we miss the impact of the related issue that we’re not addressing and end up making things worse, not better. Examples of polarities are all around us, and they include cost/ quality, efficiency/effectiveness and change/stability. Technology leaders face a number of polarities masquer- ading as problems, and failure to grasp the importance of managing both ongoing issues will inevitably delay or destroy the best-laid trans- formation plans. Information security profession- als could minimize risk by walling off their organizations from the outside world. When taken to the extreme, however, that is a sure path to a self-inflicted denial-of- service attack. Bad things don’t get in, but necessary information doesn’t move either. Similarly, if your job is to advance information sharing, your best efforts might fail to recognize that you’re under attack and your intel- lectual capital is being served up to adversaries and competitors. In a world where users demand access from any device, anywhere, a successful cyber strategy must embrace both information sharing and information security. By shifting our focus (and language) to “secure information sharing,” we will raise the bar on security while encourag- ing, rather than thwarting, the flow of knowledge. Another important polarity is determining the balance between work done at the enterprise and local levels. Way back in the last millennium when PalmPilots and Deep Blue roamed the earth, we lived in a world of local-area net- works and systems. The advantages of doing things locally included a manageable scale, speed, agility and proximity to your customer. The downside was that we wasted time and money developing duplicative solutions that were not interoper- able and that created electronic bar- riers to sharing information. With the advent of the Internet Age, we discovered that we could eliminate the expense of duplicate, disparate solutions. However, the pendulum has perhaps swung too far toward doing things at the enter- prise level, resulting in more than a few major system implementations that, due to their immense size, failed to delight anyone by trying to appease everyone. Agile methodology has dem- onstrated the power of breaking work into modular increments, and locally developed apps that meet local needs are examples of bigger not always being better. However, if managing the scope of an effort becomes the problem to solve, your preference will always be for smaller solutions, blinding you to the other aspect of the polarity. Sometimes “evolutionary” change through small engagements is the right path to build momentum and gain support. At other times, “revolutionary” change is needed. If the Defense Department had not demanded a single Common Access Card solution for all 3.5 million of its people, DOD officials would be years behind their current state in addressing identity management, information security, e-business and physical access issues. We live in a world that demands choice in the applications and de- vices we use while deriving great value from consolidated offerings such as enterprise services and cloud computing. The art is to understand that both enterprise and local solu- tions have their place and to ensure that early in your work, you decide the optimal balance to effectively manage the polarity you face. n Maintaining the right balance Think you can succeed by zeroing in on a single problem? Sorry, but life is not that simple. By shifting our focus to “secure information sharing,” we will raise the bar on security while encouraging the flow of knowledge. May 15, 2015 FCW.COM 11 0515fcw_011.indd 11 4/20/15 1:59 PM
April 30, 2015
May 30, 2015