Rules For Radical CIOs: Part 2 - InformationWeek
IT Leadership // Team Building & Staffing
05:32 PM
Connect Directly
Threat Intelligence Overload?
Aug 23, 2017
A wide range of threat intelligence feeds and services have cropped up keep IT organizations up to ...Read More>>

Rules For Radical CIOs: Part 2

How do Saul Alinsky's rules for activists apply to tech executives? Let us keep counting the ways.

Pick a fire large and substantive enough that you can weave it thematically through your entire transformation narrative. And then tell that story every chance you get.

Rule 9: The threat is usually more terrifying than the thing itself.

This rule only works once you've established credibility. The best example is Alinsky's O'Hare Airport stunt. He leaked word that mobs of activists were going to tie up the washrooms at O'Hare Airport, and Chicago quickly agreed to his terms.

In technology, this rule is demonstrated at the industry level by the artful leak. Take, for example, rumors about who AppGooBook is thinking about buying. Those leaks are mostly intentional, so ask yourself: Why are they leaking it? The media savvy understand that the messaging around these investments is meant to 1) put Goliath's large competitors on notice and, sadly 2) issue the subtlest of cease-and-desist letters to similar startups/targets. Regardless of their tenacity, the Davids will be forced into existential heartburn -- "If that Goliath is getting into our space then our days are numbered."

If you're skeptical about that last point, ask yourself this question: If most acquisitions are really talent plays, why wouldn't Mr. Moneybags buy up multiple startups in the same space? There's certainly plenty of talent. And Mr. Moneybags has plenty of money.

The artful leak at the industry level creates a reaction among competitors similar to Chicago's reaction to Alinksy's airport stunt. The threat of the entrant is enough to get everyone spinning, wasting dollars and effort on countermeasures to an illusory menace.

There's also an alternate, more populist application of this rule if you're not in a C-level seat. If you're a change agent in IT and can get past the agitating and actually deliver, repeatedly, you can leverage that credibility to force the internal obstructionists onto your next bandwagon. Why? Because corporate white blood cells are usually career climbers, and nothing is more terrifying to them than not being on a journey that's guaranteed to get to its destination.

So when there's credibility behind the message "we're doing this with or without you," the pathogen wins.

Rule 10: Develop operations that will maintain a constant pressure on your competitors.

Some folks have a hard time differentiating between Rules 8 and 10. Rule 8 is about having several models of cars and switching between them frequently. Rule 10 is about investing in an assembly line.

Picking up where we left off in Rule 1, if you're the legacy application owner who's fixing your broken windows, you simply can't stop after one proof of concept (POC). Your management and/or business stakeholders will write that one act off as a fluke. You must deliver POCs regularly.

Two questions always pop up: Where will I find the time and who will pay for it? Both are great examples of you sabotaging you.

Let me put on my Tony Robbins mask for a sec. (Don't be afraid of the horse teeth.) You can always spin another plate! Building an assembly line of and for POCs advances your agenda, so it should trump at least a dozen deliverables now on your plate.

As for who pays for it, who pays for your daily hour of checking emails? The daily hour of browsing? The hour of nothing between two meetings? The half day when a fire erupts in production?

We all have the Google 20% time, but most of us just flush it down the business-as-usual toilet.

Oh, and a quick note on the Google 20%. It's spin. It didn't start out as some premeditated commitment to innovation. It's a recognition by management that everyone needs a break from his or her day job. And if you're not encouraged to spend that time on something constructive and to the benefit of your employer, you'll spend it browsing.

2 of 3
Comment  | 
Print  | 
More Insights
Oldest First  |  Newest First  |  Threaded View
<<   <   Page 2 / 2
User Rank: Strategist
6/20/2013 | 1:58:45 PM
re: Rules For Radical CIOs: Part 2
Not a single person in the country is against better health and happiness for all. But at $16 trillion in debt, I would expect that I would be experiencing nirvana every day. But I am not and we all just read how Coverlet is not.
I am no economist, but $16 trillion seems like a lot of money. That debt will be paid back eventually with worthless inflated future dollars. If I understand the Tea partiers beef correctly, it is that they don't believe the government is up to the challenge of refining the system. And eventually the weight of the debt will blow it up whether we want it to or not.
<<   <   Page 2 / 2
How Enterprises Are Attacking the IT Security Enterprise
How Enterprises Are Attacking the IT Security Enterprise
To learn more about what organizations are doing to tackle attacks and threats we surveyed a group of 300 IT and infosec professionals to find out what their biggest IT security challenges are and what they're doing to defend against today's threats. Download the report to see what they're saying.
Register for InformationWeek Newsletters
White Papers
Current Issue
IT Strategies to Conquer the Cloud
Chances are your organization is adopting cloud computing in one way or another -- or in multiple ways. Understanding the skills you need and how cloud affects IT operations and networking will help you adapt.
Twitter Feed
Sponsored Live Streaming Video
Everything You've Been Told About Mobility Is Wrong
Attend this video symposium with Sean Wisdom, Global Director of Mobility Solutions, and learn about how you can harness powerful new products to mobilize your business potential.
Flash Poll