Systems and Network!

Naveed Babar an Independent IT Expert and Researcher. I received my Masters Degree an IT. I live in Peshawar, Khyber Pakhtunkhwa, Pakistan. Buzzwords in my world include: Info tech, Systems, Networks, public/private identity, context, youth culture, social network sites, social media. I use this blog to express random thoughts about whatever I'm thinking...

-->

Search This Blog

Sunday, September 5, 2010

Technology Rocks





















Friday, September 3, 2010

Effectively Managing Team Conflict

Dealing with Conflict
Successful managers can effectively manage conflict.This ability is considered a core competency and is
required of managers who want to grow and advance.Unfortunately,it is also one of the most difficult skills a
manager can develop.
The objective of this white paper is to illustrate team conflict symptoms and causes;to determine how to
address team conflict using specific tools, skills, and processes;and to improve the ability of managers to build
teams that can deal effectively with both healthy and unhealthy conflict.
This paper is written from the point of view of a manager ,supervisor,or team leader.Although written from
this perspective,team members or individual contributors can certainly benefit from reading this paper as well.
When dealing with conflict,there are four major questions that should be asked:
1.What are the symptoms of team conflict?
2.What causes team conflict?
3.How do I address team conflict?
4.What tools and aids can I use to help my team deal with conflict quickly and effectively?

1.What Are the Symptoms of Team Conflict?
Conflict can be defined as a serious disagreement over needs or goals.For the purpose of this paper,team con-
flict is defined as serious disagreements over needs or goals among team members.Conflict behaviors,or
symptoms of conflict,include:
• Not completing work on-time or to quality goals• Gossip
• Not returning phone calls or e-mails• Passive/aggressive behavior
• Not responding to requests for information • Hostility
• Hoarding information that should be shared• Complaining
• Finger pointing• Verbal abuse
• Not attending required meetings • Filing grievances or lawsuits
• Absenteeism• Physical violence
The last two items,filing grievances or lawsuits and physical violence,require specialized and/or legal help
beyond the scope of this paper.
Each behavior,by itself,does not necessarily indicate conflict.People don’t always complete work on time or
answer all phone calls.Sometime they miss meetings.These individual behaviors might be acceptable—unless
a behavior is taken to an extreme and causes severe or irreparable damage.
An extreme example might be poor performance,including not meeting work goals over
a period of time that has an impact on team performance.Another example is missed deadlines caused
by prolonged absenteeism or just not getting work
done.Either example can become severe or cause irreparable damage if not corrected.Either of these behav-
iors requires intervention,or at least an investigation.Let’s look at two scenarios.

In Scenario A,Fred is the lead hardware engineer in charge of the architecture for a new computer system.In
the past,Fred’s work was good to excellent,with the latter being the norm for the past few years.Fred is
someone we could count on and delegate to,a responsible and responsive team member.Now Fred misses
work,some of his deliverables are late,and his work is not up to the quality of previous assignments.In meet-
ings,he becomes hostile and argumentative.When a junior member of the team asks Fred for help he accuses
the junior member of being lazy and not able to do his job.The junior member tells Fred that the whole team
knows that Fred is coasting on past achievements and should be fired!

In Scenario B,a project team is focused on a new application that has to be rolled out within the next three
months.Some team members have been late with deliverables and team meetings are negative and some-
times degrade to shouting matches among members.Project features and functions that should have been
included have been omitted or missed.In addition,team members do not always attend meetings or report on
status,and it is very clear that cliques have formed with agendas that are not in the best interests of the team.
Although we do not have a lot of information,we can already determine that we need to find out what’s
going on with Fred and his team.If we do not deal with the situation it can become severe.In the second sce-
nario, we can see that project team members are not working well together ,power struggles are occurring,
milestones and deliverables are not being met,and productivity is declining.We can see multiple symptoms of
team conflict in each case,with more advanced symptoms in the second scenario.Neither situation will resolve
itself and so requires intervention before serious damage occurs to the teams and projects.
To summarize, the best way to identify the symptoms of team conflict is to be aware of the kinds of behaviors
that lead to conflict.The list above is a good list to use.When we identify extreme behaviors or multiple symp-
toms,we know we need to investigate.We also know we do not have a high-performance team.
What is a high-performance team? It’s a group of people who have complementary skills,who understand
roles and goals,and who are committed to achieving those goals together.An effective team works together
toward mutual goals,using their individual skills and supporting each other.They communicate and share
information.They understand they have a “group identity”and are committed to each other,reveling in praise
and recognition and sharing the hard times. They respect each other . They have a leader who can direct,sup-
port, be hands-on or off as needed,and establishes and models how the team will work together.Because of
these characteristics and their leader,they will be able to differ at times,have conflict and get beyond it,and
maybe even use conflict to expand perspectives and find better solutions than they would have otherwise.
A high-performance team:
• Works together to achieve mutual goals
• Recognizes that each member is accountable,a team player,and committed to achieving team goals
• Communicates effectively with each other
• Has a balance of team members with the skills and abilities to meet mutual goals
• Shares the joy of achievement and the pain of not meeting goals
• Shares information, helps each other ,and recognizes that the success of the group is dependent upon
each individual
• Is able to deal with conflict
• Understands roles and responsibilities and respects each other
• Marches to the same tune or is aligned with goals and commitments
By definition then,a non-productive team,or a team in conflict,does not have these traits.When conflict is
not handled,it becomes poisonous.It reduces productivity,causes missed deadlines and poor quality,can
impact the health of team members,and causes turnover.However,when team conflict is resolved,team mem-
bers grow individually and as a team.They are better able to deal with conflict.

2.What Causes Team Conflict?
Conflict is a serious disagreement over needs or goals.Said another way,conflict occurs because of an inability
to address needs or goals,or because goals are unclear,unacceptable,unrealistic,or are in opposition to the
parties involved.
Together,we could create a long list of things that cause team conflict.Here’s a good start.
• Poor or no communication
• Lack of problem solving skills or getting to “root cause”
• Lack of clarity in purpose,goals,objectives,team and individual roles
• Uncertainty about or lack of resources and sources for help and support
• Poor time management
• Lack of leadership and management
• Team members bored,not challenged,not really interested
• Lack of skills and abilities in team members
• Personality conflicts
• Personal problems
• Turnover
Some of these can be seen as both cause and result of conflict.How do these things happen? We can see that
some of these causes of conflict can be dealt with directly through management and leadership.Others chal-
lenge us in different ways.
Being able to resolve conflict effectively is a critical team skill.The manager,as leader,holds the key to helping
team members resolve conflict and develop trust in each other.Without trust team members will not bond.If
they do not trust each other they will not be able to deal with conflict.Conflict resolution is one of the key fac-
tors associated with committed and productive teams.So what causes it in the first place?

3. How Do I Address Team Conflict?
As a manager , what do I do to address team conflict? We’ve listed
causes;now let’s generate a plan to deal with the causes. Here are the steps we’ll use:
A.Define the problem
B.Gather data
C.Analyze the data
D. Choose the best solution
E. Implement the solution and continue to refine it

A.Define the Problem
Einstein said you cannot solve a problem until you define it.Defining a problem is frequently the hardest part
of the solution,and most of us jump into solving the problem rather than defining the problem.However,the
process of defining the problem also contains the seeds of the solution.
The first thing we want to do to help team members resolve conflict is to go through the process of defining
the problem together.Once we’ve done that,and it’s not always easy,we can work on a solution.Problem
definition may change or become refined during data-gathering,and may be further refined during the prob-
lem-solving process itself.That’s OK.
One way to work on a problem statement is to write it down multiple times in different ways and from differ-
ent perspectives.Just this exercise is beneficial for a team because it allows for different perspectives.A key to
success during team interactions is first to establish how the team will operate together.These might be con-
sidered “rules of engagement”or ROE.ROE might include statements about professional conduct,taking
turns,and not interrupting.If we worked as a team to describe the problems in Scenario B above,we might
come up with the following statements:
• The project team is missing assignments
• Team meetings are non-productive
• Some team members are not doing their jobs
• Some people are always late to meetings
• Team leadership is not strong enough
• The team is not working together effectively
When we allow ourselves to look at the problem from different perspectives and through different statements,
we can begin to agree on which statement most reflects the real problem.In Scenario B,we see that each of
the statements describes a part of the problem.We might agree that the last one is a good general description
of what’s going on. Each of the other statements helps us to break down the problem into more manageable
chunks for work assignments.We’ve used a good process for problem definition,and now we have a problem
statement with sub-headings.We have used a good process for problem definition and are more equipped to
develop a solution.
The team is not working together effectively (problem statement)
• The project team is missing assignments.(sub-headings)
• Team meetings are non-productive.
• Some team members are not doing their jobs.
• Some people are always late to meetings.
• Team leadership is not strong enough

B.Gather Data 
The second step to addressing team conflict is to gather data on what is actually occurring. This means collect-
ing facts that can be substantiated,not hearsay or opinions.The intent is to gather facts that are actual,
observable,and measurable.It also means observing first-hand through meetings,teleconferencing,or video
conferencing.We need to know about individual performances,who’s meeting deadlines and goals,who works
independently,who needs a lot of “face”time,who comes up with good ideas,who initiates,who takes on
extra work or goes that extra mile,who’s inside or outside of the group,who lunches together,and who are
our informal leaders.We can see that this data- gathering is the manager’s job and requires discretion.
Data gathering means gathering facts that can be substantiated and proven.Hearsay and opinions are just that and
cannot be used.Our intent is to gather facts,which are actual observable and measurable behavior.
Let’s return to our project team scenario,Scenario B,and the problem statement with sub-headings.During
data gathering,we may uncover other symptoms or causes of conflict.In turn,these may require us to refine
or re-define our problem statement.Having to refine or change a problem statement is not a negative.It just
means that our understanding of the situation has increased,and this new knowledge may require us to
adjust our problem statement.That’s okay.
Another part of data gathering is to review what I,as manager,have been doing.How do I communicate with
my team? How do they communicate with each other? Are team members clear on roles and responsibilities?
Have I been providing regular performance feedback to them? Have I been visible,available,and supportive?
Do I “know”my employees? Do I have a good understanding of individual job roles,skills,experience,and
what motivates each employee?
This is hard to look at,but I have to do it as part of understanding what’s wrong and how to fix it.I may not
really know how to do some of these things.I may need to talk with my boss or a good mentor.Part of the
solution may be my plan to develop and augment my skills.It’s rare that team conflict is associated only with
team members.We as managers have to be confident and objective enough to look at ourselves as part of the
problem and part of the solution.

C.Analyze the Data and Diagnose
We have now defined the problem, and we have gathered the facts.Before we begin to analyze the data,let’s
be sure that everything we’ve gathered so far makes sense.Do we have observable and verifiable facts? Are
we clear about symptoms and potential causes? Have we separated management and employee causes and
issues? If so,we are ready to analyze.
Analyzing the data means we can diagnose what is going on with the team itself,and determine the role the man-
ager is playing.Let’s assume we’ve completed a self-assessment and know what we,as manager,have to do to
help solve the problem. To diagnose team dynamics and performance, let’s use this list to stimulate our thinking.
Poor or no communications:
• What kind of communications is occurring?
• Is it effective or non-productive?
• Have I established a style and/or methodology for communications to ensure that everyone on the team
is updated on a regular basis? Do I have a communications plan?
• Do I model good communications when I work with the team or with individuals,(i.e.,do I listen and
communicate effectively)?
• Do I,or my team,need help with communications? What kind of help?
Lack of problem-solving skills,or getting to the “root cause”:
• How do we approach problems and issues?
• Do we approach them in a logical way?
• Do we capture data as we problem-solve or is it a haphazard,uncoordinated session that does not
resolve issues and does not seek input from all team members?
• Do we need to change how we try to solve problems?
• Do we really address root cause or do we deal with symptoms?

Lack of clarity in purpose,goals,objectives,team and individual roles:
• Do all team members understand their individual roles and the role of each team member?
• Does each member of the team understand his or her roles and goals (what they were hired to do and
tasked to accomplish)?
• Do team members understand how individual roles and goals support group goals?
• Do they understand how the group goals roll up to support the larger group’s goals and all the way up
to support Corporate group goals?
Uncertainty about or lack of resources and sources for help and support:
• Do team members each understand their strengths and what they contribute to the team?
• Are they clear about where to go for help and support,which involves clarifying team roles regarding
special skills and helping each other?
• Are they committed to helping each other within the scope of their responsibilities,(i.e.,NOT actually
doing the work of the other person but providing assistance or guidance)?
• Do team members rely on me as the manager to ensure they have the resources they need to meet indi-
vidual and team goals?
Poor time management:
• Are team members usually able to meet goals and deadlines?
• Do they have time management skills or are they always late or always behind?
• Are they clear about what kind of time management is expected?
• What kind of mentoring or guidance do I as a manager provide to individuals to ensure they meet
goals?
• What could help them to improve their time management skills?
Lack of leadership and management:
• As a manager , have I been clear regarding my expectations of individuals and the team?
• Do I give feedback regularly that helps them to understand how they’re meeting my expectations?
• Do I provide corrective guidance when it’s necessary?
• Do I support them in public and remonstrate in private?
• Do I model the kind of behavior I expect from my team?
Team members bored,not challenged,not really interested:
• Does each team member have a career plan?
• Can I detect a lack of interest or commitment?
• Where is boredom or lack of interest or commitment coming from?
• Am I,as manager,sufficiently aware of individual career plans and performance to determine if an indi-
vidual needs a change,a challenge,or corrective action?
• Do I delegate effectively?
• How am I motivating my team?
Lack of skills and abilities of team members to meet goals:
• Are team members matched well in their roles?
• Do they have the skills and abilities to perform their assigned tasks?
• Do they need special training and how is this in line with career goals?
• What kind of guidance can I,as manager,provide?

Personality conflicts:
• Are team members able to work effectively with each other?
• Are there any who just cannot get along?
• Do I treat all team members fairly regardless of my own personal feelings about each?
• Have we,as a team,developed a “conflict resolution”process or strategy”that we can understand and
use effectively?
Personal problems:
• Are personal problems interfering with job performance – theirs or mine?
• Am I aware of personal problems of individuals?
• Am I encouraging individuals to go to Human Resources (HR) or to find the help and support they need,
(i.e.,I’m not trying to solve problems outside of my expertise)?
• How am I working with these individuals to get their work done through flexible schedules,reduced
workloads,assistance from others,allowing delays,other approaches,or some combination?
• Am I,as a manager,working with HR to be fair to the individual,to the company,and to my group?
Turnover:
• What is my turnover rate?
• What are the causes of turnover?
• What is the impact of team conflict in causing people to leave?
• Are the causes of turnover beyond my control (i.e.,economic factors,competition,locale,etc.)?
• Are the causes within my control, ie,some of the above factors?
• If some of the above factors are observable in my group,how will I proceed?
As we perform our diagnosis,we develop a more precise understanding of team dynamics.Instead of just say-
ing we have poor communications,we can focus in on details.As we analyze each area,we can see two
things: further problem definition, and the beginnings of our plan to fix things.As managers,we all have our
own skills and abilities and tools we like to use.Use whatever works for you.You might simply ask yourself
these questions and capture your answers.A checklist may be appropriate,or a diagram,or flow chart.Your
framework or outline for your plan will depend upon you as an individual and your experience as a manager .
Those factors also will determine the point when you involve your team members.

D.Choose the Best Solution
As we gather and analyze our data,we have begun to separate it into discrete areas such as communications,
turnover,etc.We are getting down to “root causes”versus symptoms.We are really defining what’s wrong.
With answers to questions in each area,we can focus in on distinct areas of the problem.We can work on
solutions and then choose the best solution,or solutions,to implement.We will not have major issues in all
areas. Plus, addressing some areas,such as leadership,role and responsibility clarification,and communica-
tions,will likely improve other areas.
How do we select the best solution? Look at each of the areas again – plus issues you’ve thought of.Consider
what you’ve observed.If necessary,go out and observe some more.Write down your notes on observable
behaviors. Reflect on them. Consider the impact of individual behaviors on team members, on how team mem-
bers talk and work together , and how they interact with each other in meetings.Results will help you to deter-
mine which ones are the best solutions for your team’s particular problems.Talk with your boss or mentor and
reflect together.Let’s face it.We can’t always be right the first time.If we try something and it doesn’t work,
we can perform a “lessons-learned analysis”and try again.

E.Implement the Solution and Continue To Refine It
Through the work we’ve already done,we have the seeds of our “get-well”plan.After we analyze the data
and develop solutions,we select the best solution for our problem areas and begin to construct a plan.This
plan will include actions to address each problem area,and will include a schedule for implementation with
measurements.Work on one or two areas versus trying to fix everything at once.
Let’s look again at Scenario A.In the past Fred has been one of our best performers.Now he is missing work,
missing deadlines,and becoming defensive.We know this is not at all like the Fred we know.Our solution is to
observe and gather facts and set up a meeting with Fred.During this meeting,we need to find out what’s
changed in Fred’s life.Are there issues at home? Is he bored? Are there issues at work? After listening to him
to find out what’s going on,we need to work on a plan to get the work done and make sure he understands
our expectations along with deadlines and measurements.We might meet with him on a regular basis until
the issues are resolved and his performance improves.We also need to observe his impact on the team.If not
corrected,his impact on the team will increase and poison the team.Morale and productivity will decline.The
goal of our intervention with Fred is to support him and improve his performance,while also demonstrating to
the team how we will work with team members on performance issues.Working with Fred demonstrates our
leadership.It tells him and the rest of the team that we are aware of issues,we are available,we hold each
team member accountable,and we will support them toward problem and conflict resolution and performance
improvement.
As we develop our plan and/or begin implementation we may need help.We need to talk with our manager or
to a mentor or someone trustworthy with the appropriate skills, or we could go to a class.We have to look at
our management style and how it’s working.We need to keep our minds open to finding the best solution and
plan for our team.
The process for this is part of the solution.Thinking and considering in an ordered and systematic process is
crucial to defining and solving the problem.Working together to define and correct causes of conflict is the
best solution to resolve team conflict.Are there tools and aids to help teams deal with conflict quickly and
effectively? Yes.In defining the problem,gathering data,analyzing that data,and selecting and implementing
the best solution, we’ve begun to develop a list of tools and skills to use to resolve conflict. Here are other
tools and skills that can help:
• Clearly articulate thoughts and ideas
• Active listening
• Paraphrasing
• Clarify and question effectively
• Give effective feedback
• Think and analyze in a methodical and systematic way
• Set clear , reasonable, achievable objectives
• Identify risks and assumptions
• Build contingencies to counter risks and assumptions
• Stick to facts and issues,not personalities or personal issues
• Take turns
• Develop the ability to work effectively as a team member
• Cross training
• Use of ‘rules of engagement’ where helpful or necessary
• Delegating and mentoring for senior employees
• Time management
• Conflict resolution
How do you,as a manager,help employees to develop these skills and tools? One way is through modeling
the behavior desired.Another is through coaching.Another is to directly state what is required.Still another is
through training.As a manager,we can work with our team to develop a process that is acceptable for conflict
resolution.Below is an example of a simple conflict resolution process.


Conflict Resolution
Step 1

The first step is for individuals to try to resolve the conflict with each other.We might need to perform some coaching first.Or,we may need to listen to each side independently.This will help each individual to sort out their thoughts and feelings before the one-on-one.Being able to resolve conflict with each other helps individ-
uals to learn how to confront each other,clearly state the issue,listen to each other,and work together to find
a mutually acceptable solution.The benefit is that individuals learn a highly critical skill for now and the
future,and become more valuable team members.
Step 2
If the two individuals are not successful with a one-on-one meeting, we may need to intercede. If we have not
already met with each person,we would do that first.Then we would bring the two people together with clear
goals and an expected outcome.There should be rules or guidelines as to how the meeting will be conducted
and how they are expected to behave. This latter step about behavior may not be required in all instances, but
we all know that sometimes we have to be very explicit about what will and will not be tolerated.
Step 3
If Step 2 doesn’t work,or if the conflict involves us as manager,the next step is to involve Human Resources.
Human Resource people generally have excellent skills and/or have contacts with people who specialize in
mediation and conflict resolution for conflict situations requiring this level of expertise.


4.What Tools Can I Use To Help My Team Deal with
Conflict Quickly and Effectively
These tools and may also be helpful and may be used as part of ROE:
• Attack the problem,not the person
• Focus on what can be done,not on what can't be done
• Encourage different points of view and honest dialogue
• Express feelings in a way that does not blame
• Accept ownership appropriately for all or part of the problem
• Listen to understand the other person's point of view before giving your own
• Show respect for the other person's point of view
• Solve the problem while building the relationship
When conflict arises during a team meeting,it is important to address it as soon as possible.If the conflict has
nothing to do with the topic at hand,defer it to a later time.If conflict gets extremely overheated,take a break
and let everyone cool off.

Conclusion
Is it possible to maintain a conflict-free team environment? The simple answer is “no”.Every team has internal
conflicts at some points.However,team conflict is not always negative.It can be destructive,or it can be
healthy and productive.How it’s handled is the key.How a manager leads a team and helps the team to man-
age the conflict can change a negative to a positive,as in our Scenarios A and B.
Sometimes conflict can force teams and managers to look at themselves or issues in a new way,producing
solutions and results far better than originally anticipated.The conflict in this situation can act as a catalyst—
again,based upon how it is handled.Productive conflict occurs when team members are able to disagree and
continue to dialogue.It requires skill and maturity to achieve this,and it can be learned.When conflict is chan-
neled positively the results can produce:
• Alternatives not yet considered
• Better solutions
• A focused and productive team
• Increased ability to deal with conflict
As a manager,there a number of things you can do to enable your team to deal effectively with conflict:
• Use your powers of observation
• Use your Active Listening skills
• Do everything you can to minimize potential conflict, ie, (the “causes of conflict” checklist)
• Establish tools and processes to minimize team conflict (i.e.communications plan,conflict resolution
process,regular meetings,and good communications skills)
• When conflict does occur , deal with it immediately
• Have appropriate team get-togethers to celebrate successes,recognize accomplishments,and reward
achievements
Handle team conflict with skill and confidence.You and your team will achieve your goals and improve your
ability to deal with conflict.







.

Thursday, September 2, 2010

Friendster and Publicly Articulated Social Networking



Many social applications have social networking embedded both implicitly and explicitly in their design. Through features such as Buddylists and Blogrolls, developers and users have recognized the value of social networks.Recently, this implicit networking has evolved into explicit effort as entrepreneurs seek to capitalize on the social networking theory. Although explicit social networking sites have existed for years (SixDegrees.com), recent commercial interest has resulted in the emergence of multiple new sites dedicated to helping people capitalize on their social networks for jobs (Ryze.com, LinkedIn.com), dating (Friendster.com), recommendations and listings (Tribe.net). While all of these sites are valuable in this domain, Friendster’s popularity, press coverage, and diverse usage make it an ideal candidate for studying the value and implications of this phenomenon on the HCI community. In this paper, I present portions of my ethnographic work on Friendster in order to consider the tensions that emerge between the architect and the site’s population. In particular, I emphasize how users have repurposed the technology to present their identity and connect in personally meaningful ways while the architect works to define and regulate acceptable models of use.


REFLEXIVE CONSIDERATIONS

It is important to note that I have been an active participant observer amidst both Friendster users and the social networking software creators. I have tracked Friendster through the media and through the viral discussions on mailing lists, blogs and IRC channels I have organized six focus groups of various relevant social groups and have interviewed or surveyed over 200 users on various aspects of their Friendster experience. Via access to 1/3 of the Profiles, I have analyzed thousands of Profiles and run queries on the visible data. While the vast majority of these accounts are located abroad (predominantly in Asia), the majority of my informants have been in the United States and Canada. Furthermore, the majority of my interviews took place before October 2003, although the site continues to grow and attract new relevant social groups. I have also consulted with or advised many competing companies and I have regularly informed the press of my findings. In studying Friendster, my primary ethnographic goals are to: 1) understand how people negotiate context when presenting themselves; 2) examine how the network structure of a meme spreads and connects people; 3) determine the issues involved in articulating one’s social network as compared to a behavior-driven network.

WHAT IS FRIENDSTER?

Friendster is a website that allows people to explicitly articulate their social network, present themselves through a Profile (interests and demographics), post public Testimonials about one another, and browse a network of people. Friendster is built on the assumption that friends-of-friends are more likely to be good dates than strangers.The site was built to compete with Match.com and other online dating sites, with social networks as an additional feature. While Milgram argues that everyone is connected through a countable number of connections [5], Friendster only allows you to access those within four degrees. Unlike most dating sites, Friendster encourages users to join even if they are not looking for dates, under the assumption that they probably know a wide variety of friends who are looking and, thus, would serve as a meaningful connector and recommender.
Friendster launched its public beta in the fall of 2002. As of early January 2004, the site is still in beta and has amassed over 5 million registered accounts and is still growing. Both mainstream and alternative press have covered the site, yet word of mouth is the dominant entry point for most people. It is important to note that users have a selfish motivation in spreading the meme, as their network grows by doing so.
Friendster’s population is primarily cluster-driven and users often convince their entire friend group to participate. While Friendster users are typically 20-something, educated city dwellers, their social and sexual interests are quite diverse. As such, they bring vastly different intentions and expectations to the site.

THE VALUE OF THE NETWORK

Friendster assumes that users will authentically define their identity via their Profile so as to ensure more meaningful connections. Embedded in this is the assumption that users will see the value in connecting to actual Friends. This is a critical assumption because the desired theoretical results rely on the accuracy of this. Unfortunately, Friendster fails to recognize that publicly articulated social networks and identities are not identical to the private articulation gathered by sociologists. Furthermore, while sociologists have employed various techniques to categorize and weight relationships, people are often unable to do this individually. As shown in Friendster, this architectural difference results in behavior not predicted by the sociological analysis developed on top of observed behavior and protected informants. Relationship indicators in Friendster are binary: Friend or not. When traversing the network, there is no way to determine what metric was used or what the role or weight of the relationship is. While some people are willing to indicate anyone as Friends, and others stick to a conservative definition, most users tend to list anyone who they know and do not actively dislike. This often means that people are indicated as Friends even though the user does not particularly know or trust the person. In some cases, it is necessary to publicly be-Friend someone simply for political reasons. Sometimes, people connect broadly so that they may see a larger percentage of the network. Because of this weakness in the system, the weight of a Friend connection is often devalued because trust cannot be guaranteed. Users publicly recognized this by using the term Friendster in everyday conversation to describe one’s Friends. Overheard conversations might include statements such as “She’s not my friend, but she’s my Friendster” and
“Did you see that Alex is Drew’s Friendster?”
Publicly articulated social networks also disempower the person performing. As the hub of one’s social network, power exists in the structural holes that one maintains [3]. By controlling what information flows between different connections, one is able to maintain a significant role in transactions that occur, and thereby control information flow. This is the value of a headhunter or a businesswoman’s Rolodex. Even at the simplest levels, people are often uncomfortable with certain groups of friends to be able to reach out and connect with others, or for work colleagues to connect with personal friends. By asking users to articulate and collapse their network in a public way, Friendster is also asking them to give up their status as a social connector, or bridge.


PRESENTATION OF SELF

A Friendster Profile consists of five primary elements:

1) demographic information;
2) interest and self-description prose;
3) picture(s);
4) Friend listings;
5) Testimonials.

While providing both the individual’s perspective of self as well as that of their Friends is beneficial, the Profile is still a coarse representation of the individual, which provides a limited and often skewed perspective [2]. The Profile represents how the individual chooses to present their identity at a specific time and with a particular understanding of one’s audience. While the audience and the individual evolve over time, one’s Friendster Profile is usually stuck in time. Friend and Profile information are rarely updated and people only remove Friends when there is an explosive end to the relationship, as opposed to the more common growing apart. Testimonials are only a tribute of the moment and reflect the same type of language one might see in a high school yearbook. Fundamentally, context is missing from what one is presenting. On one hand, an individual is constructing a Profile for a potential date. Yet, simultaneously, one must consider all of the friends, colleagues and other relations who might appear on the site. It can be argued that this means an individual will present a more truthful picture, but having to present oneself consistently across connections from various facets of one’s life is often less about truth
than about social appropriateness [1]. Another argument is that one is simply performing for the public, but in doing so, one obfuscates the quirks that often make one interesting to a potential suitor. Notably, most users fear the presence of two people on Friendster: boss and mother. Teachers also fear the presence of their students. This articulated concern suggests that users are aware that, in everyday activity they present different information depending on the audience. Given the task of creating a Profile, users elect to present themselves based on how they balance the public/private dimension.

FRIENDSTER AS A SITE OF CONNECTION

People use Friendster to connect to others for a variety of reasons. Most users begin surfing Friendster by looking for people that they already know, either currently or in the past. In doing so, it is assumed that there is value in reconnecting with long lost friends. For some, this is not true. One interviewee removed her account on Friendster when her high school boyfriend contacted her – she “didn't want [the] past dredged up.” While these relationships are quite outdated, people often link to these found old Friends, even though they may now have little in common and cannot vouch for one another when friends want to connect. While the initial Friend search is in order to build one’s network, Friendster users regularly search for people out of curiosity. They look up colleagues and other people who exist in their daily lives. Headhunters use the service to track potential employees’ personal lives. Beyond individual connections, groups of people have organized private “elite” clubs and started weekly pub gatherings through Friendster. Anti-Friendster users have connected in rebellion. In one somber situation, a man with a Friendster account passed away in his sleep. His unconnected friends were able to pass on information to one another via the site. Friends of other deceased Friendster users have constructed memorials via the site. Two users capitalized on their social network. Believing in the value of their network, they decided to auction connections on eBay. In their ads, they promised both Friendster and real-life connections to hipsters, artists, musicians, record labels, etc. One was serious, while the other was simply making a point: “The 'self' you're packaging on Friendster is a strictly delimited individual - but when I'm selling my network on ebay, the value is determined by my extended self, defined by its relationships and surfaces rather than content - in other words, the true me, in its full, fragmented, postmodern glory, all the more true the instant a dollar value is placed on it!” Other users have capitalized on the network structure of Friendster. Women advertise their porn sites by attracting potential clientele. One group of users created a network of Fraudster Profiles to deal drugs, using the Bulletin Board to announce “events” – coded cues to indicate the availability of specific drugs. While most users are just using the site for fun, curiosity and to play with their friends, it is important to note that many are using it for its intended purpose: dating. The majority of dating falls into three categories: hookups, direct pestering and familiar strangers. 

Tuesday, August 31, 2010

How to Deal With a Computer Crash

 

Almost everyone has experienced an unfortunately timed computer crash. Maybe you were right in the middle of doing your taxes, or were at the halfway point of finishing that report your boss expects in the morning. But there have been many computer crashes and glitches that have caused far more wide-ranging damage:

--CNN reports that in 2000, the spy computer used by the National Security Agency crashed for a few days, preventing staff access to important information.

--According to the Minneapolis Star Tribune, a 2009 computer failure at U.S. Bancorp denied access to thousands of unemployed people who were attempting to withdraw their money.

-- The London Stock Exchange suffered a blow in trading in September 2008 as a result of a computer crash that lasted a few hours.

--Computers responsible for control and navigation of the International Space Station failed temporarily in 2007.

-- News reports claim that the crash of the Spanair plane that killed 154 people in 2008 was supposedly related to a malware-infected computer.



Reasons for a computer crash
“Sam,” a security engineer who prefers anonymity because of the nature of his job, explains that there are usually two main causes for a computer to freeze or crash: defective computer memory and impending hard disk failure.


“Computer memory is composed of several chips placed together on a stick. If one of those chips on the memory stick goes bad, it could cause a computer to freeze because the operating system is expecting that memory space to be available.

“A hard drive disk is composed of spinning metal plates with a metal arm that reads/writes data to the drive," Sam says. "Since it is mechanical, it is prone to failure. As such, hard disk drive manufacturers have what's called a MTBF (Mean Time Before Failure). Usually, it's in the range of hundreds of thousands of hours, but it's not a guarantee. If the operating system attempts to read/write data to a hard drive that has started to physically fail, it could cause a computer freeze or crash.”

Other reasons for crashes and freezes include clicking on malicious links or attempting to use modern software on an older computer.

According to a help-desk analyst we spoke with, “The most common reason that people's computers have problems is because they try to do 2010 tasks on a 2003 computer. We have a lot of computers that are way past their warranty, and they install programs that were never meant to run on hardware of that age. Once they install and open that program, they also have various other programs running in the background, such as multiple Internet browser windows or Word documents,” she says.

Preventive measures
The primary advice from tech experts is to always save your documents regularly in case sudden disaster strikes. Aside from that obvious but often overlooked step, our tech expert "Sam" outlines a few simple steps that can help deter computer failures and prolong its life:

--Keep your anti-virus subscription up-to-date and download the latest updates.

--Download and install the latest updates for your operating system (Windows or Mac).

-- If a website or email looks suspicious or asks for personal or banking information, do not click any links contained within the email or website.

Using programs like AOL Computer Checkup Premium can also help fix various glitches, make your computer run more smoothly and increase its performance. If you're worried about losing important documents, music or videos, you may wish to consider online-storage solutions like SugarSync -- so even if you do crash, your important data is protected.

What not to do
A few years ago, MSNBC reported a couple of studies that showed many users suffer from “computer rage,” and that some scream or hit their computers when it has crashed or failed. The story even cites a case of a restaurant manager who tossed his laptop in the deep-fryer when it had stopped working.

In the event of a crash, the best thing to do first is reboot. According to our help-desk analyst, this simple step is often overlooked. “Most calls I take start with, ‘Have you restarted the computer?’….This is the easiest (and least painful) troubleshooting step.” If rebooting fails to work and the computer is “dead,” so to speak, your last best hope may be a professional computer technician. With hope, they can diagnose the problem, and if all else has failed, help salvage your data.

Saturday, August 28, 2010

Top risky for web surfing "Turkey and Russia"

AVG study looks at the safest and most dangerous places to surf the Internet

                                                             [Where are the safest and most dangerous places in the world to use the internet? ] 

Where in the World are you most likely to be hit by a malicious computer attack or virus? According to Internet Security company AVG, it’s the Caucasus region, with web surfers in Turkey, Russia, Armenia and Azerbaijan all being the most likely to face threats while online.

At the other end of the scale, some of the world’s safest surfers can be found in Japan and Taiwan, while seven of the 10 safest countries in which to surf the Internet are in Africa. As a continent, South America was ‘safest’, and North America riskiest. Globally your chances of being attacked while online on any given day are 1 in 73.

The data taken from 144 countries, involving over 100 million PCs, enabled AVG to look at the incidence of security threats that its software had to deal with in the last week of July. From these figures, AVG came out with an average for attacks per user per country.
Key results for the last week of July 2010 are as follows:

Turkey leads the league table for risky surfing, with AVG’s software having to step in to protect on average, one in 10 users of the Internet. Web users in Russia (1 in 15 were hit), Armenia (1 in 24), and Azerbaijan (1 in 39) also suffer high rates of attacks.

Other areas where web surfers are disproportionately at risk include Bangladesh (1 in 41), Pakistan (1 in 48) and in SE Asia, Vietnam and Laos (where the chances of facing an attack are both 1 in 42).

What about other major Western countries? The US is at number nine when it comes to the riskiest places to go online (1 in 48) , UK is ranked 31st (1 in 63), Australia 37th (attack ratio = 1 in 75) while German web surfers come in at number 41 (1 in 83).

Sierra Leone had the fewest attacks with on average one in 692 web surfers facing an attack. Niger too fared where just one in 442 surfers on average were attacked, however with low broadband penetration and Internet use in these African countries.

It is because of its high internet use and broadband penetration that Japan, where there is an average of just one in 404 facing an attack, is arguably the safest place to surf the net.

Meanwhile Taiwan (1 in 248 attacked), Argentina (1 in 241 attacked), and France (1 in 224 attacked) all came in the top 20 safe list.
Analyzing the data by continent, your chances of getting attacked while surfing the Web in North America are 1 in 51. In Europe it is 1 in 72, while in Asia (including Asia Pacific) 1 in 102. The safest continents are Africa (1 in 108), and by a long way South America (1 in 164).

While African countries make up seven of the top 10 ‘safe surfing’ list, it’s noteworthy that the chances of being attacked in all South American countries is more than 1 in 100. The ‘riskiest’ country in South America was Peru at 1 in 131, which globally still only ranks 78th out of 142 countries.

According to AVG spokesperson, Roger Thomson, “Our research tells us a lot about the behaviour of web surfers worldwide. Internet users in Turkey, Russia, the Caucasus and South-east Asia for example show disproportionately higher rates of being attacked than the global average of 1 in 73.

“There are a number of reasons for this. Some of it may be down to a tendency to access semi-legal or illegal download sites, while some of it probably is down to being less cautious when it comes to sharing links and files online. Another factor is the popularity of Internet cafes and people generally sharing computers. However, it is safe to say that even in these countries, a minority of users account for a large proportion of attacks.”

“If you look at Japan at the other end of the scale - a country where both Internet use and broadband protection is very high - our software only picked up a web attack for every 403rd user. Our take on this is that Japanese web surfers are generally more aware of safe and risky surfing behaviours.
However, our research should also serve as a wake-up call to people going abroad. If you are travelling without your computer and use a public machine or borrow a friend or colleagues, ensure that when accessing web -based services like email, that you log out and close the browser when you have finished your session.

If you are taking your laptop with you ensure you have backed up your data and removed any sensitive information from your machine.

Finally the key point is that all these web attacks were successfully caught and stopped by ourselves. Even the global average of facing a 1 in 73 attack on any given day does not present great odds if averaged out across a year. Hence the importance of making sure that your computer really does have the right anti-virus software installed.”


Methodology

AVG looked at the number of Internet attacks worldwide for the final week of July 2010, as well as the number of AVG installs per country. From this, AVG was able to work out on average the chances of web surfers being attacked.

This sample was taken in the last week of July. Rankings and order of countries will change over time and is not fixed.
The research involved taking data from over 100 million AVG installations across 144 countries.
For further information



Thursday, August 26, 2010

Information Technology Infrastructure

Information Technology Infrastructure

Thursday, August 19, 2010

Selecting new IT leaders

One of the great privileges and responsibilities of leadership is identifying and training the next generation of managers and leaders. Somewhere in between crisis management, contract negotiations, internal politics, status monitoring and your myriad other tasks, you should spend a few moments considering the future leadership of your organization. Figuring out who has the potential to become a great leader or middle manager of IT is difficult. Given that leadership is one of those things that most of us can identify when it's put before us but find difficult to describe, it often seems impossible to predict an individual's prospects.

There are traits that can be predictors of success. But before we dive into what to look for, let's put to rest a few of the commonly used criteria that haven't yielded stellar results.

Education. Lots of great business leaders have put in time in MBA programs, but even a degree from Harvard or the Kellogg School (my alma mater) doesn't guarantee the right stuff. While important, understanding the mechanics and subtleties of business doesn't necessarily translate into leadership success.

Tech smarts. As believers in meritocracy, we're drawn to the idea that the person who best understands what's going on technically is best qualified to be in charge. Unfortunately, the skills needed in a leadership role are different from technical savvy -- and often don't reside in one person.

Bossiness. The natural desire to be in charge doesn't necessarily predict whether someone will be a good leader in a technical environment. The hierarchical top-down approach tends to be fragile when it comes to creative work. Those with the built-in desire to command frequently run smack into the brick wall of technical staff intelligence and intransigence.

So, which traits are better predictors of who will make great leaders?

Emotional flexibility. We talk a lot about being a good leader, but what about becoming one?

Great leaders start out somewhere else and have to move into leadership roles. Becoming a leader poses transitional challenges that can be met only with emotional flexibility. One of the great challenges for a new manager is to transform his view of himself, to change how he measures himself and his success. Early life and career work is judged by personal productivity. In school, we're judged by the quality and quantity of our papers, tests and quizzes. Young workers are judged by the quality, quantity and speed of task completion. Our self-images become tied to our personal productivity.

Moving into management requires a fundamental shift in how we view ourselves, a shift in the emotions about self and work. Leaders are judged not by their personal productivity but by their effect on the productivity, morale and effectiveness of others. Managers must be able to derive their personal satisfaction from helping others be productive rather than being productive themselves. This is a difficult transformation that's poorly understood and rarely discussed.

The ability to adopt a new self-image is critical to the transition into a successful leadership role.

Comfort with ambiguity. Beyond mastering their emotions, leaders must be able to cope with the chaos and confusion of reality. The world is a complex place filled with facts, provisional facts, lies, opinions and emotions. A large part of the leader's role is to help interpret the turmoil and bring order, sense and meaning to daily work. Successful leaders must transform ambiguity into clarity and create compelling narratives out of complexity.

They also bring a high tolerance for the continuing existence of confusion. They're able to hold contradictory ideas in their heads simultaneously without experiencing undue stress. Strong leaders aren't impervious to new facts and information but are comfortable revising their interpretations to meet changing times.

Ability to communicate. The ability to cope with ambiguity means nothing without the ability to communicate. If leaders and managers deliver value through their effect on others, communication is their primary tool. Whether leaders communicate verbally, in writing or through their actions, their ability to connect with those they lead is of prime importance.

Considering these "softer" skills can help you to ensure a successful future for your organization.

Few Important things you should know about privacy protection and IT

These days, IT bears a tremendous responsibility for safeguarding corporate data and protecting personal privacy information. This overview shows just how entrenched privacy concerns have become in the regular operations of the IT organization.

Personal privacy has become a major public concern. Highly visible data breaches, identity theft, and frauds such as phishing scams have created a huge corporate and consumer burden and threaten trust in Internet and e-commerce services.



Studies have shown that almost half of U.S. residents have "little or no confidence" that adequate steps have been taken to secure their personal data. Compounding this lack of confidence is the increasing sophistication of online crime schemes. It's hard to tell who is legitimate, and a growing number of users are becoming victims of the Internet. Let's look at some privacy concerns and how they affect IT. 




#1: Reporting compromised data: It's the law 

Several states require that state entities, persons, or businesses disclose to a resident when his or her private information is reasonably believed to have been acquired by someone without authorization. An organization must publicly disclose when personal information in its possession appears to have been compromised. In 2003, California passed a law that requires organizations to notify residents if the organization experienced a data security breach that caused risk to personal information. Currently, 28 states have passed similar laws, and security breach notification bills are pending in more than 15 other states. Notification of a breach is costly, as there is usually a per-person fine.

#2: Customer loyalty is directly dependent on privacy 

Consumers rely on the Internet for shopping, banking, government, healthcare, and other services, while trusting that their personal and financial information is protected and inaccessible to unauthorized use. When this trust is broken, customer loyalty can evaporate--overnight. The costs of identity theft and other fraud are too great to risk doing business with organizations known for mistrust of private information.

Between 2001and 2004, more than 196 privacy-related legal actions were raised against 255 corporate defendants, including financial services, health care, pharmaceutical, information services, e-commerce, manufacturing, media, and retail. More than 33 class action suits have also been filed. Here are some interesting figures on how Web consumers view privacy:
86% are concerned about privacy of personal data.
45% never provide real names to sites.
5% use software to hide computer identities.
86% favor "opt-in" that requires permission before using data.
94% want privacy violators to be punished.

#3: IT pros bear most of the burden for privacy 

Here are a few things to consider when developing systems:
Know the types of data you are working with that include PII (personally identifiable information.) This includes the user's name and e-mail address, health care, and credit card or social security numbers. Don't collect more data than necessary.
Know how to implement mechanisms for notifying users that their personal data may be collected and offer them ways to opt out or consent to the collection of their data. A record of opt-out acknowledgement may also be required.
Determine where the system vulnerabilities lie: in the application, database, wireless network, Web access, or other interfaces.
Understand the steps to secure PII from misuse or unauthorized access, including access controls, encryption, physical security, and auditing. Encryption is probably the best defense. When an encrypted laptop is stolen, at least the data is protected.


#4: A data classification policy is essential 

Today, data managers are expected to become steward of their organization's information. They're asked to view the data under their care as a valuable asset and manage it based on what or who it represents. An organization should have a policy definition of classified, confidential, and public information and clearly define data that's the most valuable and/or secret.

A key component of this policy is a data security plan that addresses the foreseeable risks to the integrity of the information maintained in an organization's systems. Control of and access to PII data is the subject of recent privacy regulations in the United States. The European Union also has specific requirements to protect its residents.

#5: Identifying critical systems helps risk analysis 

Once you have a clear picture of how the data is classified and have identified potential data risks, target the systems that manage the data for a more detailed analysis of risks to data integrity.

A benefit of this exercise is to have better risk-ranking of major IT processes and systems, allowing you to focus on higher potential privacy risk areas. Auditing controls that are expected by law for critical systems that contain "regulated" data is a best practice.


#6: Organizations carry the burden of proof 

Did you get hacked? Was it successful? What data was affected? How many customers? What states? Even unsuccessful attacks may have to be disclosed, unless an organization can prove that no personal information was made available to or accessed by an unauthorized party. As a result, an organization's intrusion detection and prevention systems must be effective and create reliable records of their effectiveness.

If a company concludes that a security incident didn't result in unauthorized access to personal data, but a customer suffers identity theft as a result of the attack, the organization will probably be found liable. Disclosing and reporting a breach is almost sure to damage the organization with financial consequences. Notification alone costs about $100 per customer per incident. So if 10,000 customers are affected, the incident will cost at least $1,000,000.


#7: CPOs oversee privacy issues 

The primary role of the chief privacy officer (CPO) is to establish privacy policies for both customers and employees and to review and rule on related issues. A CPO usually chairs a privacy committee in larger organizations to provide guidance on managing incidents, privacy policies, security awareness, and many other privacy issues. The buck stops here when there's a decision to be made on technology or business that can affect compliance.

The CPO is becoming very busy these days, fielding questions on legal issues that usually have an impact on IT. IT is often responsible for finding solutions to privacy issues, such as intelligent encryption.


#8: Privacy incident management can prevent future risks 

Who gets notified and when? Privacy incident management is not unlike other incident response functions, except when it comes to notification. Notification requirements are usually spelled out in the law, but notification can still be an arduous process. The CPO will likely oversee the incident response team that determines the cause and severity of the incident and issues report findings. An important outcome of investigating an incident and finding the root cause is remedying systems against similar risks in the future.


#9: Boundaries are blurring 

Who is responsible when data is shared between organizations in the course of business? What if a breach is caused by one of your organization's outsourcers? If your employees' 401K data is on an insecure laptop owned by the 401K provider and the laptop is stolen, who bears the burden?

IT outsourcing is popular, but whose responsibility is it to protect you when an employee or a vendor happens to leave a USB stick on the counter at Starbucks when paying for a latte? If this device contains insecure private information, the mishap could constitute a data breach.

It's most critical to have privacy and security language in all IT contracts with third parties. Incidents can't always be prevented, but you can buy some indemnity if you draft a proper contract. Data security in contracts is becoming more common; use your legal team if necessary.

#10: White collar crime threatens privacy

A huge market exists for selling personal information, especially credit card numbers. The average rate for an ID is about $50. The infrastructure for online crime is more sophisticated than you can imagine. Marc Gaffan, a marketer at RSA Security Inc., offered this description of the problem in the article "The Net's not-so-secret economy of crime": "There's an organized crime industry out there with defined roles and specialties. There are communications, rules of engagement, and even ethics. It's a whole value chain of facilitating fraud, and only the last steps are actually dedicated to translating activity into money."

A Web site called TalkCash.net was a fraud marketplace for its members. To become a member, an applicant was asked to submit a few credit card numbers to show that he or she was really a "crook." This site is no longer open for business.



Tuesday, August 17, 2010

10 Dying IT Skills



Introduction
There are some things in life, like good manners, which never go out of style, and there are other things, like
clothing styles that fall in and out of fashion, but when an IT skill falls out of favor, it rarely ever comes back.
Here’s our list of 10 dying IT skills. If any of these skills are your main expertise, perhaps it’s time to think about
updating your skill set.


10. COBOL
Is it dead or alive? This 40-year-old programming language often appears in lists of dying IT skills but it also
appears in as many articles about organizations with legacy applications written in COBOL having a hard time
seeking workers with COBOL skills. IBM cites statistics that 70% of the world’s business data is still being
processed by COBOL applications. But how many of these applications will remain in COBOL for the long term?
Even IBM is pushing its customers to “build bridges” and use service-oriented architecture to “transform legacy
applications and make them part of a fast and fexible IT architecture.”


9. HTML
We’re not suggesting the Internet is dead but with the proliferation of easy to use WYSIWYG HTML editors
enabling non-techies to set up blogs and Web pages, Web site development is no longer a black art. Sure, there’s
still a need for professional Web developers (see the ColdFusion entry above for a discussion about Java and
PHP skills) but a good grasp of HTML isn’t the only skill required of a Web developer. Professional developers
often have expertise in Java, AJAX, C++ and .Net, among other programming languages. HTML as a skill lost
more than 40% of its value between 2001 and 2003, according to Foote Partners.


8. SNA
The introduction of IP and other Internet networking technologies into enterprises in the 1990s signaled the
demise of IBM’s proprietary Systems Network Architecture. According to Wikipedia, the protocol is still used
extensively in banks and other fnancial transaction networks and so SNA skills continue to appear in job ads.
But permanent positions seeking SNA skills are few and far between. ITJobsWatch.com noted that there were
three opening for permanent jobs between February and April, compared to 43 during the same period last
year. Meanwhile, companies such as HP offer consultants with experience in SNA and other legacy skills such as
OpenVMS and Tru64 Unix for short-term assignments.



7. Siebel
Siebel is one skill that makes a recurring appearance in the Foote Partners’ list of skills that have lost their luster.
Siebel was synonymous with customer relationship management in the late ‘90s and early 2000s, and the com-
pany dominated the market with a 45% share in 2002. Founded by Thomas Siebel, a former Oracle executive
with no love lost for his past employer, Siebel competed aggressively with Oracle until 2006 when it was ulti-
mately acquired by the database giant. Siebel’s complex and expensive CRM software required experts to install
and manage. That model lost out to the new breed of software-as-a-service (SaaS) packages from companies
such as Salesforce.com that deliver comparable software over the Web. According to the U.K.’s ITJobsWatch.com
site, Siebel experts command an average salary of GBP52,684 ($78,564), but that’s a slide from GBP55,122 a
year ago. Siebel is ranked 319 in the job research site’s list of jobs in demand, compared to 310 in 2008.

6. RAD/Extreme Programming
Back in the late 1990s and early 2000s the rapid application development and extreme programming develop-
ment philosophies resulted in quicker and more fexible programming that embraced the ever changing needs
of customers during the development process. In XP, developers adapted to changing requirements at any point
during the project life rather than attempting to defne all requirements at the beginning. In RAD, developers
embraced interactive use of structured techniques and prototyping to defne users’ requirements. The result was
accelerated software development. Although the skills were consistently the highest paying in Foote Partners
survey since 1999, they began to lose ground in 2003 due to the proliferation of offshore outsourcing of applica-
tions development.

5. ColdFusion
ColdFusion users rave that this Web programming language is easy to use and quick to jump into, but as many
other independent software tools have experienced, it’s hard to compete with products backed by expensive
marketing campaigns from Microsoft and others. The language was originally released in 1995 by Allaire, which
was acquired by Macromedia (which itself was purchased by Adobe). Today, it is superseded by Microsoft .Net,
Java, PHP and the language of the moment: open source Ruby on Rails. A quick search of the Indeed.com job
aggregator site returned 11,045 jobs seeking PHP skills compared to 2,027 CF jobs. Even Ruby on Rails, which
is a much newer technology receiving a major boost when Apple packaged it with OS X v10.5 in 2007, returned
1,550 jobs openings on Indeed.com.

4. Wireless Application Protocol
Yes, people were able to browse the Internet in the late 1990s before Apple’s iPhone. Web site operators would
rewrite their content to the WAP’s Wireless Markup Language, enabling users to access Web services such as
email, stock results and news headlines using their cell phones and PDAs. WAP was not well received at the be-
ginning because WAP sites were slow and lacked the richness of the Web. WAP has also seen different levels of
uptake worldwide because of the different wireless regulations and standards around the world. WAP has since
evolved and is a feature of Multimedia Messaging Service, but there are now a new generation of competing
mobile Web browsers, including Opera Mobile and the iPhone’s Safari browser.

3. Visual J++
Skills pay for Microsoft’s version of Java declined 37.5% last year, according to the Foote Partners’ study. The
life of J++, which is available with Microsoft Visual Studio 6.0, was not a smooth one. Although Sun Microsys-
tems licensed Java to Microsoft to develop J++, Microsoft failed to implement some features of the offcial Java
standard while implementing other extensions of its own. Sun sued Microsoft for licensing violations in a legal
wrangle that lasted three years. Microsoft eventually replaced J++ with Microsoft .Net.

2. Novell NetWare
Novell’s network operating system was the de facto standard for LANs in the 1990s, running on more than 70%
of enterprise networks. But Novell failed to compete with the marketing might of Microsoft. Novell tried to put
up a good fght by acquiring WordPerfect to compete with Windows Offce, but that move failed to ignite the
market and Novell eventually sold WordPerfect to Corel in 1996. Novell certifcations such as Certifed Novell
Engineer, Master Certifed Novell Engineer, Certifed Novell Certifed Directory Engineer, and Novell Administra-
tor were once hot certs in the industry, but now they are featured in Foote Partners’ list of skills that decreased
in value in 2008. Hiring managers want Windows Server and Linux skills instead.

1. Asynchronous Transfer Mode
ATM was popular in the late 1990s, particularly among carriers, as the answer to overworked frame relay for
wide-area networking. It was considered more scalable than frame relay and offered inherent QoS support. It
was also marketed as a LAN platform, but that was its weakness. According to Wikipedia, ATM failed to gain
wide acceptance in the LAN where IP makes more sense for unifying voice and data on the network. Wikipedia
notes that ATM will continue to be deployed by carriers that have committed to existing ATM deployments,
but the technology is increasingly challenged by speed and traffc shaping requirements of converged voice
and data networks. A growing number of carriers are now using Multi-Protocol Label Switching (MPLS), which
integrates the label-switching capabilities of ATM with the packet orientation of IP. IT skills researcher Foote
Partners listed ATM in its IT Skills and Certifcation Pay Index as a non-certifed IT skill that has decreased in
value in the last six month of 2008.






Friday, August 13, 2010

Top 10 Skills in Demand in 2010

Introduction 

In 2010 Salary Survey, conducted at that end of last year, one of the ques-
tions put to respondents was “What skill set will your company be looking to add in 2010?” The skills listed by
respondents include the perennial favorites: security, network administration, and Windows administration. Also
included are virtualization/cloud computing and Web development. Meanwhile, an old favorite, business analy-
sis, makes a come back. Here’s the complete list, with the No. 1 skill listed being in the highest demand.

1. Project Management

As we emerge from the recession, organizations aren’t likely to go back to the go-go days of throwing money
at IT initiatives or taking risks and deploying without careful thought and planning. Organizations are putting
pressure on IT to only implement projects that can show real return-on-investment. The first step to achieving a
good ROI is professional project planning and implementation.

Project management skills often appear in top 10 skills lists, perhaps because some organizations got their fingers
burned in the 1990s through the poor implementation of IT projects such as enterprise resource planning initia-
tives. But even though the profession is mature (in IT terms), project managers still have work to do to advance
their status within organizations. According to an article on the Project Management Institute Web site, project
managers still have to develop their people skills, organizational leadership, and individual professionalism.

2. Security

It’s a never-ending game of cat and mouse for security professionals and 2009 proved to be another fun filled
year. According to Symantec’s Security and Storage Trends to Watch report, the number of spam messages con-
taining malware increased nine-fold to represent more than 2% of e-mails, while other criminals manipulated
people’s love of social networking sites to launch attacks. Twitter, for example, spent much of 2009 battling
DDoS and other attacks. Meanwhile, top headlines, such as the H1N1 flu and the death of Michael Jackson were
used by criminals to lure people to download malware.

Symantec predicts more of the same in 2010, warning that attackers will continue to use social engineering
to get to consumers’ sensitive data, and criminals will take Windows 7 as a challenge for seeking and exploit-
ing vulnerabilities in the new platform. Mac and smartphones will also be targeted more by malware authors,
Symantec says.

Despite the economic challenges of ‘09, organizations continued to hire security pros. The most sought-after
security skills were information risk management, operations security, certification and accreditation, security
management practices, and security architecture and models, according to a survey last year of 1,500 U.S.-based
security pros by security certification provider ISC2. 2010 is expected to be another busy year from security
professionals.

3. Network Administration

Networking administration skills never lose their luster. It’s the second most sought after skill in the Global
Knowledge survey and it will be the top skill sought by CIOs in the first quarter of 2010, according to a survey of
IT chiefs by Robert Half Technology. In 2010, organizations are expected to upgrade to Windows Server 2008 R2
and the Windows 7 client, and perhaps install Exchange Server 2010 and SharePoint 2010. Enterprises are going
to need network administrators to ensure network traffic continues to move without a hitch.

Meanwhile, Cisco hopes to push more data-intensive traffic onto corporate networks. Video is a key focus for
Cisco in 2010 as it works to finalize its control of video conferencing maker Tandberg and through its 2009
purchase of Pure Digital, developer of the Flip video camera. At the end of last year, Cisco introduced two Tele-
Presence certifications: the Cisco TelePresence Solutions Specialist for midcareer voice or networking engineers
seeking to specialize in the planning, design and implementation of Cisco TelePresence; and TelePresence Instal-
lation Specialist aimed at installation technicians.

4. Virtualization – Cloud 

The projected cost savings and efficiencies are no-brainers for organizations seeking to implement virtualiza-
tion and cloud computing. With the cloud computing space now taking shape it’s difficult for enterprises to find
pros with substantial relevant experience. Instead companies are drawing expertise from a range of IT skill sets,
including storage, networks and desktop, according to a Network World article. Initially companies will set up
cross-functional teams to buy and implement virtualization, but eventually cloud computing will be an expected
skill set of systems administrators. In a few years, it could even be a standard skill set of all IT pros because it
touches different aspects of IT.

For details about virtualization certifications from leading virtualization software vendors VMware, Citrix and
Microsoft, see Global Knowledge’s Top IT Certifications in Demand Today newsletter of June 2009.

5. Business Analysis

Business analysis roles were commonplace in many organizations in the 1990s when big projects, such as
enterprise resource planning initiatives, required the critical thinking that business analysts could provide. But
as businesses began moving at a faster pace, business analysis fell by the wayside. Factors such as the economic
downturn and regulatory compliance have forced companies to take a step back and to think through business
problems and their solutions, and business analysis is making a comeback, as a result. Kathleen Barret, presi-
dent of the International Institute of Business Analysis says the discipline is a phoenix rising.

The IIBA describes the job of a BA as a “liaison among stakeholders in order to elicit, analyze, communicate, and
validate requirements for changes to business processes, policies, and information systems.” IT pros are good can-
didates for BA jobs because they have a broad perspective of a company’s business, says Barret. There are three
types of BAs: enterprise BAs who identify opportunities for business change and defines the work to be done;
transition BAs who fine-tunes the plans; and project BAs who work on project teams that implement the changes.
Annual salaries average around $75,000 with enterprise and transition analysts earning more, Barret says.


6. Business Process Improvement

With project management and business analysis skills appearing in this skills list, it’s no surprise that business
process improvement skill is also here. Business process improvement and business analysis go hand-in-hand.
Business analysts identify areas for improvements to business processes, while business process improvement or
management pros use BPM techniques and technologies to help companies optimize their business processes.

A recent BPM survey by IT researchers, the Aberdeen Group says the top reasons business are driving BPM activ-
ity are the need to reduce operating costs and to improve cash flow. However, the top barrier to adoption was
the lack of knowledge about BPM. According to Gartner, among the competencies required for successful BPM
initiatives include process skills, tools and process assets, and transformation skills.

To learn more about BPM, go to the Web site of the Business Process Management Initiative (BPMI.org), which
promotes the standardization of common business processes; and the BPMinstitute.org, which describes itself as
a peer-to-peer exchange for business process management professionals.


7. Web Development

If you are—or you know friends who are—addicted to the FarmVille game on Facebook you’ll know the power
of Web development. In just a few short months, FarmVille’s popularity has spread across the globe as Facebook
fans tend to their farms and purchase virtual goods. The game, including others by FarmVille developer Zynga,
has netted the start-up more than 200 million monthly unique users for its online apps. One financial analyst
reckons Zynga could be valued at $1 billion if it were to go IPO in mid-2010.

Developing Facebook games is just one extreme of the vast Web development spectrum. Building iPhone apps
could also be very profitable, writes Web developer and blogger Glen Stansberry. As moderator of the Freelance
Switch job board, Stansberry listed other popular Web development skills including Framework knowledge, wid-
get development, content management system customizations (for small businesses looking to create a unique
look to their standard Wordpress and Drupal blogs), and Javascript Plugin creation.

8. Database Management 

Databases are the hearts of key business systems that drive payroll, manufacturing, sales, transaction process- 
ing, and more. Programmers must be able to build programs that quickly and efficiently interface with the
database management system (DBMS), while database administrators “must be able to bring the full power of 
database features to bear on business problems”, writes Oracle- and IBM-certified DBA Howard Fosdick in his 
whitepaper Database Skills Availability: Critical to Your Selection of Database. “DBA expertise can be the Achil- 
les’ heel of database projects - many IT projects have failed due to the inability to secure DBA talent or success- 
fully address DBA issues,” he adds. 

The major database vendors are Oracle, IBM and Sybase. Oracle runs three main certification programs for 
database professionals. Oracle Certified Associate is the first rung of the Oracle certification ladder. Next is the 
flagship Oracle Certified Professional (OCP) credential, which certifies an individual’s ability to manage, develop, 
or implement enterprise-wide databases and other software. Oracle Certified Master (OCM) is Oracle most 
advanced accreditation. IBM offers a dizzying array of certifications surrounding its DB2 product series. The main 
credentials are IBM Certified Database Associate, Database Administrator, Application Developer, and Advanced 
Database Administrator. Sybase has two sets of certifications for its Adaptive Server Enterprise product: ASE 
Administrator Associate and ASE Administrator Professional; and ASE Developer Associate and ASE Developer 
Professional. 


9. Windows Administration

As previously mentioned, Microsoft shops are expected in 2010 to upgrade to Windows Server 2008 R2 and the
Windows 7 client, and perhaps install Exchange Server 2010 and SharePoint 2010 as well. Windows administra-
tion skills is going to be key for many enterprises implementing and maintaining existing and upgraded systems.

Microsoft Windows Server 2008 certifications at the MCTS level cover configurations for Active Directory, net-
working, and applications. Certifications available for the MCITP level are Server 2008 Server Administration,
Enterprise Administration. In a November blog posting in Microsoft’s Born to Learn blog, the company wrote
that the first of its Windows Server 2008 virtualization exams would be entering beta soon. The exams will cover
server virtualization, desktop virtualization, and virtualization administration. Windows 7 pros can certify as
MCTS: Windows 7 – Configuration, and MCITP: Enterprise Desktop Administrator 7.

10. Desktop Support

Our recent article “Top Certifications in Demand Today” listed desktop support as a hot skill. In Global Knowl-
edge’s 2010 salary survey, it was named as the 10th most sought-after skill this year. In the June article, we
quoted Robert Half Technology Executive Director Dave Willmer as saying that businesses will need desktop sup-
port personnel to support new workers as organizations begin hiring as the economy improves. The introduction
of Microsoft Windows 7 is also expected to generate additional interest.

Microsoft currently provides the MCITP: Consumer Support Technician, and MCITP: Enterprise Support Technician
certifications, but they are based on Windows Vista. Microsoft, in its Born to Learn blog, in November said that
it is working on a MCITP: Windows 7, Enterprise Desktop Support Technican certification. Prospective candidates
are advised to prepare for 680: Win 7, Configuring and 685: Win 7, EDST.
Related Posts with Thumbnails