Merry Christmas, everyone!
Holiday Protip: Don’t Leave the Interns Unsupervised With Excel
Merry Christmas, everyone!
Merry Christmas, everyone!
Confidential to AT&T BSDs: Steve Jobs may be an asshole, but he’s not stupid.
Close to half of Apple Inc iPhone users in the United States would be “very interested” in dumping AT&T Inc for Verizon Wireless as a service provider, according to a study from professionals service firm Deloitte.
“If another carrier were to pick up the iPhone, you would probably see a number of defections,” said Ed Moran, director of insights and product innovation at Deloitte.
AT&T’S Chief Executive Randall Stephenson played down the potential impact of the loss of iPhone exclusivity at a Goldman Sachs conference on Tuesday.
Stephenson said about 80 percent of AT&T’s iPhone users were either in family plans making it difficult to cancel service or had received their phone through their business. [Ed. note: rumor has it that after making this statement, Stephenson was heard laughing maniacally]
Study finds iPhone owners want to switch to Verizon [Reuters]
Business technology is a continually changing landscape, but one underlying theme seems to remain constant – the general presumption on the part of sellers AND buyers (especially buyers!) is that their new technology will magically cure a business of all its ills. Since ly buyers of this stuff, take note.
I think this fallacy of thinking transcends the saccharine marketing tactics and arm-waving that normally accompanies these offerings. Sure, a slick sales and marketing troupe can juice the numbers, but there’s more to it.
The deeper message is that we, all of us, are predisposed to WANT to believe in a cure-all.
It’s as true for business & technology as it is for weight-loss, depression, ADHD, and erectile dysfunction. We have been falling for the same old Medicine Show forever, only have our own naive human nature to blame.
During the late 1880s and all the way up to WWII, Medicine Shows peddled their dubious Snake Oil offerings all over the USA. Trumpeting cures for everything from arthritis to cancer, these guys were enthusiastically welcomed into communities despite the dim prospects for validating their claims.
That was a long time ago but how less true is it today? How often are we still willing to download the responsibility for our own well-being onto a pill? How often would we rather buy our way out of organizational inefficiencies with the purchase of a new software application than undertake the grind of fixing a broken or outdated business process?
We have made massive technological advances in both medicine and software and continue to create innovations that move us forward, enhancing user experience as we learn from our mistakes. The outcomes resulting from today’s medicinal fixes may be more tangible today due to the advent of regulation and certain minimum standards (when operating under the auspices of the FDA… not always the case!). The outcomes from new software are improving, but the human element is still critical for driving user adoption.
But there are side-effects. Beyond the cash out of pocket, what price will be paid? A well known anti-depressant lists the following as possible side-effects:
I’ll allow for the fact there are tens of thousands of legal hours that go into these disclosure documents to protect against litigation, but holy smokes man! There’s a couple real dealbreakers there in my view.
So how about new business technology? What sort of side-effects may result?
• The need for extensive training
• Upgrades to hardware
• Incompatibility with other business software
• Inability to capture the business processes properly
• Retaining business processes unsuited to the new environment
• Time to implementation
• Cost of consultants and additional IT guys
• Continued risk of obsolescence
• Internal resistance to change
Examining the possible side-effects and unintended consequences is a critical element of ANY software selection process. Software salesmen won’t be able to distill this inevitable contingency. They didn’t concoct this brew, they just sell it. I’ve known software salesmen that can barely crack open an Excel doc without crashing their computer. Only through a reflective process within your own company can you hypothesize on how the introduction of new technology will affect operations.
Further, it is absolutely critical to examine your existing business processes in the context of a new software. The tendency is to try and maintain existing processes even though they may be as obsolete as the outgoing software. For example, a local company was implementing a new system. The works! ERP, Accounting, and CRM. These systems would aaaallll work together.
Oh, but they weren’t going to purchase the Financial Statement Consolidation Module. They would develop a work-around in Excel instead. It was not surprising to me that they had already failed once on an implementation (to the tune of $2 million bucks).
At the opposite end of the spectrum, I saw a company bring in a powerful reporting technology and allowed a whole bunch of poorly trained users to run hog wild in there significantly reducing the value of the system. The reports being produced could not be trusted. The fix was to lock everything down and bottleneck the reporting process which just led to more work-arounds as users were unwilling to wait it out.
The software being produced today tends to follow a Best Practice approach. If you choose to proceed outside of that framework, it might be an indication that your company is operating outside of Best Practice.
The truth about business software is that it’s work. Productivity gains resulting from new systems are typically back-end loaded. On the front-end, there’s cost, there’s risk, there’s effort, there’s training, there’s the harsh reality that can only come from looking in the mirror and facing the truth about how work ACTUALLY gets done.
Understanding this means burying the Medicine Show paradigm.
Geoff Devereux as been active in Vancouver’s technology start-up community for the past 5 years. He regularly attends and contributes to the growing entrepreneurial ecosystem in the city through the Vancouver Enterprise Forum, guest blogging on Techvibes.com, and as a mentor with ISS of BC. Prior to getting lured into tech start-ups, Geoff worked in various fields including a 5 year stint in a tax accounting firm. He is currently working in a marketing/social media role with Indicee, a Saas Business Intelligence company, bringing B.I. to mere mortals.
Recently, I’ve been getting suspicious emails purporting to be from a high-up in my company. I have faith in this person and therefore would assume if (s)he wanted to push hot webcam videos on me, (s)he’d have the decency to text me with the hott linkks instead of using poor grammar in work emails. My suspicions were confirmed when I saw the same emails coming from – gasp! – my own email address. Now I knew it had to be a scam; surely I wouldn’t have to tell myself about some hot new webcam girrllss I’d discovered on an .ru domain, I’d have that shit deliciously bookmarked on my own machine.
Being incredibly careful with my logins, I knew I couldn’t have slipped up and gotten phished. Had I been hacked?
Whenever someone says “I got hacked!” I have to admit I always feel a bit of “blame the victim” is in order. After all, I find it a bit hard to swallow that some hardcore hackers in Russia are all that concerned with your personal Facebook page. To say “I’ve been hacked” implies that some outside source did some work to break through your rock solid security and gain entry, and makes no implication that the user themselves likely opened the door and let the “hacker” in, if unwittingly. More often than not, “I got hacked” means “I unknowingly gave up my password in a phishing scheme” or “I screwed up and clicked an unbelievable posting on Facebook that stole my login info because I never read the permissions I give third party apps.”
It’s been done a million times but for your sake, here are a few tips for staying safe out there in the big scary Internets.
Make sure your contact info is up to date. If an unscrupulous individual ever gains access to your Facebook account, you may be forced to lock it down, in which case you’ll need access to the email address you use to sign in to receive communications from Facebook to get your account back. Make sure you’re using an email you have access to, even if it’s one you don’t use often.
Diversify your passwords. It goes without saying that a good password is one that isn’t found in the dictionary but isn’t so difficult you have to keep it written on a sticky at your desk. Dennis Howlett recommends a LastPass account (via AccountingWEB UK) for harder to remember passwords if you must. Substitute numbers for letters (like “1” instead of “I” or “3” instead of “E”) and throw in some punctuation just to be safe.
If you aren’t sure, don’t click it. Spammers have gotten pretty smart since the days of the “ILOVEYOU” virus (which happens to turn 11 this week) and even the most technologically-adept can fall for their tricks. If you aren’t expecting an attachment, don’t open it. Common attachment scams include spoofed emails from UPS or USPS claiming to contain your tracking number or a package exception – while UPS may send you emails, they’d never send you a zip file (tracking numbers are always included in the body of any UPS communications sent on merchants’ behalf). Be wary!
And if you have been hacked, phished or otherwise compromised, delete any offending posts from your hijacked social media pages and issue an apology. You don’t have to beg for forgiveness, just let everyone know you got compromised and are sorry, it won’t happen again.
In my case, I just got spoofed, which isn’t really my fault at all. That’s where a nice email from the tech support department to the rest of the team comes in handy.