The Ed Norman Syndrome
Unfortunately, I must say I have indeed experienced this sort of situation in which having top-notch computer equipment is rendered useless by the over-zealous Manager of Information Systems (MIS); for his mission in life, is to prevent or slow you down as much as he can in order to protect the equipment and ensure that no one breaks the rigid rules he has placed on technology usage. Lord MIS rules in his technology kingdom. You must bow to his wishes and desires if you remotely expect to be able to utilize his equipment with some degree of efficiency.
On the other hand, I have also had the opportunity to witness the complete opposite scenario. I have worked at companies where equipment usage rules are virtually non-existent. In this case, the results are pretty similar to the anecdote I described in the previous paragraph. The technology system is running amok, and the environment resembles the wild west: chaos can and will emerge at any moment. In such environment, people are not able to perform their tasks, because law and order are absent. Lack of leadership and organization, sets the stage for horrible things to take place with software and hardware as well. The result is the inability for anyone to make any significant, efficient use of the available technology.
From my personal experience with these two extreme styles of technology maintenance and management, I concluded that moderation is the way to go. On the one hand, one would like to have someone who is in charge of safeguarding the technology for maintenance-related reasons and to prevent abuse from individuals who lack common sense. On the other hand, one must also ensure that the person who has been vested with the responsibility of managing such technology, does not become imperialistic to the point that he now becomes everyone's abuser. I believe that moderate overseeing of technology is the best compromise, for it benefits the manager as well as the user. In summary, moderation brings the most efficiency out of the technology being discussed, while it also allows the technology manager the highest degree of safeguarding without encroaching into effective, efficient use of technology.
WEEKLY ACTIVITY LOG
- Downloaded and listened to Session 7 blog
- Formulated response to Session 7 blog
- Posted response to Session 7 blog
- Continued working on projects 2 and 3
- Read scholar's blog postings
- Posted comments on scholar's postings
Thursday, February 22, 2007
Subscribe to:
Comments (Atom)