"You want to keep improper access to data from happening, but once it does happen, you need to trace it back to its source," he says. "You want to be able to find the employee who broke company policies or the ISP that hosted the outside person coming in. And you want to advertise your traceability efforts so that people who try to break in know they're not going to get away with it. Technologists are constantly coming up with better ways to protect our data. Along with their advancements, rigorous traceability measures can be a powerful deterrent and smart investment."
Call it the myth of omnipotence. Technology has progressed at such an astounding rate that many become addicted to the notion that anything is possible -- no trade-offs or sacrifices required.
Some IT people still believe any problem can be solved if you just throw enough resources against it, says Michael McKiernan, VP of business technology at Citrix. If they could just collect enough data and dump it into a massive business intelligence system, they'd emerge with a single source of truth for making decisions. If they were only freed from the arbitrary constraints imposed by management, they could have systems that are affordable and always available, massively scalable, instantly flexible, and aesthetically delightful.
"If you build something on Amazon Web Services that can do a million transactions in an hour, do you really think you'll also be able to do a hot fail-over disaster recovery site?" he says. "If you've created something that can process really large transaction volumes, do you really think you'll be able to change it every week? If you want it to be massively scalable, you may have to give up having it be highly available."
The cure: Get real. Develop an IT portfolio that balances risk and reward, and hedge your big bets. Don't swing for the fences every time unless you enjoy striking out. It's better to hit for singles and doubles to boost your enterprise batting average instead of going for personal glory.
"People need to realize they can't get there simply by being smarter or working harder," he says. "You can't have it all. You can have anything you want, you just can't have everything you want. The antidote is knowing what the trade-offs are, then trying to get as close to the edge as you can."
Related articles at InfoWorld.com:
- 10 hard truths IT must learn to accept
- 12 effective habits of indispensible IT pros
- IT inferno: The nine circles of IT hell
- 7 IT superheroes -- and their fatal flaws
- IT personality types: 8 profiles in geekdom
- A-Teams of IT: How to build your crack strike force
- IT turf wars: The most common feuds in tech
- IT admins gone wild: 5 rogues to watch out for
- Dirty IT jobs: Partners in slime
- Jackass IT: Stunts, idiocy, and hero hacks
- Stupid user tricks 6: IT idiocy loves company
- Programming IQ test: Round 2
- Linux admin IQ test