{"id":733,"date":"2015-04-09T14:26:42","date_gmt":"2015-04-09T19:26:42","guid":{"rendered":"http:\/\/www.smbitjournal.com\/?p=733"},"modified":"2017-02-12T10:26:42","modified_gmt":"2017-02-12T15:26:42","slug":"you-are-not-special","status":"publish","type":"post","link":"https:\/\/smbitjournal.com\/2015\/04\/you-are-not-special\/","title":{"rendered":"You Are Not Special"},"content":{"rendered":"

It is not my intention for this to sound harsh, but I think that it has to be said: “You are not special.” \u00a0And by “you” here, of course, I mean your business. \u00a0The organization that you, as an IT practitioner, support. \u00a0For decades we have heard complaints about how modern education systems attempt to make every student feel unique and special, when awards are given out schools attempt to find a way, especially with elementary students, to make sure that every student gets an award of some sort. \u00a0Awards for best attendance, posture, being quiet in class or whatever are created to award completely irrelevant things in order to make every student not only feel like part of the group, but to be a special, unique individual that has accomplished\u00a0something<\/em> better than anyone else.<\/p>\n

This attitude, this belief that everyone is special and that all of those statistics, general rules and best practices apply to “someone else” has become pervasive in IT now as well, manifesting itself in the belief that each business, each company is so special and unique that IT industry knowledge does not apply\u00a0in this situation. \u00a0<\/em>IT practitioners with whom I have spoken almost always agree that best practices and accumulated industry knowledge are\u00a0good and apply in nearly every case – except for their own. \u00a0All of those rules of thumb, all of those guidelines are great for someone else, but not for them. \u00a0The problem is that nearly everyone feels this way, but this cannot be the case.<\/p>\n

I have found this problem to be most pronounced and, in fact, almost exclusive to the small business market where, in theory, the likelihood of a company being highly unique is actually much lower than the large enterprise space of the Fortune 100 where uniqueness is somewhat expected. \u00a0But instead of small businesses assuming uniformity and enormous businesses expecting uniqueness the opposite appears to happen. \u00a0Large businesses understand that even at massive scale IT problems are mostly standard patterns and by and large should be solved using tried and true, normal approaches. \u00a0And likewise, small businesses, seemingly driven by an emotional need to be “special” claim a need for avoiding industry patterns often eschewing valuable knowledge to a ludicrous degree and often while conforming to the most textbook example of the use case for the pattern. \u00a0It almost seems, from my experience, that the more “textbook” a small business is, the more likely that its IT department will avoid solutions designed exactly for them and attempt to reinvent the wheel at any cost.<\/p>\n

Common solutions and practices apply to the majority of businesses and workloads, easily in excess of 99.9% of them. \u00a0Even in larger companies where there is opportunity for uniqueness we expect to only see rare workloads that fall into a unique category. \u00a0Even in the world’s largest businesses the average workload is, well, average. \u00a0Large enterprises with tens of thousands of servers and workloads often find themselves with a handful of very unique situations for which there is no industry standard to rely on. \u00a0But even so, they have many thousands of very standard workloads that are not special in any way. \u00a0The smaller the business not only the less opportunity for a unique workload but the less chance of it occurring on a workload by workload basis because they have so many fewer workloads.<\/p>\n

One of the reasons that small businesses, even ones very unique as small businesses go, are rarely actually unique is because when a small business has an extreme need for say performance, capacity, scale or security it [almost] never means that it needs that thing in excess of existing standards for larger businesses. \u00a0The standards of how to deal with large data sets or extreme security, for example, are already well established in the industry at large and small businesses need only leverage the knowledge and practices developed for larger players.<\/p>\n

What is surprising is when a small business with relatively trivial revenue believes that its data requires a level of secrecy and security in excess of the security standards of the world’s top financial institutions, military organizations, governments, hospitals or nuclear power facilities. \u00a0What makes the situation more absurd is that in pursuing these extremes of security, small businesses almost always result in very low security standards. \u00a0They often cite needs for “extreme security” for doing insecure or as we often say “tin foil hat” procedures.<\/p>\n

Security is one area where this behavior if very pronounced. \u00a0Often it is small business owners or small business IT “managers” who create this feeling of distrusting industry standards, not IT practitioners themselves, although the feeling that a business is unique often trickles down and is seen there as well.<\/p>\n

Similar to security, the need for unlimited uptime and highly available systems, rarely needed even for high end enterprise workloads, seem an almost ubiquitous goal in small businesses.\u00a0 Small businesses often spend orders of magnitude more money, in relationship to revenue, on procuring high availability systems compared to their larger business counterparts.\u00a0 Often this is done with the mistaken belief that large businesses always use high availability and that small business must do so to compete, that if they do not that they are not a viable business or that any downtime equates to business collapse.\u00a0 None of these are true.\u00a0 Enterprises have far lower cost of reliability compared to revenue and still do considerable cost analysis to see what reliability expenditures are justified through risk.\u00a0 Small businesses rarely do that best practice analysis and jump, almost universally, to the very unlikely belief that their workloads are dramatically more valuable than even the largest enterprises and that they have no means of mitigating downtime.\u00a0 Eschewing both business best practices (doing careful cost and risk analysis before investing in risk mitigation), financial best practices (erring on the side of up front cost savings) or technology best practices (high availability only when needed and justified) leaves many businesses operating from the belief that they are “special” and none of the normal rules apply to them.<\/p>\n

By approaching all technology needs from the assumption of being special, businesses that do this are unable to leverage the vast, accumulated knowledge of the industry.\u00a0 This means that businesses are continuously reinventing the wheel and attempting to forge new paths where well trodden, safe paths already exist.\u00a0 Not only can this result in an extreme degree of overspending in some cases and in dangerous risk in others but it effectively guarantees that the cost of any project is unnecessarily high.\u00a0 Small business, especially, have the extreme advantage of being able to leverage the research and experience of larger businesses allowing smaller businesses to be more agile and lean.\u00a0 This is a key component to making small businesses compete against the advantages of scale inherent to large businesses.\u00a0 When small businesses ignore this advantage they are left with neither the scale of big business nor the advantages of being small.<\/p>\n

There is no simple solution here – small business IT practitioners and small business managers need to step down from their pedestals and take a long, hard look at their companies and ask if they really are unique and special or if they are a normal business with normal needs.\u00a0 I guarantee you are not the first to face the problems that you have.\u00a0 If there isn’t a standard solution approach available already then perhaps the approach to the problem is wrong itself.\u00a0 Take a step back and evaluate with an eye to understanding that many businesses share common problems and can tackle them effectively using standard patterns, approaches and often best practices.\u00a0 If your immediate reaction to best practices, patterns and industry knowledge is “yes but that doesn’t apply here” you need to stop and reevaluate – because yes, it certainly does apply to you.\u00a0 It is almost certainly true that you have misunderstood the uniqueness of your business or you have misunderstood how the guidance is applied resulting in the feeling that those guidelines are not applicable.\u00a0 Even those rare businesses with very unique workloads only have them for a small number of their workloads and not the majority of them; the most extremely unique businesses and organizations still have many common workloads.<\/p>\n

Patterns and best practices are our friends and allies, our trusted partners in IT.\u00a0 IT, and business in general, is challenging and complex.\u00a0 To excel as IT practitioners we can seek to stand on the shoulders of giants, walk the paths that have been mapped and trodden for us and leverage the work of others to make our solutions as stable, predictable and supportable as possible.\u00a0 This allows us to provide maximum value to the businesses that we support.<\/p>\n","protected":false},"excerpt":{"rendered":"

It is not my intention for this to sound harsh, but I think that it has to be said: “You are not special.” \u00a0And by “you” here, of course, I mean your business. \u00a0The organization that you, as an IT practitioner, support. \u00a0For decades we have heard complaints about how modern education systems attempt to … Continue reading You Are Not Special<\/span> →<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":1026,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[45,44],"tags":[],"class_list":["post-733","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-business-of-it","category-it-management"],"_links":{"self":[{"href":"https:\/\/smbitjournal.com\/wp-json\/wp\/v2\/posts\/733"}],"collection":[{"href":"https:\/\/smbitjournal.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/smbitjournal.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/smbitjournal.com\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/smbitjournal.com\/wp-json\/wp\/v2\/comments?post=733"}],"version-history":[{"count":7,"href":"https:\/\/smbitjournal.com\/wp-json\/wp\/v2\/posts\/733\/revisions"}],"predecessor-version":[{"id":750,"href":"https:\/\/smbitjournal.com\/wp-json\/wp\/v2\/posts\/733\/revisions\/750"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/smbitjournal.com\/wp-json\/wp\/v2\/media\/1026"}],"wp:attachment":[{"href":"https:\/\/smbitjournal.com\/wp-json\/wp\/v2\/media?parent=733"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/smbitjournal.com\/wp-json\/wp\/v2\/categories?post=733"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/smbitjournal.com\/wp-json\/wp\/v2\/tags?post=733"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}