Thursday, August 18, 2022

Influence and Impact by Bill Berman and George Bradt: A Review

 

Most of us, myself included, were raised believing that if we kept our focus and put in the hard work, we would get ahead. Tough times make us tougher, we were taught, and perseverance will prevail. Influence and Impact by Bill Berman and George Bradt debunks this myth, explains why many careers become frustratingly stagnant, and offers a detailed plan for moving forward. As Winston Churchill said, “Sometimes doing your best is not good enough. Sometimes you must do what is required.” Success comes from an honest assessment of your own capabilities combined with a clear understanding of what the organization really needs.


Meaningful job satisfaction is derived from recognition for what you do and the difference you make that others can see. Some of the things that can derail your best efforts are the company culture, problems with how the job is structured, or an unsupportive manager. Often these can be overcome, but sometimes it’s just better to move on. Authors Berman and Bradt use example stories, guest-written sections, and detailed worksheets to help the reader decide the best course of action, develop a plan, and ultimately flourish. The book is written both for the individual trying to help themselves, and for managers who want to help their people.


The first of four main sections addresses the central message of the book – the disconnect between what you may be currently doing, and what the organization really needs. Both influence (being listened to, having credibility, and being a sought-after colleague) and impact (leading without formal authority and really affecting the organization) are key parts of a satisfying job.


Author Berman illustrates the issue with a personal story from his own youth working in a downtown Washington, D.C. camera store. He became increasingly frustrated with customers who didn’t want to buy cameras but only to get help with simple features of their own. Bill’s attitude and success took a turn for the better when his boss explained that they were in a tourist market, and his real job was to sell film and processing, not cameras. Common traps like this involve doing what is the most comfortable and enjoyable, or perhaps doing the job you wish you had, regardless of what the company really needs. Your job description was most likely written by someone who never met you, so this gap shouldn’t be surprising.


In the section that follows, the focus shifts to your levers of influence, beginning with uncovering the essentials of the job. Data can come from talking with select individuals, or from observing who is successful, who is not, and what results get the best response. Your own manager should be the highest priority source, starting with how they see their own job and then defining what you should do and how you should do it. It is important to understand company culture (the shared basic assumptions that work well enough to be passed along to new team members). The competency metrics used in performance appraisals rarely reflect the actual functioning of the organization.


The role you play (manager, doer, leader, sponsor, facilitator….) may not be what the organization needs from you. Always factor in interpersonal and political recommendations picked up while gathering information. When given the opportunity in a job interview, I like to ask the interviewer to fast-forward 6 months and tell me what would convince them that hiring me was the right decision. This can be an effective way to clarify expectations.


Sometimes high performers are being held back by internal company bias, and the authors do not overlook this important topic. If you are being treated differently from others, there is useful advice on how to approach and expose the problem. Over-performing isn’t always the solution to being judged under different standards.


Section three is where you take what you’ve learned about yourself and your organization and set forth on a path to building influence and impact. Here you will almost certainly encounter organizational politics, which are not automatically bad; politics can help connect interpersonal relationships with the company’s needs to make things run smoother. The authors warn against showcasing your own intellectual aptitude at the expense of your relationship with colleagues and recommend avoiding self-promotion to the point of being annoying.


Psychologist Berman notes that the interpersonal influence you will need requires empathy – not an easy trait to develop. The Japanese concept of Nemawashi – a process for helping trees adapt to a new environment prior to transplanting them – serves as a metaphor for creating engagement and alignment to change while also respecting previous work.


The final section deals with the options available when the current job situation just can’t be repaired. Whether or not your new job is in the same organization, endings are hard – they disrupt a large part of your daily routines – and the associated emotional turmoil is difficult. Here the authors provide a little counseling on working through these emotions, including behavioral, cognitive, interpersonal, and narrative methods. All of the these can play a role in recognizing your own value and moving on. Once you’ve accepted the change, there are some pointers for the job search, some of which should better position you for success the next time.


The book wraps up with some coaching tips for improving the influence and impact of your employees. While most readers will approach this as a self-help book, your own success will depend largely on that of your team. In many ways, it’s a checklist of what you wish your own manager would do. In summary, your goal with your employees is to get them to the same place you would like for yourself – encouraged, self-aware, well-informed about the business and stakeholders, and with a clear picture of what success looks like.


This short (181 page) book can be approached as a quick read for a few useful pointers, or it can be used as a thoughtful, in-depth workbook aimed at creating a detailed plan for advancing your career. In reading through the stories, I couldn’t help seeing myself and the situations I have encountered at work from a new perspective. Honest self-appraisal is challenging, and the realization that there is a disconnect between what you have been working hard at, and what the company actually needs, can be disturbing. Author Berman’s background as a licensed, board-certified psychologist supports his insights on dealing with personal issues and yet his presentation is blessedly free of psychobabble. If you’re searching for a way to get unstuck in your career, Influence and Impact is a great place to start.


Author Profile - Paul W. Smith - leader, educator, technologist, writer - has a lifelong interest in the countless ways that technology changes the course of our journey through life. In addition to being a regular contributor to NetworkDataPedia, he maintains the website Technology for the Journey and occasionally writes for Blogcritics. Paul has over 40 years of experience in research and advanced development for companies ranging from small startups to industry leaders. His other passion is teaching - he is a former Adjunct Professor of Mechanical Engineering at the Colorado School of Mines. Paul holds a doctorate in Applied Mechanics from the California Institute of Technology, as well as Bachelor’s and Master’s Degrees in Mechanical Engineering from the University of California, Santa Barbara.



Monday, August 15, 2022

Troubleshooting Old School

I was in town running some errands when this local business calls me and asks if I can help out. Something is going on within his network and some of the VOIP phones are not coming online. It has been 2 days and the IT support company that usually supports him has not answered any of his calls or emails.

He said that he didn't want to ask me earlier because he only thought I worked on huge complicated networks and was 'beneath me'. I chuckled and told him a large network is basically the same as a small network, just more of the same stuff duplicated. I explained that it doesn't matter to me how many devices are on them, troubleshooting methodology is pretty well the same.

I have never worked on this network, nor do they have any documentation - yeah real shocker. Of course, I don't drive around with my laptop, cable tester, and tools, so I started troubleshooting 'old school'.

I took a VoIP phone that didn't work and moved it to the closet where the VOIP gateway was located and plugged it in. Odd, it seems like it couldn't get an IP address or register with the gateway.

I disconnected all the wires from the switch that was HANGING by its ethernet cables (something else to fix) and only left the VoIP gateways connected. Bingo, the phone was online.

Then I simply plugged the cables back in, one by one, and tested all 10 phones to be certain they all worked until I found the suspect cable. When I asked where the mystery cable went, he said "That's the telecom cabinet, the IT support company has that key".

I then asked if he knew of anything in the telecom closet that required network connectivity like an IoT device, camera, or alarm system or if there was any cabling in the office that terminated there. he replied, "Pretty sure there isn't".

We left the mystery cable unplugged, he put a call into the IT service company that has a key to that room and we checked everything that requires network connectivity and all worked well.

Hope he figures out what is in that telecom closet ;) Regardless who provides support, you have access to all rooms on your premesis. And please "DOCUMENT AND LABEL!!!"



Tuesday, August 9, 2022

Is the SPAN port a scalable technology – No! Why?

 

Throughout the ages of Ethernet, SysAdmins have made frequent use of SPAN ports configured permanently, or on-demand, on switches and routers in the troubleshooting path. SPANs virtually guarantee that every packet passing through a switch port is mirrored to another port, which easily replicates every frame and delivers a complete copy for offline analysis. But how scalable is this approach for new and future speeds in the Gigabit family?


Since the introduction of 10 Gigabit Ethernet over 20 years ago, the outlook has gradually but drastically changed:

  • More security and monitoring tools need now access to the same traffic 24/7 - but the switch has limitations on the number of ports that can be defined as span destinations

  • More switch ports now need to be monitored - but the switch has limitations on the number of ports that can be defined as span sources

  • The switch gives a low priority to span ports - so packets will not make it through the span port at the busiest times

  • Some tools want access to specific traffic - but the switch cannot apply any packet filtering to the span port

  • Some tools want access to different traffic at different times - but the switch cannot be easily reconfigured to accommodate these changes


All of which means SPAN ports simply cannot be relied upon for security monitoring and compliance applications in service provider and enterprise data centers, or anywhere else.


Now, as environments transition to 25, 50, and 100 Gigabit Ethernet, it is even more challenging, if not impossible, for core switches to mirror all required Full Duplex traffic at a full-time rate, in real-time, which effectively prohibits the use of SPAN for security purposes.


“The switch treats SPAN data with a lower priority than regular port-to-port traffic”, according to Cisco's White Paper on SPAN Port Usability. “In other words, if any resource under load must choose between passing normal traffic and SPAN data, the SPAN loses and the mirrored frames are arbitrarily discarded.” Now that users are aware that the SPAN port randomly drops traffic under specific load conditions, what measures should companies apply to prevent packets from dropping and losing visibility? The optimum approach, according to Cisco, is to “make decisions based on the traffic levels of the configuration and when in doubt to use the SPAN port only for relatively low-throughput situations”.


Another scalability issue for SPAN ports is the restriction on monitoring tools in terms of both type and number. Two SPAN ports can frequently be configured on even strong switches. While the majority of networks could consider this sufficient, it is likely to experience a situation where there are no SPAN ports available. On the contrary, the number of security monitoring tools continues to increase. Each of these tools is typically used by multiple teams involved in network operations or security, with changes engineered at different frequencies and visibility into multiple but related network segments.


Unlike the SPAN, TAPs (Test Access Point) can guarantee the copy of all the packets to be submitted to the appliance without the possibility of oversubscription or packet loss. Network Critical's SmartNA Network TAP range is unique to the market as each TAP has been built by us from the ground-up supporting 1G/ 10G/ 40G/ 100G and 400G. This allows for a more tailored device that suits your needs, which makes for an ideal TAP for any purpose use, be it monitoring, security, or performance. The SmartNA TAPs are also able to aggregate, filter, slice, mask, strip, and more to help you get the information you need to perform your best. This cutting-edge technology is scalable to over 200 ports of 10/25/40 and 50G. Saving rack space and all speeds protect your network against obsolescence.


For more information, contact the Network Critical expert team at www.networkcritical.com/contact-us


Thursday, August 4, 2022

Blast From the Past.. Big Game Hunting

 This was one of my rants about the dilemma analysts face when they buy a tool and can't find any errors. This is over 10 years old and funny how this issue still exists.

https://youtu.be/S-HctjOJznQ

Tuesday, August 2, 2022

The Key to Strong Network Infrastructure

 

Developing your network architecture is similar to constructing a building. Start with the foundation and work your way up. The foundation of your network is, of course, visibility. First, you need to access all the traffic flowing through the network. The emphasis will be on network TAPs as the fundamental component in this discussion because they are independent of network switches and can observe all data moving across the links. All of the traffic on those links in both directions will be available after the TAPs have been installed in the network links. Notice that introducing TAPs won't affect the availability or dependability of the network. TAPs consequently become the cornerstone for visibility.


Although this bottom-up plan sounds obvious, oftentimes the plan starts on the top floor of the building. The network architects and planners frequently have the higher-level applications offered by the network tools on their minds. Without much consideration for how they will be connected to the network, the tools are budgeted for and purchased. When this occurs, networks frequently follow a rabbit-hole-like evolution where one purchase corrects or improves an operation from a prior purchase. All of the tools are functional, though perhaps not as effectively or cheaply as they could be. Starting with the end in mind is crucial, but it's also critical to consider how the changes will impact the network ecosystem.


One of the fundamental tasks of network management is monitoring. The manager can observe what is happening and look for potential bottlenecks and areas where traffic might be improved. For instance, a bandwidth issue is frequently an application performance issue. There are specialized tools to assist in locating and fixing these problems. Information security and network protection are also crucial challenges. Threats are not only ongoing, but they also constantly changing. It is clear that before choosing certain technologies, maintaining and safeguarding networks takes some strategy and a blueprint.


A smart place to start is by planning TAP connectivity to links. Network TAPs can have numerous ports and won't slow down or disturb the network. Not all ports need to be active at deployment time. As a result, framing your visibility approach has become much simpler with a TAP basis. Traffic monitoring tools can provide crucial information once ports are installed, allowing additional decision-making. Now that connectivity, monitoring, and effective traffic allocation to prospective instruments are in place, other elements of the plan can be constructed. Upgrading applications, compliance, performance, and security tools will take less time and cause minimal network disruption.


Visibility foundation is the key to a strong and larger network strategy and defense against malicious attacks. For the network to operate efficiently, daily analytics and management require a comprehensive visibility approach. While there are many specialized tools required to understand and protect network traffic, they can be deployed efficiently with the proper foundation. For more information, ask the experts at Network Critical.

Popular post