Solving Problems On The Cloud Part 3: Overcoming Unhealthy Fixations

Solving Problems On The Cloud Part 3: Overcoming Unhealthy Fixations

One example of an unhealthy fixation is the 2012 survey by Security Alliance who learned that the top threat listed by survey participants is data loss.

Of course security risks on the cloud cannot be ignored but clearly this problem is hugely overstated. Why executives and retail consumers, who lose everything from their car keys to their hard earned cash, (not to mention their own data mishaps) are so concerned about the cloud is more than fearing a loss of control. These individuals are struggling with what Gestalt psychologists refer to as fixation.

Understanding Fixations

Fixation is the tendency to focus on one specific aspect of a problem. All of us have experienced this phenomenon at one time or another referring to it casually as,  “freezing up”, or, “obsessing” over an issue. The Gestalt school also referred to a, “functional fixedness” that relates to limiting an object to its familiar use in every day life.

For the retail customer the functional fixation is based on fear, but the executive might just be exhausted by all the technological innovation over the past decade. The CEO may be thinking, “Hey, I’ve made huge investments in IT and all is well.” Of course this might be true for the moment, but in his functional fixedness he will only rest comfortably with the current tools until they break.

Solving Fixation Problems

Solving Fixation problems involves breaking free from herd mentality and approaching a problem from entirely different viewpoints. This idea is the very fire that fuels much of the success in the development of technological products. However, increasing the number of cloud adopters in the human realm is a lot different than strategizing within the rational language of computers. When dealing with flesh and blood anything is possible.

While negotiating the acquisition of a business during my younger years I learned the unpredictability of flesh and blood. During the sixth hour of these talks it became obvious that things were headed in the wrong direction. Out of desperation I suddenly asked, “What’s really bothering you?” The guy told me he was having trouble with his girlfriend and elaborated on the problems for a while. After I heard him out he suddenly said, “Let’s get this done”. I’m convinced that if I remained, “fixated” on the terms of the deal, the deal would not have closed. And yet wasn’t I there to talk terms? No. I was there to get the deal done.

The experience related above was an accident. Our goal is approach problems on the cloud free of fixed opinions, fixed ideas, and fixed understandings and to do this on purpose. Like Jack Bower on the TV series 24, take a look around and keep improvising until something works.

Whatever technical, marketing, or intractable people problem you are working on today remember, there is more than one way to skin a cat, you just have to find the way that works.

By Don Cleveland

About don

Although relatively new to technology writing Don Cleveland has been writing and working in the fields of business and psychology over the last 25 years. After earning his B.A. in psychology at the University of South Florida he has returned to finish an M.A. in counseling. His passions are shining psychology’s empirical light on the world of computing and work through research and writing.

View All Articles

Sorry, comments are closed for this post.

Comics
5% Of Companies Have Embraced The Digital Innovation Fostered By Cloud Computing

5% Of Companies Have Embraced The Digital Innovation Fostered By Cloud Computing

Embracing The Cloud We love the stories of big complacent industry leaders having their positions sledge hammered by nimble cloud-based competitors. Saleforce.com chews up Oracle’s CRM business. Airbnb has a bigger market cap than Marriott. Amazon crushes Walmart (and pretty much every other retailer). We say: “How could they have not seen this coming?” But, more…

Cloud Native Trends Picking Up – Legacy Security Losing Ground

Cloud Native Trends Picking Up – Legacy Security Losing Ground

Cloud Native Trends Once upon a time, only a select few companies like Google and Salesforce possessed the knowledge and expertise to operate efficient cloud infrastructure and applications. Organizations patronizing those companies benefitted with apps that offered new benefits in flexibility, scalability and cost effectiveness. These days, the sharp division between cloud and on-premises infrastructure…

Staying on Top of Your Infrastructure-as-a-Service Security Responsibilities

Staying on Top of Your Infrastructure-as-a-Service Security Responsibilities

Infrastructure-as-a-Service Security It’s no secret many organizations rely on popular cloud providers like Amazon and Microsoft for access to computing infrastructure. The many perks of cloud services, such as the ability to quickly scale resources without the upfront cost of buying physical servers, have helped build a multibillion-dollar cloud industry that continues to grow each…

Three Tips To Simplify Governance, Risk and Compliance

Three Tips To Simplify Governance, Risk and Compliance

Governance, Risk and Compliance Businesses are under pressure to deliver against a backdrop of evolving regulations and security threats. In the face of such challenges they strive to perform better, be leaner, cut costs and be more efficient. Effective governance, risk and compliance (GRC) can help preserve the business’ corporate integrity and protect the brand,…

Technology Influencer in Chief: 5 Steps to Success for Today’s CMOs

Technology Influencer in Chief: 5 Steps to Success for Today’s CMOs

Success for Today’s CMOs Being a CMO is an exhilarating experience – it’s a lot like running a triathlon and then following it with a base jump. Not only do you play an active role in building a company and brand, but the decisions you make have direct impact on the company’s business outcomes for…

Protecting Devices From Data Breach: Identity of Things (IDoT)

Protecting Devices From Data Breach: Identity of Things (IDoT)

How to Identify and Authenticate in the Expanding IoT Ecosystem It is a necessity to protect IoT devices and their associated data. As the IoT ecosystem continues to expand, the need to create an identity to newly-connected things is becoming increasingly crucial. These ‘things’ can include anything from basic sensors and gateways to industrial controls…

The Future Of Cloud Storage And Sharing…

The Future Of Cloud Storage And Sharing…

Box.net, Amazon Cloud Drive The online (or cloud) storage business has always been a really interesting industry. When we started Box in 2005, it was a somewhat untouchable category of technology, perceived to be a commodity service with low margins and little consumer willingness to pay. All three of these factors remain today, but with…

How To Overcome Data Insecurity In The Cloud

How To Overcome Data Insecurity In The Cloud

Data Insecurity In The Cloud Today’s escalating attacks, vulnerabilities, breaches, and losses have cut deeply across organizations and captured the attention of, regulators, investors and most importantly customers. In many cases such incidents have completely eroded customer trust in a company, its services and its employees. The challenge of ensuring data security is far more…

The Fully Aware, Hybrid-Cloud Approach

The Fully Aware, Hybrid-Cloud Approach

Hybrid-Cloud Approach For over 20 years, organizations have been attempting to secure their networks and protect their data. However, have any of their efforts really improved security? Today we hear journalists and industry experts talk about the erosion of the perimeter. Some say it’s squishy, others say it’s spongy, and yet another claims it crunchy.…