Solving Problems On The Cloud Part 3: Overcoming Unhealthy Fixations

Solving Problems On The Cloud Part 3: Overcoming Unhealthy Fixations

One example of an unhealthy fixation is the 2012 survey by Security Alliance who learned that the top threat listed by survey participants is data loss.

Of course security risks on the cloud cannot be ignored but clearly this problem is hugely overstated. Why executives and retail consumers, who lose everything from their car keys to their hard earned cash, (not to mention their own data mishaps) are so concerned about the cloud is more than fearing a loss of control. These individuals are struggling with what Gestalt psychologists refer to as fixation.

Understanding Fixations

Fixation is the tendency to focus on one specific aspect of a problem. All of us have experienced this phenomenon at one time or another referring to it casually as,  “freezing up”, or, “obsessing” over an issue. The Gestalt school also referred to a, “functional fixedness” that relates to limiting an object to its familiar use in every day life.

For the retail customer the functional fixation is based on fear, but the executive might just be exhausted by all the technological innovation over the past decade. The CEO may be thinking, “Hey, I’ve made huge investments in IT and all is well.” Of course this might be true for the moment, but in his functional fixedness he will only rest comfortably with the current tools until they break.

Solving Fixation Problems

Solving Fixation problems involves breaking free from herd mentality and approaching a problem from entirely different viewpoints. This idea is the very fire that fuels much of the success in the development of technological products. However, increasing the number of cloud adopters in the human realm is a lot different than strategizing within the rational language of computers. When dealing with flesh and blood anything is possible.

While negotiating the acquisition of a business during my younger years I learned the unpredictability of flesh and blood. During the sixth hour of these talks it became obvious that things were headed in the wrong direction. Out of desperation I suddenly asked, “What’s really bothering you?” The guy told me he was having trouble with his girlfriend and elaborated on the problems for a while. After I heard him out he suddenly said, “Let’s get this done”. I’m convinced that if I remained, “fixated” on the terms of the deal, the deal would not have closed. And yet wasn’t I there to talk terms? No. I was there to get the deal done.

The experience related above was an accident. Our goal is approach problems on the cloud free of fixed opinions, fixed ideas, and fixed understandings and to do this on purpose. Like Jack Bower on the TV series 24, take a look around and keep improvising until something works.

Whatever technical, marketing, or intractable people problem you are working on today remember, there is more than one way to skin a cat, you just have to find the way that works.

By Don Cleveland

About don

Although relatively new to technology writing Don Cleveland has been writing and working in the fields of business and psychology over the last 25 years. After earning his B.A. in psychology at the University of South Florida he has returned to finish an M.A. in counseling. His passions are shining psychology’s empirical light on the world of computing and work through research and writing.

View All Articles

Sorry, comments are closed for this post.

How To Humanize Your Data (And Why You Need To)

How To Humanize Your Data (And Why You Need To)

How To Humanize Your Data The modern enterprise is digital. It relies on accurate and timely data to support the information and process needs of its workforce and its customers. However, data suffers from a likability crisis. It’s as essential to us as oxygen, but because we don’t see it, we take it for granted.…

Lavabit, Edward Snowden and the Legal Battle For Privacy

Lavabit, Edward Snowden and the Legal Battle For Privacy

The Legal Battle For Privacy In early June 2013, Edward Snowden made headlines around the world when he leaked information about the National Security Agency (NSA) collecting the phone records of tens of millions of Americans. It was a dramatic story. Snowden flew to Hong Kong and then Russia to avoid deportation to the US,…

Using Private Cloud Architecture For Multi-Tier Applications

Using Private Cloud Architecture For Multi-Tier Applications

Cloud Architecture These days, Multi-Tier Applications are the norm. From SharePoint’s front-end/back-end configuration, to LAMP-based websites using multiple servers to handle different functions, a multitude of apps require public and private-facing components to work in tandem. Placing these apps in entirely public-facing platforms and networks simplifies the process, but at the cost of security vulnerabilities. Locating everything…

Digital Twin And The End Of The Dreaded Product Recall

Digital Twin And The End Of The Dreaded Product Recall

The Digital Twin  How smart factories and connected assets in the emerging Industrial IoT era along with the automation of machine learning and advancement of artificial intelligence can dramatically change the manufacturing process and put an end to the dreaded product recalls in the future. In recent news, Samsung Electronics Co. has initiated a global…

Why Security Practitioners Need To Apply The 80-20 Rules To Data Security

Why Security Practitioners Need To Apply The 80-20 Rules To Data Security

The 80-20 Rule For Security Practitioners  Everyday we learn about yet another egregious data security breach, exposure of customer data or misuse of data. It begs the question why in this 21st century, as a security industry we cannot seem to secure our most valuable data assets when technology has surpassed our expectations in other regards.…

Despite Record Breaches, Secure Third Party Access Still Not An IT Priority

Despite Record Breaches, Secure Third Party Access Still Not An IT Priority

Secure Third Party Access Still Not An IT Priority Research has revealed that third parties cause 63 percent of all data breaches. From HVAC contractors, to IT consultants, to supply chain analysts and beyond, the threats posed by third parties are real and growing. Deloitte, in its Global Survey 2016 of third party risk, reported…

Cloud Services Providers – Learning To Keep The Lights On

Cloud Services Providers – Learning To Keep The Lights On

The True Meaning of Availability What is real availability? In our line of work, cloud service providers approach availability from the inside out. And in many cases, some never make it past their own front door given how challenging it is to keep the lights on at home let alone factors that are out of…

Don’t Be Intimidated By Data Governance

Don’t Be Intimidated By Data Governance

Data Governance Data governance, the understanding of the raw data of an organization is an area IT departments have historically viewed as a lose-lose proposition. Not doing anything means organizations run the risk of data loss, data breaches and data anarchy – no control, no oversight – the Wild West with IT is just hoping…

How The CFAA Ruling Affects Individuals And Password-Sharing

How The CFAA Ruling Affects Individuals And Password-Sharing

Individuals and Password-Sharing With the 1980s came the explosion of computing. In 1980, the Commodore ushered in the advent of home computing. Time magazine declared 1982 was “The Year of the Computer.” By 1983, there were an estimated 10 million personal computers in the United States alone. As soon as computers became popular, the federal government…