Welcome!

PHP Authors: Liz McMillan, Carmen Gonzalez, Hovhannes Avoyan, Lori MacVittie, Trevor Parsons

Related Topics: Agile Computing, Linux Containers, Eclipse, PHP

Agile Computing: Article

IT Personnel Hit Hard by New Flu Outbreak

Are you vaccinated against an insidious new pandemic: the dreaded F-5 Flu?

The newest target population is IT presenters, and the geographic scope of this nascent disease is now global. Rapid onslaught of symptoms include the inability to focus and then agitation. Physical symptoms are fidgeting, then heavy sighing, culminating in the urge to scream.  The final symptom is Cerebral Mortis: the brain just shuts down.

The original or parent disease is DBP: Death by Power Point, but a recent variation, the F5 strain, is gaining strength especially in the IT community. What is this new mutation of Death by Power Point?

Embedded  Content
The new strain embeds video and MP3 files into seemingly innocuous engineering slides.  And in some populations where broadband is endemic, researchers have even seen streaming live web content. But the final result is the same: audience and presenter are left with an empty feeling of disappointment.


How and why did F5 turn into an IT pandemic, and what can you do to vaccinate yourself against this ruthless flu strain? Let's chart its course and prevention.

Phase I: Initial Infection
The CDC (Center for Disingenuous Content) has tracked how the F5 Flu has spread and morphed.  Its parent, Death by PowerPoint, started as a simple way to express ideas, but soon mutated into a prescribed formulaic approach. Because it seemed process-oriented, it hit the IT community hard.

In its early form, DBP manifested itself as three bullet points, but quickly grew to over a dozen bullets with an added image or graphic.  Sadly, once it hit a target population of engineers and IT personnel, DBP took on even more deleterious symptoms: huge charts mapping an entire ERP installation and organizational charts of 50 IT staff, all with names, titles, and job responsibilities—all on one slide.  The following is an example of one of the worst cases the CDC has seen.

Warning: this quad-chart slide is highly graphic:

The end result on the infected presenter was rote reading, and audience members soon evidenced glassy-eyed symptoms.

Phase II: F5 Morphing
The next phase of the disease was the insertion of clip art, thankfully, a short-lived itinerant phase, but the next iteration, the  highly contagious "special effects" took on a nasty turn: flying words, spinning pictures, animated charts, and slides appearing with sound effects. This is the genesis of the F5 strain: the need to hide behind effects because content or delivery is lacking.

Anecdotal evidence suggests a network engineer, to impress a sales crowd, embedded soundtrack music from Chariots of Fire into a presentation on Network Management Systems.  This initial carrier is classified as CNET1 (Chariots Network Engineer Transmitter) and what followed set the stage for the current epidemic.

Phase III:  Viral Distribution
The CDC tracked the spread of the Chariots of Fire presentation as it morphed to include an insidious video: an engineer receiving a security alert, then running in slow motion toward a server farm in a field of flowers.  The memetic music looped throughout four slides, exposing an auditorium of 900 IT personnel to multiple AV sources. They were now infected with the concept of using video and music in PPT, and F5 soon went viral.

Final Phase: Pandemic Propagation
The CDC has now amassed startling evidence:

•    Presenters embed YouTube videos in two out of every 10 presentations.
•    Organizations now hire production companies to create slick movies highlighting customer testimonials.
•    Graphics firms charge tens of thousands of dollars to add museum-quality images to slides.
•    At large events, a title slide now has associated  Lady GaGa "Just Dance" lyrics to pump and energize the crowd, and
•    CIOs and CTOs now use live demos as part of their presentation.

Prognosis: Continued Proliferation
The prognosis for the F5 strain is not good.

As IT departments take on a more critical role in their organizations, technology presentations will gain even more momentum within business units, where sales teams are frequently exposed to more high-end production values. IT will feel continued pressure to compete with glitzy sales presentations  The question remains: is there a way to stop the F5 or vaccinate against it?

Prevention: Vaccination
A pandemic always begins with one carrier, like CNET1. A single source is also the most efficacious way to begin eradication of a pandemic. 

Vaccination starts with one individual.  One speaker who realizes that slides should complement speaking, not take the place of it. One speaker who just talks solo without a deck.  Mass vaccination begins when that speaker has a great story about the benefits of IT, connects with the audience and presents a compelling case about the value of technology.

The ultimate vaccine is a confident spokesperson telling a clear IT value-story that captivates an audience. The listeners spread that concept, F5 becomes less powerful and mutates into a version we can all only hope for: the ESC strain.

More Stories By Core Ideas

Loraine Antrim is co-founder of Core Ideas Communication, a communications consulting agency focused on presentation development and media training for C-suite executives. Core Ideas enables executives to package and communicate relevant and compelling messages in their presentations and interviews. Loraine's expertise is killing butterflies. You know, butterflies: the feeling in your stomach before you have to present or speak in public. Loraine works with executives to create a powerful story, memorable messages and an authentic delivery style. Confidence kicks in, and butterflies scatter. Nice work killing butterflies! You can contact Loraine at: manager at coreideas.com

IoT & Smart Cities Stories
The deluge of IoT sensor data collected from connected devices and the powerful AI required to make that data actionable are giving rise to a hybrid ecosystem in which cloud, on-prem and edge processes become interweaved. Attendees will learn how emerging composable infrastructure solutions deliver the adaptive architecture needed to manage this new data reality. Machine learning algorithms can better anticipate data storms and automate resources to support surges, including fully scalable GPU-c...
Machine learning has taken residence at our cities' cores and now we can finally have "smart cities." Cities are a collection of buildings made to provide the structure and safety necessary for people to function, create and survive. Buildings are a pool of ever-changing performance data from large automated systems such as heating and cooling to the people that live and work within them. Through machine learning, buildings can optimize performance, reduce costs, and improve occupant comfort by ...
The explosion of new web/cloud/IoT-based applications and the data they generate are transforming our world right before our eyes. In this rush to adopt these new technologies, organizations are often ignoring fundamental questions concerning who owns the data and failing to ask for permission to conduct invasive surveillance of their customers. Organizations that are not transparent about how their systems gather data telemetry without offering shared data ownership risk product rejection, regu...
René Bostic is the Technical VP of the IBM Cloud Unit in North America. Enjoying her career with IBM during the modern millennial technological era, she is an expert in cloud computing, DevOps and emerging cloud technologies such as Blockchain. Her strengths and core competencies include a proven record of accomplishments in consensus building at all levels to assess, plan, and implement enterprise and cloud computing solutions. René is a member of the Society of Women Engineers (SWE) and a m...
Poor data quality and analytics drive down business value. In fact, Gartner estimated that the average financial impact of poor data quality on organizations is $9.7 million per year. But bad data is much more than a cost center. By eroding trust in information, analytics and the business decisions based on these, it is a serious impediment to digital transformation.
Digital Transformation: Preparing Cloud & IoT Security for the Age of Artificial Intelligence. As automation and artificial intelligence (AI) power solution development and delivery, many businesses need to build backend cloud capabilities. Well-poised organizations, marketing smart devices with AI and BlockChain capabilities prepare to refine compliance and regulatory capabilities in 2018. Volumes of health, financial, technical and privacy data, along with tightening compliance requirements by...
Predicting the future has never been more challenging - not because of the lack of data but because of the flood of ungoverned and risk laden information. Microsoft states that 2.5 exabytes of data are created every day. Expectations and reliance on data are being pushed to the limits, as demands around hybrid options continue to grow.
Digital Transformation and Disruption, Amazon Style - What You Can Learn. Chris Kocher is a co-founder of Grey Heron, a management and strategic marketing consulting firm. He has 25+ years in both strategic and hands-on operating experience helping executives and investors build revenues and shareholder value. He has consulted with over 130 companies on innovating with new business models, product strategies and monetization. Chris has held management positions at HP and Symantec in addition to ...
Enterprises have taken advantage of IoT to achieve important revenue and cost advantages. What is less apparent is how incumbent enterprises operating at scale have, following success with IoT, built analytic, operations management and software development capabilities - ranging from autonomous vehicles to manageable robotics installations. They have embraced these capabilities as if they were Silicon Valley startups.
As IoT continues to increase momentum, so does the associated risk. Secure Device Lifecycle Management (DLM) is ranked as one of the most important technology areas of IoT. Driving this trend is the realization that secure support for IoT devices provides companies the ability to deliver high-quality, reliable, secure offerings faster, create new revenue streams, and reduce support costs, all while building a competitive advantage in their markets. In this session, we will use customer use cases...