What I’m reading in 2015

Throughout the year when I find or hear about a book I might find interesting, I send myself a note with the name of the book.  This is an ongoing email throughout the year that I keep replying to and CC my wife.  Then at Christmas when someone asks my wife what I might like, she sends them the list of books. It works out pretty well and I end up with a nice stack of books to start the year.

Here’s one from 2010, and one from 2011.  Below is the stack I’m diving into for 2015. Most of the below were purchased from our local bookstore, Face In A Book.


  • The Forbidden Game by Dan Washburn – How the growth of once forbidden golf in China is a microcosm for how the country works.
  • One Lucky Bastard – Autobiography of Roger Moore. When I was a kid, he was James Bond and the epitome of a movie star.
  • Destiny of the Republic – Fascinating history of James Garfield.  A president taken way too soon, that could have had a huge impact on our country.
  • Goodbye Darkness – I’m a huge fan of William Manchester (see the next book) and I highly recommend A World Lit Only by Fire, but in this book he writes about his own experiences as a US Marine during WWII and the war in the Pacific.
  • The Last Lion – The first book in a trilogy biography of Winston Churchill. I started with the final of this series, and now go back to the beginning.

Communicating the benefits of IT security in higher education


As part of my job I spend a lot of time on college campuses talking with administrators, faculty and staff. One of the special things about higher education (for good or for ill) is the decentralization of basically everything.  Since many parts of a college or university have control over their own funding they run a lot of their own systems.  Right down to things like email servers.  This decentralization can often lead to exposure for IT breaches.

With an increased focus on data privacy and security (even the President is talking about it) how do administrators get everyone on board?

  • Avoid FUD (Fear, Uncertainty and Doubt) tactics, but do articulate the risks and costs to both the institution and individuals (faculty, administrators and students) of a data breach. Each group will be impacted differently, from costs to the institution, potential loss of research and compromise of research data for academics and loss of individual privacy for students. The impact must be understood for end users to change current behaviors.
  • Communicate that the provided services meet the academic communities’ needs. Whether it be seamless file sharing or collaboration solutions, end users will gravitate towards the solutions that are easy to use.
  • Involve the campus community in the assessment of needs and deployment of IT solutions. A shared ownership in the end product increases the likelihood that the community will use the central services and encourage others to do the same.

The above is from a post on cybersecurity I wrote for Edelman.com. Take a look and let me know what you think.

Get a “clue” – 15 years later – The Cluetrain is Back

Back in 1999, whoa 15 years ago, my boss Pam Alexander pointed all of us Alexandroids to a site for “The Cluetrain Manifesto.” It was addressed to “the people of Earth,” and like something you may have read about it had 95 Theses, of which the first was, “Markets are conversations.”  Read them all here.

The first homework for the class was to read the theses and identify five that spoke to them and talk about them with the class.

The one I always came back to is , “hyperlinks subvert hierarchy.” Anyone can link to the CEO.  They can tweet to them, subtweet them, tag them on Facebook. There’s no hiding.  I love that.

Image from cluetrain.com/newclues cc by e.re @ flickr

Fifteen years later Doc Searls and David Weinberger have nailed new clues to the door of the web and for that we thank you. I’m going to be spending a lot of time reading these but right now I’m feeling the power of “The Internet has liberated an ancient force — the gravity drawing us together..”

Find your “voice of authority”

Image from NPR.org/Meredith Rizzo

How does your voice sound at work?  Is it a little singsongy?  Is it not as steady as it could be?  If so, you might need to work on your “voice of authority.”  I’ve been thinking about this for awhile and have heard of it referenced in various contexts.  Just last night I was reading “Goodbye Darkness,” by William Manchester that is a memoir of his time in the Pacific theater of WWII and he talked about as a young NCO he didn’t have a “command voice.”  This is described as DLIPS: Distinctness, Loudness, Inflection, Projection, and Snap.  It’s a voice that makes people listen and commands authority.

While in PR we aren’t often barking commands to marching soldiers across a parade ground or battlefield, we often do need to take command of a situation or a room.  Additionally we need to speak with a voice of authority about a topic if we are going to convince people that it’s important or worth their time.

Today on NPR, there was a segment by Nell Greenfield Boyce on a study from Sei Jin Ko at San Diego State University that looked at the “voice of authority,” and voice of power. According to the story, “She says the voice of a person given more power was steadier and less singsongy, but also more dynamic “because it increased in pitch and intensity variability, so they went in and out of loudness more than those in low power.”

Listen to yourself and your colleagues and see if you can strengthen your voice of authority.