SlideShare uma empresa Scribd logo
1 de 47
Baixar para ler offline
The Xenial summary of:
Infonomics, by Douglas B. Laney
The Cloud Adoption Playbook, by Moe Abdula,
Ingo Averdunk, Roland Barcia, Kyle Brown, and Ndu Emuchay
The Stress Solution, by Arthur P. Ciaramicoli
Book Summary
for Busy IT Leaders
Authors
SethTemko
Rockin’ VP of Marketing, is an entrepreneur
who never seems to run out of ideas. This book
summary is one of those ideas.
Andy Grindstaff
Manager, Product Management, has two modes:
full-tilt enthusiasm and asleep. Fortunately, those
of us at Xenial only ever see the former.
Michael Kowalski
Director Product Communications, geeks out
over technology and storytelling.
© 2019 Xenial, Inc. A Global Payments Company. All Rights Reserved.
1
Thank you!
Xenial is deeply honored to serve you in this challenging industry. We care about
you. We care about your personal and your professional success. We know in that
commitment to success “staying sharp” with knowledge is a key driver. But for
most, time is in limited supply. To that end, Xenial offers as a gift three key books
to help with your personal success and your professional development.
We’ve also taken the time to write summaries of the books to help you in making
the most use of your valuable time.Thank you for being that great, wonderful you.
Sincerely,
The Xenial Team
2
Infonomics: The Xenial Summary...........................................................................3
The Cloud Adoption Playbook: The Xenial Summary............................................ 16
The Stress Solution: The Xenial Summary............................................................28
3
Infonomics:The Xenial Summary
How to Monetize, Manage, and Measure Information as
an Asset for Competitive Advantage
Written by Douglas B. Laney
Summarized by Seth Temko, Xenial
Summary
If you believe that competitive advantage in your business is a “data game”, that
data is undervalued in your overall organization and you seek to significantly
increase your company’s cultural embrace of data as a significant business tool
then… Infonomics is a must read.
Infonomics is not a deep dive into Big Data, machine learning or AI. Instead it’s
a strategic guide from a consultative perspective in recognizing the value of data
in your organization and a planning strategy tool to get buy in organizationally to
creating a data-centric and data-driven organization.
This book is a good blend of theory and implementation. Its concepts are laid out
very logically that adapts well to a presentation of concept and hierarchy thought
and action.
This book is high on logic and zero on entertainment. Written in a dry style, there
is nothing riveting or entertaining about this tomb. It is dense on content that will
make you think but not “wonder about the stars”.
Consider this book a tool to give you a framework of thought, conversation and
planning to raise the profile of data in your business outside of “just” the IT orga-
nization. Please note this book is a product of Gartner, Inc. which draws heavily
from that consulting organization’s philosophy and engagement methods.
Introduction
This short introduction pulls from a childhood story of the author’s life as an illus-
tration of the changing role and importance of information. It also introduces the
term “infonomics” as the marriage of “information” and “economics”.
4
Chapter One:Why Monetize Information
Laney opens the chapter with a description of a multi-thousand-acre farm com-
pletely attended by fully autonomous farm equipment tied to networks, software
and databases allowing a single farmer to manage, operate and control all opera-
tions from a single table using a single computer. Unheard of decades ago, farms
have become enormously large using the same “small farm” workforce. How?
Data tied to technology.
Within this food production industry metaphor, he then discusses the equipment
manufacturers that are collecting and utilizing data feeds from their own field-de-
ployed equipment to drive the value cycle to the farmers.
Finally, he discusses data utilization by seed, fertilizer, pesticide and other
suppliers. This data “chain” has caused unparalleled levels of food production
efficiency. It also sets the key example for context around the theory of infonom-
ics which is “the theory, study, and discipline of asserting economic significance
to information”.
Infonomics theory posits that information should be valued as its own asset
class in the same way that money and capital goods are assets.
“Infonomics provides the framework businesses and governments need to value
information, manage it , and wield it as a real asset.”
This book, Infonomics, is focused on CEOs, CIOs, CFOs and enterprise archi-
tects. The book is structured in three parts as a guide to “monetize, manage and
measure your information”.
Monetize: Justification, Inspiration, Execution
Manage: Barriers, Framework, Organization/Roles
Measure: Quality, Value, Economics
The author lists top monetization myths:
•	 “Information must be sold to be monetized
•	 Monetization requires an exchange of cash
•	 Monetization only involves your own information
•	 Monetized information typically is in raw form
•	 One must be in the information business to monetize information
•	 Few others would want our information
•	 It’s best for us just to share our information with our suppliers
and partners.”
5
Section I: Monetization
Chapter 2: Prime Ways to Monetize Information
Monetization of information can be direct and indirect “cash in the door”. There
are many business opportunities and improvements that are derived from strate-
gic use of information.
These include:
•	 “Increasing customer acquisition/retention
•	 Creating a supplemental revenue stream
•	 Introducing a new line of business
•	 Entering new markets
•	 Enabling competitive differentiation
•	 Bartering for goods and services
•	 Bartering for favorable terms and conditions, and improved relationships
•	 Defraying the costs of information management and analytics
•	 Reducing maintenance costs, cost overruns, and delays
•	 Improving citizen well-being.”
Chapter 3: Methods of Monetizing Information
The author uses a corporate relocation to illustrate the economic opportunity
for vendors who served him in the relocation. Additionally, he points out that
his “former” banker called him a year later to sell him a product but didn’t realize
that (1) he’d moved and (2) the bank had purchased his new mortgage so he was
already a customer. This serves as a backdrop to discuss the methods of moneti-
zation of information.
These include:
•	 “Establish an information product management function tasked with
generating measurable economic benefits from available information
assets
•	 Develop and maintain an inventory of possible information assets
from throughout the organization as well as from second- and third-
party sources
•	 Evaluate alternatives for both direct and indirect information monetization
•	 Identify, adopt, and adapt high-value information monetization ideas from
other organizations, especially those in other industries
•	 Test information monetization ideas for feasibility
•	 Prepare and package information for monetization
6
•	 Establish and cultivate a market for the information asset.”
The author provides extensive examples and guidelines for the above points.
Chapter 4: Analytics -The Engine of Information Monetization
The author uses Mobilink, Pakistan’s leading provider of telecommunications,
as a case study of a market dominant business needing to defend its market
share from competitive pressures. In this case, Mobilink used SAP’s InfiniteIn-
sight product to analyze customer behaviors and needs in order to provide new
products and provide value to prevent its customer base from switching over to
competitors and generate new revenues.
The author discusses the need to move from “Descriptive to Diagnostic, Predic-
tive, and Prescriptive Analytics”. He then uses efforts from Coca-Cola to illustrate
this value shift.
The keys to the value shift include: Exploiting Big Data. Improved and actionable
decision making. Identifying monetizable insights. The author breaks down these
high-level topics into specific examples and breakdowns such as monetizing
increased data volumes and velocity, embracing complexity, automating gover-
nance, etc.
Section II Managing Information as an Asset
Chapter 5: Information Management Maturity and Principles
The author laments that businesses create best practices to track their balance
sheet but have inadequate data management and data history practices. This
lack of recognition is a challenge with CEOs and CFOs. “Why don’t organizations
manage their information with the same discipline as their other, formally-recog-
nized enterprise assets?”
The author lays out Gartner’s EIM (enterprise information management) maturity
model, which consists of Vision, Strategy, Metrics, Governance, People, Process
and Infrastructure.
There are 5 levels of EIM maturity:
•	 Level 1- They are generally aware of key issues and challenges, but
lack the budget, resources, and/or leadership to make any meaningful
advances in EIM. This is 10% of organizations.
•	 Level 2- They are generally reactive, application-centric, waiting for
problems and then reacting, which can manifest in significant business
losses. This is 30% of organizations.
7
•	 Level 3- They are somewhat proactive and have begun building
information management frameworks. This is 40% of organizations.
•	 Level 4- They have clear leadership in this area and can manage and
leverage information across multiple programs. They have organized,
enterprise-level coordination and management. This is 15% of
organizations.
•	 Level 5- They have optimized many or most aspects of “acquiring,
administering, and applying information as an actual enterprise asset with
high-functioning organization structures, talent and technologies. This is
5% of organizations.
There are five barriers to information asset management: Awareness, Leader-
ship/Management, Business Governance, Enabling Systems/Practices and Justi-
fication. The author outlines systems and constraints around these topics.
Chapter 6: Information Supply Chains and Ecosystems
The author uses the concept of “information supply chain” as an illustration for
the collection, organization and delivery of information within and outside of an
organization.
“A supply chain is a system of activities and resources involved in moving a prod-
uct or service from the point where it is manufactured to where it is consumed.”
The author applies SCOR, the Supply Chain Operations Reference, to this infor-
mation model, as follows:
•	 “Plan- Process that balances aggregate demand and supply to develop
a course of action which best meets sourcing, production and delivery
requirements.
•	 Source- Processes that procure goods and services to meet planned or
actual demand.
•	 Make- Processes that transform products to a finished state to meet
planned or actual demand.
•	 Deliver- Processes that provide finished goods and services to meet
planned or actual demand, typically including order management,
transportation management, and distribution management.
•	 Return- Processes that provide finished goods and services to meet
planned or actual demand, typically including order management,
transportation management, and distribution management.
•	 Enable- Processes for establishing and operating the supply chain
procedures, resources, and facilities, including relationships with all
stakeholders and other involved parties.”
8
The author translates the metrics from the SCOR model to the Information
Supply Chain which include: Reliability, Responsiveness, Agility, Costs and Asset
Management Efficiency.
The author then turns to an information ecosystem definition of Ecosystem
Entities, Ecosystem Features, Ecosystem Processes, Ecosystem Influences and
Ecosystem Management.
Chapter 7: Leveraging Information Asset Management Standards
and Approaches
In this chapter, the author begins by highlighting the lack of official data/infor-
mation quality standards. There are several unofficial organizations but not an
ISO certified body. These ISO standards are currently established for software
standards but they are not specific to information assets.
ITSM (Information Technology Service Management) has a set of processes,
procedures and other tools known as an Information Technology Infrastructure
Library (ITIL) that encompasses ITIL service strategy, service design, service
transition, service operation and continual service improvement.
The author proposes that these processes and procedures could be borrowed
from the ITIL playbooks to be Information Service Strategy, Information Services
Design, Information Service Transition, Information Service Operations and Infor-
mation Service Continual Service Improvement.
The author then explores content management approaches and discusses Re-
cords Information Management (RIM), Enterprise Content Management (ECM),
Library Science and Balance Sheet Asset Approaches.
Fiduciary Management is discussed in the light of Controllership, Treasury Duties
and Economic Strategy.
Human Capital Management is discussed with the People Capability Maturity
Model (P-CMM) which is a human capital resourcing model first developed in
1995. By substituting “information” for “workforce” he lays out an information
management model based on this workforce management model.
Chapter 8: Applied Asset Management for Improved Information Maturity
This chapter begins with a deep dive into the Gartner EIM model. The author
elaborates on the full seven dimensions of this model: Vision, Strategy, Metrics,
Governance, Organization Roles, Life Cycle and Infrastructure.
Each topic has some illustrative stories/examples and discusses the cons of not
addressing these areas.
9
Section III: Measuring Information as an Asset
Chapter 9: Is Information an Asset?
The author uses a financial event in 2000 to illustrate the failure of transparency
in corporate accounting practices as a model failure preventing effective busi-
ness decisions from being made. It introduces the view that accounting infor-
mation is an asset of a company and sets the stage for the rest of the book, in
which the author explores “what constitutes an asset from the perspectives of
accounting professionals and the law”.
The author points out that even the information assets of “information compa-
nies” such as TransUnion, Onvia, HG Data, and The Nielsen Company (formerly
known as A. Nielsen) are nowhere to be found in the balance sheet. According
to accounting rules, information is not considered “valuable” for these compa-
nies.
Some persons claim information cannot be tracked, that it is non-depleting and
therefore can not be part of accounting. To the accounting profession today, this
means information should not and is not valued by a company.
The author spends several pages giving real world examples and concepts of
Information Economic Value. This is nowhere more obvious than Wall Street’s
valuations of “info-savvy” companies.
The author defines an asset and the reporting of assets on balance sheets. He
then poses the question “Is information a liability?”.
Chapter 10:Who Owns the Information?
This chapter explores information ownership from several angles:
•	 Legal precedent for information ownership claims
•	 Accounting principles
•	 Language used inside of organizations
•	 Ownership of our personal information
•	 Whether we can own something related to information
In a disagreement over ownership of a database in the UK, the court ruled that
information should not be considered property. A dissenting justice in the case,
however, pointed out that the ruling was based on “ignorant notions of informa-
tion and antiquated property laws…[since] today, we live in an electronic world in
which information holds legitimate commercial value.”
10
Legal precedent for information ownership is complex. The author cites The Aus-
tralian Computer Society’s Data Taskforce working paper:
“The ability to use, replicate and share data means it cannot be considered in
the same way as a physical asset with an ‘owner’. Rather, it is important to think
of rights, roles responsibilities and limitations for those who access data in the
various process from collection, sharing and storage.”
Even laws regarding ownership of a physical asset such as a home vary widely.
Liens, mortgages, property taxes, and the like put parameters, restrictions, and
limitations on true ownership.
Control vs location: it matters. The author cites a case in which a U.S. court
ordered Microsoft to relinquish information stored in a data center in Ireland.
The upshot for CIOs or others responsible for corporate information storage and
transfer: limit your assumptions with regard to the locality of information. As a
result of the Ireland data case, Microsoft took the bold step of having local com-
panies own the hardware and data centers upon which Microsoft data sits.
The author cites a case in which one party misused the database created by an-
other party. The lesson from this is that “until sufficient and consistent laws are
formulated, assume that information is not legal property and you cannot confi-
dently own it. Therefore, your focus should be squarely on the rights of those to
whom you entrust and avail information within your control.”
The author next turns to the question of whether information can be considered
an asset, as it so often is referred to in everyday casual conversation. He gives
the accounting definition of an asset:
•	 “Something owned and controlled by an entity
•	 Something exchangeable for cash, and
•	 Something that generates probable future economic benefits which flow
to that entity.”
Control. The issues in play here include:
•	 Whether information is shared (you may retain rights to it, but it may be
no longer under your control)
•	 Separability, that is, is it bound to an application, e.g., ‘the salesforce.
com data’? In the past, the two may have been inseparable; however,
increasingly, information generated by one function or application is
leveraged elsewhere, and is, in effect, becoming unbound.
Exchangeable for Cash. The author checks this box by citing data brokers Equifax
and J.D. Power, among others.
11
Probable Future Economic Benefits. The author argues that, just like a car sitting
on an auto sales lot or a can of soup on a grocery store shelf, dormant informa-
tion assets have probable future economic value.
Next the author considers ownership from several angles.
Usage. Although information cannot be protected, for the most part, like other
forms of intellectual property, “how information is created or used can be consid-
ered property in the eyes of the law.”
Individuals and companies today are using the business method patent to secure
ownership of processes. An example is the increase in patents on Algorithms,
which the author cites “have grown 30x over the last fifteen years.”
Ownership by Departments or Individuals
The author juxtaposes the ideas of ownership and trustee, having found several
leaders in the industry who prefer the latter and quotes Barb Latulippe, the Chief
Data Officer at Dell EMC, “Ownership? I don’t like the term. We’re trying not
to use it anymore. It just encourages politics and information silos. Our policy
states that data is a shared asset and the property of the company, not individual
business units or people.”
“Data trustee... may not have the authoritative connotation “data owner” does...
in the context of a fiduciary, discussed in chapter 8, it carries both legal and
ethical weight.”
Trustee conveys the idea of shared ownership and shared responsibility as ap-
plied to information, the author says.
“Information sovereignty conundrums” do exist, however, and these come into
play when geopolitical and regulatory factors are applied. The author cites the
example of McDonald’s Corporation in the U.S. trying to access data from some
of its operations in Europe. Depending on a given country’s regulations on data,
international borders can create hurdles–and formal processes–for information
sharing. Within the U.S. even federal and state agencies end up in unintended
information sharing battles, guided and constrained by the regulations they must
follow.
Chapter 11: Quantifying and Accounting for Information Assets
An interesting test of the value of information and whether it is considered an
asset was the tragic September 11, 2001 terrorist attacks on the World Trade
Center’s Twin Towers. In the aftermath, companies reeling from the loss of
12
data (this was before cloud storage and redundancy had been widely adopted),
many sought recourse by appealing to their liability insurance carriers. Insurers,
however, denied the claims on the grounds that information was not considered
property.
Shortly after, the U.S. insurance industry updated its liability policy template
to exclude information assets from property coverage. Further, the accounting
profession updated a key financial standard to state that “certain intangibles
including customer lists and the like cannot be capitalized.”
Despite how insurers and accountants view information assets, the author ar-
gues that there are many reasons why companies should measure their informa-
tion quality of value. He also shares various models of how this can be done.
First, Why.
The author re-frames an oft-quoted saying “You can’t manage what you don’t
measure” as follows:
“It’s easier to manage what you measure.” Or, “It’s best to measure what you
intend to manage.”
When applied to information: If we get a handle on information the way we do
other company assets – if we can get our arms around it – “measure it, report on
it, understand its characteristics and how it’s used”, this, in itself, ends up affect-
ing how we “capture, produce, manage, and use it.”
Here are some possible information-related benefits of getting a handle on our
information and assigning it a value:
•	 Prioritizing information-related initiatives and justifying their benefits:
knowing which information assets are most critical can help you decide
which activities related to information are most important. Of course, it’s
good to have data behind these decisions.
•	 Creating a common language about information- its “quality, security,
availability” and so on leads to common understanding among the people
in the information value chain.
•	 Improving information security: Organizations look for–but seldom find–a
benchmark for how to budget for infosec. Quantifying the value of
information helps at least put a stake in the sand as a reference point.
Next, the author discusses the business-related benefits of measuring informa-
tion value:
13
Improving information monetization. The author poses the question: “If acquiring
and administering an information asset has a measurable expense, shouldn’t you
be recouping it, at least?”
Understanding corporate value. Doesn’t proper alignment of strategy and bud-
gets require a valuation of all assets, including information?
Growing market valuations. If no one else sees information as an asset, investors
seem to. “Nearly half of equity analysts consider a company’s information along
with its analytics capabilities in valuing the business as a whole.”
Making an impression on investors. “There’s evidence from IP advisory firms
to suggest that companies that are internally valuing their information assets,
even though they are non-auditable per accounting regulations, are rewarded by
potential suitors.”
Next the author discusses measuring the value of information.
The author posits that “companies that take seriously the notion of information
as a corporate asset should engage in the same quality assessment discipline as
with their traditional physical and financial assets.” He next lists and describes
objective and subjective data quality metrics.
Then the author gets to the heart of the chapter, describing various informa-
tion asset valuation models. He quotes the celebrated statistician Dr. George
Box, who said “All models are wrong; some models are helpful.” He goes on to
remind readers that “Models are meant to approximate reality using available
inputs and accessible formulae; they are not a substitute for reality itself.”
As a prelude to his descriptions of various valuation models, the author states,
“All asset valuation-related methods such as internal rate of return (IRR) or eco-
nomic value add (EVA), along with all accounting methods for any kind of asset,
are based on a set of assumptions. It is important that assumptions are properly
described and consistently applied.”
For several valuation models, he gives an Overview, a Formula, Implementation
notes, and finally Benefits & Challenges.
The author then lists additional models and their author(s) / developer(s). Next,
he covers understanding and closing information value gaps.
He closes the chapter by giving examples of how certain information valuation
models may be used in combination.
14
Chapter 12: Adapting Economic Principles for Information
As the author stated in various places in the book, Infonomics is a concept and a
set of disciplines that is in its infancy. Therefore, applying economic principles to
information assets will need some examination and formulation.
“In the current information-driven society and increasingly digitalized world, sen-
timents are shifting from the economics of tangible assets to the economics of
information—“infonomics”—and other intangible assets.”
“Classic macro- and microeconomic principles were developed to better un-
derstand and improve the consumption of traditional goods and services, not
information assets.”
Therefore, “The unique qualities of information assets and the way they are pro-
duced and consumed compel us to re-examine economic principles and models,
and adjust them as necessary for this new age asset.”
In the remainder of the chapter, the author describes and reformulates the princi-
ples of economic principles that apply to information, including:
•	 “How the principle of supply and demand operates differently with
information than with other assets
•	 How to understand and apply the forces of information pricing and
elasticity
•	 How understanding the marginal utility of information for both human and
technology-based consumers of information assets must be factored into
selecting and publishing them
•	 How the information production possibility frontier affects information-
related behavior and investments
•	 How to use Gartner’s information yield curve to conceptually integrate the
concepts of information monetization, management, and measurement
for improved information-related and business strategies.”
Chapter 13: InfonomicsTrends
To close the book, the author discusses trends in infonomics. He starts by listing
eleven trends that indicate that various players in the information ecosystem are
directly or indirectly urging information leaders to treat information as a legiti-
mate asset. Three of the eleven are:
•	 “Continued globalization requires that organizations improve information
sharing and ingestion
•	 Smart government services based almost entirely on a platform of
information
•	 The rise of the machines, algorithmic sprawl, and the promise of AI rely
on...information sources…”
15
The author then describes what he foresees happening in six areas related to
information itself:
•	 Big data
•	 Organizational inhibitors to information monetization
•	 Information rights conscientiousness
•	 Advanced analytics, algorithms, and artificial intelligence
•	 Information infrastructure
•	 Information security and privacy
Finally, the author shares his outlook on the future of Infonomics. He introduces
his predictions with a quote from a company that has made great strides in view-
ing and valuing information as an asset.
“Our finance people used to chuckle about the idea of information as an asset.
The reality is that for most employees, our business is data. 70% of our employ-
ees don’t touch an aircraft, but everyone touches data.” —Matt Cordner, Director
of Global ERP and Analytics, Textron (Parent company of Bell Helicopter, Beech-
craft, and Cesna)
The author then gives is predictions for each of the three areas he structured the
book upon:
•	 Monetization
•	 Management
•	 Measurement
Appendices
The book offers two handy appendices:
•	 Appendix A contains a bullet list of information management maturity
challenges grouped by categories such as vision, strategy, etc.
•	 Appendix B lists sample legal rulings related to information property rights,
with a short description of each case.
16
The Cloud Adoption Playbook:
The Xenial Summary
Proven Strategies for Transforming Your Organization
with the Cloud
Written by Moe Abdula, Ingo Averdunk, Roland Barcia, Kyle Brown,
and Ndu Emuchay
Summarized by Andy Grindstaff, Xenial
Summary
The vast majority of people who are reading this have, in one way, shape or form,
been confronted with the question of when or how to move their business into
a model that leverages cloud technology. Most are probably already leveraging
cloud technology in some way, but might be wondering if this is something they
should be pursuing more seriously. They’ve probably encountered naysayers who
wonder if this is just another technology trend that won’t really make it past the
Early Adopters chasm (as defined in the Beal and Bohlen technology diffusion
process in 1957).
What this book (and those of us at Xenial) can state, with finality, is that the
cloud has made it past the technology adoption chasm. It can no longer be
considered an emerging technology or a fad; cloud is now an intrinsic part of the
enterprise fabric. In a 2017 Forbes article, Louis Columbus quoted from an Intel
survey that showed 80 percent of all IT budgets would be committed to cloud
applications and solutions. The thesis of this book is that if your business is not
thinking along the lines of that, you could be at a serious disadvantage.
Consider this excerpt:
	 A recent IBM study of more than 800 cloud decision-makers defined
organizations that utilize the cloud to gain competitive advantages as
“Pacesetters.” These organizations use cloud to re-imagine business
models, make better decisions based on analytic insights, and serve
customers in new ways to create winning business outcomes.
Pacesetters experienced almost 2 times the revenue growth and nearly
2.5 times higher gross profit than their peer group.
What this book helps to do is answer the inevitable next question someone
might have after reading that: “Ok, that sounds great. How do I actually adopt
this new technology?” This book is appropriately titled The Cloud Adoption
17
Playbook because it breaks down all the pieces of your business that need to be
addressed to successfully adopt this technology that is transforming businesses
all over the world. This Playbook is for those who are (or aspire to be) catalysts
for digital transformation in their organizations, leaders who see the need for
transformation as well as those who have direct responsibility in executing it.
The authors are a group of experts who are part of IBM’s Cloud Garage and
have consulted with many large enterprises from a variety of industries to help
them move part or all of their technology platforms to the cloud. The reader can
be confident that when advice is offered through this book, it’s done with an
expertise that’s already been there and done that. They believe “the most crucial
decision that a company can make to successfully pursue a digital transformation
strategy is to wholeheartedly yet thoughtfully adopt the cloud as the IT platform
of choice.”
Many companies have dabbled in the cloud; however, no business has ever dab-
bled its way to success. What follows are summaries and important points of the
10 chapters in this book to help equip your enterprise to do more than just dabble
in cloud adoption. It is a Playbook that provides the necessary moves to make
for undertaking a holistic technology transformation that will forever change the
future of your company.
Chapter 1 – Business Drivers
First, let’s offer up the definition for what cloud computing is:
“Cloud computing is a model for enabling ubiquitous, convenient, on-
demand network access to a shared pool of configurable computing
resources (e.g. networks, servers, storage, applications, and services)
that can be rapidly provisioned and released with minimal management
effort or service provider interaction.” (National Institute of Standards and
Technology, 2011)
Ultimately, cloud technology is just a means to an end and that end needs to be
defined for an organization to be successful with the cloud. The intent you have
for cloud adoption is the first step, and identifying those business drivers is key.
Within enterprises, leaders are aligning their cloud adoption and digital transfor-
mation programs through strategic intents such as:
•	 Creating a customer-focused enterprise by optimizing data and
leveraging analytics
•	 Increasing flexibility and streamlining operations
•	 Driving innovation while managing cost
•	 Optimizing enterprise risk management
When defining these strategic intents, you must also consider your enterprise’s
tolerance for sustained or disruptive innovation and how that fits into its priori-
18
ties. The process begins by clarifying your objectives. You must decide what you
really want from digital transformation and cloud adoption. You must determine
the strategic intent behind those objectives, determine how well aligned your
enterprise is to those objectives, and continually re-evaluate what you must do to
align with these objectives.
Digital transformation is not easy; it requires inspiration, a clear and consistent
focus, and persistence over time. As Simon Sinek famously wrote: “Start with
the why.”
Chapter 2 - Framework Overview
Every good plan needs an outline and this chapter gives just that.
First, it is important to recognize and understand the challenges that an enter-
prise will encounter during the transformation process. These are some areas the
authors identified:
•	 Organizations moving to the cloud must make migration and
modernization decisions to determine the best fit for existing applications
and data.
•	 Organizations require the right talent to fuel innovation and usually require
organizational-culture upgrades to support new ways of working to
achieve the intended velocity of change.
•	 Organizations can encounter risks as tool selections made for traditional
enterprise application development may not be the right ones for
development in the cloud.
•	 Organizations require a development methodology that is suited for
both cloud-enabled and cloud-native development, as well as enabling
management and delivery in a multicloud model at scale.
•	 Organizations face operational challenges in integrating, managing, and
securing off- and on-premises applications and data as a consistent whole.
To overcome these challenges, organizations must:
•	 Practice new forms of agile engagement and organizational alignment
•	 Rethink and renegotiate relationships with providers
•	 Establish new foundations (in terms of methods, tools, and skills) to
propel transformation
For this, the authors created their framework- which is discussed across Chap-
ters 4-10. In this chapter however, they outline the ten key actions within this
framework that they believe must be taken to ensure the types of alignment
needed for successful outcomes:
19
1.	 Involve the right people
2.	 Achieve business and technology alignment
3.	 Take a holistic approach across business dimensions
4.	 Assume an outside-in, client-centered approach
5.	 Open the aperture of your business considerations to new possibilities
6.	 Show progress and identify quick wins
(This one is key to sustaining momentum!)
7.	 Collaborate actively
8.	 Balance sustained and disruptive innovation
9.	 Establish success criteria
10. Account for a multicloud hybrid model
Chapter 3 - Strategy
A vision without a strategy remains an illusion.- Lee Bolman
Ninety percent of business and technology executives are including cloud
computing in their current or three-year plans. While the value of cloud is well un-
derstood, and investments are funneled to make progress toward a cloud-based
transformation, the experience of the authors highlights that only a small per-
centage of enterprises had a documented cloud adoption strategy when asked.
Strategy is what enables alignment between vision and execution. That strate-
gy should translate vision into practical roadmaps that are broad, prescriptive,
actionable and most critically, flexible.
Here are six prescriptive steps that the authors identify as being required to
develop a cloud strategy:
1.	 Define business objectives and constraints.
2.	 Complete analysis of your workload portfolio.
3.	 Envision your future state and analyze your current state.
4.	 Assess your organization’s readiness.
5.	 Build an execution framework with defined strategic milestones.
6.	 Define proven approaches best suited to your organization.
Remember this: the technologies used are only part of implementing a success-
ful cloud strategy. An organization’s structure and its willingness to adopt new
technologies and to manage new operating models are equally important and
should not be overlooked.
20
Chapter 4 - Culture and Organization
An organizational culture is the combination of the shared values, beliefs, and
social norms in an organization, resulting in behaviors, practices, and customs
that the members of the organization follow. It is formed and molded by inter-
nal and external forces acting on the organization; it reflects the history of the
organization, sometimes derived from a shared mythology and the philosophy of
the organization.
Understanding your company’s culture is the first step toward making the right
organizational decisions. Here are some cultural elements of your company that
you need to consider and weigh:
•	 Willingness to embrace change- Cloud services change A LOT of the way
traditional IT is run, especially when it comes to pace and methodology.
•	 Decision-making style- Cloud technology allows for a lot of flexibility to
adapt to various styles. You just need to know which style your enterprise
falls under.
•	 Attitude toward risk- You must find the balance between risk-averse and
gun-slinging.
•	 View of failure- When working in a cloud-enabled world, you must provide
a culture in which small failures are viewed as learning experiences.
It’s the only way that a team can move on to larger, more ambitious
experiments with potentially larger payoffs.
When adopting the cloud, you are going to need to make changes in your talent
and embrace flexibility. Remember, any time you propose a change in an orga-
nization, you will encounter resistance to that change. Here are two changes in
your organization that will happen in a successful adoption of the cloud:
•	 You’re going to need more generalists and fewer specialists.
•	 Your organization will become less compartmentalized and
more integrated.
The rest of the chapter is devoted to suggestions of organization that the authors
have seen be effective in enterprises adopting the cloud.
First, the goal would be that the organization can evolve to an agile-based squad
model (which was originally formulated by Spotify). These squads would:
•	 Be divided into either an application development squad or a specialized
support squad
•	 Be made up of 10 people or fewer working in development pairs with a
squad lead and a product owner
•	 Be small, autonomous, and co-located
21
•	 Be able to be grouped up with other squads to form a guild with similar
interests or specializations who could then be grouped into tribes for
larger development efforts
Second, to effectively transition from traditional models to agile-based squad
models, the authors recommend establishing a center of competency (COC). A
COC is:
•	 An independent body that is not owned by any particular development
group, architecture board or operations team. It is supported and
staffed by all organizations that have a stake in the success of the new
technology.
•	 A managed entity with real priorities and deliverables, not a think tank to
come up with new ideas.
•	 In charge of overseeing project conception, skills acquisition, and
knowledge dissemination with the goals of promoting best practices,
providing as-needed expertise and helping teams become self-sufficient
so that the enterprise is able to look ahead at new disruptive technologies.
Putting a COC in place is the best recommendation the authors can give for
building an organization that will be successful at embracing change. Sometimes
prior to implementing a full COC, starting with one or more pilot projects can
help get momentum but the goal is that an enterprise can expand that in order to
be successful.
Chapter 5 - Architecture andTechnology
In this chapter, the book begins to dive into more of the technical recommen-
dations associated with moving an enterprise to the cloud. The main focus here
is on the crucial role of architecture in modern cloud projects and the architects
who are crucial for setting direction and guidance for cloud migration.
Enterprise architects are responsible for:
•	 Empowering developers and site reliability engineers to make more
decisions during project execution so that architects can focus more on
strategy for repeatable success
•	 Properly assessing workloads of teams so that there is not an imbalance
•	 Building artifacts (diagrams and texts describing the abstract concepts) for
the broader platform so that developers can execute upon them
•	 Defining non-functional requirements such as page-response time or
maintainability and manageability of the platform
Just as a conductor of an orchestra can play every instrument they conduct, the
architect should understand and have experience in all the systems they are
designing. They are expected to be leaders in the development and operations
22
spaces because of their experience. Ultimately, the architect role will be re-
sponsible for providing a reference architecture and guidance to the team that is
implementing a DevOps approach (an approach that the authors deem critical to
being a successful cloud-based enterprise).
The components of a reference architecture are:
•	 Define a clear set of architectural styles- such as microservices and
web development
•	 Define a clear set of nonfunctional architectural aspects
•	 Convey meaning by using only simple, minimal pictures
•	 Provide example implementation artifacts in the language of
implementation- such as GitHub pages of sample code for developers
In order to be successful in a microservices application environment, the concept
of DevOps should be instilled. Several development- and operation-specific
aspects of this are:
•	 Continuous provision
•	 Continuous build
•	 Dependency management
•	 Continuous testing
•	 Continuous deployment
•	 Monitoring and logging
•	 Cloud management services
This chapter also gives an example of a reference architecture using a modern
microservices approach to applications as well as tips on instilling the concept of
DevOps into the enterprise.
Chapter 6 - Security and Compliance
This chapter is specifically designed for the Chief Information Security Officer
(CISO) at your enterprise. Security and compliance looks very different in the
cloud but is no less important.
First, here are some assumptions from the traditional IT model that you might
have that will change when moving to the cloud:
1.	 You can control access, security, and confidentiality all the way down to
the physical hardware. This will never be the case and you will have to
work more closely with the providers and vendors you select to make sure
they meet your criteria.
2.	 Everything is contained within your network. This will also never fully be
23
the case. You will need to ensure that you set up proper monitoring and
validation to ensure compliance is maintained.
3.	 Your team is responsible for everything. This will cease to be the case. The
roles on your team must change and adopt the role of generalists rather
than specialists. Then you can leverage the specialization of the providers
and vendors you are partnering with.
4.	 All your data must be stored locally. By nature of the cloud, this will never
fully be the case either. You will likely need to adopt multicloud hybrid
models and lean on your enterprise architects and vendors to properly
adhere to regulations.
5.	 Your developers need to be security experts. They do not need to become
full-time security experts, but instead can leverage approved, hardened
security services available from the cloud platform.
Here are some of the main questions this chapter addresses in detail:
•	 How do I protect against data breaches and loss? This solution brings
in a combination of encryption key management, digital certificate
management and monitoring for data integrity.
•	 How do I protect against networking vulnerabilities? This is addressed
through a combination of cloud-hosted firewalls, intrusion prevention
systems (IPS), Distributed Denial of Service (DDoS) mitigation services
like Akamai or CloudFlare, and microsegmentation practices.
Leveraging secure DevOps procedures, a cloud platform can offer many solu-
tions for dealing with threats to your business and cover any level of security and
compliance needed. This chapter goes into depth on examples of mitigation for
the risks above, how to properly manage identity and access management, what
a secure cloud-native solution looks like, and what secure DevOps practices a
team can adhere to.
Chapter 7 - Emerging Innovation Spaces
Innovation is definitely something that is near and dear to our hearts here at
Xenial and is commonly a reason we see enterprises pursuing a cloud platform/
strategy. The authors of this book rightly identify that innovation can often be a
business driver in itself.
Here are several examples of how the authors identify the cloud driving innovation:
•	 Data and Analytics- A proper cloud architecture offers better ways to
explore and deploy new analytics approaches that enable speed and
agility. Part of the challenge of data analytics in an enterprise is that the
data points needed are stored all over the place, but with the cloud, that
kind of distribution falls right into the benefits of cloud architecture design.
•	 Blockchain- As most are aware, this concept emerged from the digital
24
currency movement but the idea has matured into open-source and
commercial products with the cloud in mind. Leveraging this shared
ledger technology, any time a limited amount of trust exists among
multiple parties, the blockchain creates an environment that can eliminate
fraud and create transparency.
•	 Containers- Within the microservice architecture, the concept of
containerization provides consistent application development models from
development through production. This has caused a massive speed boost
to the way new code is moved into the real world.
•	 Internet of Things (IoT)- IoT is the connection of devices to the internet. It
is projected that the amount of connected devices will reach 20.4 billion
by 2020, providing massive amounts of data points that can be sliced and
diced to drive innovation in so many ways it can’t be fit into this summary.
•	 Cognitive- Sometimes referred to as artificial intelligence (AI), cognitive
technologies are essentially conversational or discovery applications
that can answer questions and provide guidance that help people
make decisions. Some cognitive services that can be added to these
applications include visual recognition, speech-to-text, text-to-speech,
personality insights, tone analysis, and language translation.
Chapter 8 - Methodology
A software methodology is something that sounds much more impressive than
it is. A methodology is nothing more than a description of the guiding principles
and set of steps that a team follows in developing a system. Every team, no
matter the size, has one whether they like it or not. This chapter breaks down the
IBM Cloud Garage Method into seven parts.
Culture:
•	 Build diverse teams
•	 Define organizational roles
•	 Work in autonomous co-located squads
•	 Adopt Agile principles
Think:
•	 Use a continuous cycle of observing, reflecting and making
•	 Define a minimum viable product (MVP)
•	 Hold “playbacks” to gather feedback and keep the team in sync
•	 Plan iterations by using a rank-ordering backlog
Code:
•	 Hold daily standup meetings
25
•	 Use test-driven development- a process of writing a failing test case and
implementing just enough code to pass the test
•	 Practice pair programming- the idea of letting developers work together,
in pairs, at one set of keyboards and monitors to double the amount of
attention on each piece of code
•	 Continuously integrate all working code
•	 Automate testing
Deliver:
•	 Deliver continuously by using a pipeline
•	 Automate deployments
Run:
•	 High Availability (HA) infrastructure- deploy multiple data centers with the
ability to fail over
•	 Dark launch and feature toggle to get initial evaluation and feedback
before going live to all customers
•	 Implement auto-scaling
Manage:
•	 Automate monitoring
•	 Enable fast recovery mechanisms
•	 Test for the unexpected- know how your application responds when
someone pulls the plug
•	 Automate operations to reduce cost
Learn:
•	 Run A/B tests
•	 Drive development with hypothesis- you must be experimenting
continuously
Chapter 9 - Service Management and Operations
Independent of where applications run- in traditional IT data centers or in the
cloud- they must be managed to ensure availability, security, and adequate qual-
ity for users. Service management and operations is a mature and well-defined
discipline that designs, delivers and manages the functions necessary to use IT
within an organization.
The big question is “How can a process-heavy, mature operations team evolve
to support modern Agile and cloud-oriented approaches?” This chapter takes
26
an extensive look at that transformation, which is far-reaching and should not
be underestimated because it is quite disruptive to traditional IT operations. The
important piece to remember is that both the traditional and cloud approaches
are accomplishing the same goal: delivering reliable services to the users at a
justifiable cost.
This transformation affects established roles, processes, technologies, and cul-
ture and the authors provide examples of each of these aspects based on their
experience. They also describe in great detail the impact of cloud transformation
on important operational processes like:
•	 Incident Management
•	 Root-Cause Analysis
•	 Deployment
•	 Release Management
For everything from those processes to future roles that must be created, to
various new kinds of tools that can be leveraged like Slack and Kubernetes, the
authors provide in-depth details and suggestions to set your operations depart-
ment up for success in the future cloud-oriented state.
Chapter 10 - Governance
Cloud adoption and digital transformation are the future of IT. However, the
reality is that this future is multichannel, multicloud, and multivendor. This com-
plexity creates the obvious need for a governance model that is well thought out
by your organization.
A governance model should establish core principles, rights, and standards that
enable you to govern cloud-related decisions and do the following:
•	 Enable you to identify, manage, and mitigate risks
•	 Help you ensure regulatory compliance
•	 Help you drive toward standardized solutions
•	 Promote consistent cloud adoption throughout your organization
•	 Drive synergy through sharing and reusing processes that work.
For such a model to be effective, the following elements must be in place:
•	 Strong technical leaders who understand strategy and architecture
•	 A transparent operational model
•	 Appropriate talent management and human resources to attract and retain
the right expertise and capabilities
27
•	 If your organization is multinational, you must have buy-in from global
partnerships and alliances to create collaborative ecosystems.
The chapter then offers two different models of organizational constructs that the
authors have seen to be effective in implementing governance in a cloud model:
the Center of Competence model and the Chapters and Guilds model.
The Stress Solution:
The Xenial Summary
Using Empathy and Cognitive Behavioral Therapy to
Reduce Anxiety and Develop Resilience
Written by Arthur P. Ciaramicoli
Summarized by Michael Kowalski, Xenial
Introduction
The Stress Solution was written by Arthur P. Ciaramicoli, EdD, PhD. Dr.
Ciaramicoli is a licensed clinical psychologist and the chief medical officer of
soundmindz.org, a popular mental health platform. He has served on the faculty
of Harvard Medical School and also chief psychologist of Metrowest Medical
Center. His other books include The Power of Empathy.
In The Stress Solution, Dr. Ciaramicoli presents a method he calls empathetic
cognitive behavioral therapy to overcome stress.
The author starts by describing the problem: Stress and how common and
impactful it is on our emotional and physical well-being. He then describes the
practices of Empathy and Cognitive Behavioral Therapy, and how they interrelate
in his practice. He uses examples from his own counseling practice to help the
reader understand the concepts and see the outcomes and benefits of empa-
thetic cognitive behavioral therapy in practice. To help the reader apply the prac-
tices and methods described, Ciaramicoli provides exercises at the end of each
chapter and Assessment Tools in the Appendix.
28
Understanding Terms
Empathy: the psychological identification with or vicarious experiencing of the
feelings, thoughts, or attitudes of another (according to dictionary.com). Empathy
is objective, based not on assumptions but on truth. “Empathy is centered on
the uniqueness of the other person’s experience...a thoughtful response rather
than a general reaction,” according to Ciaramicoli.
Sympathy: harmony of or agreement in feeling, as between persons or on the
part of one person with respect to another (according to dictionary.com). Sympa-
thy is subjective, in that it is based on assumptions as to whether our experienc-
es are similar.
Cognitive BehavioralTherapy: A psycho-social intervention that aims to
improve mental health. CBT focuses on challenging and changing unhelpful cog-
nitive distortions (e.g. thoughts, beliefs, and attitudes) and behaviors, improving
emotional regulation, and the development of personal coping strategies that
target solving current problems (according to wikipedia.org)
29
Chapter 1:WhyYou Should Care About Stress
According to the Centers for Disease Control and Prevention, 66% of visits to
primary care doctors are stress-related, and 50% of American workers say they
stay awake at night troubled by the physical or emotional effects of stress.
There are physiological and cognitive symptoms / repercussions from stress, yet
only 17% of Americans ever talk with their health care providers about stress,
cites the author. Pg. 2, pg. 6
Here’s how stress affects the brain and body: the amygdala (emotional center of
the brain) sends a signal to the hypothalamus which alerts the adrenal gland to
release the stress hormone cortisol. Blood pressure, heart rate, and blood sugar
rise, while your immune system, digestion, sex drive, and other functions are put
on the back burner. Memory, learning, and the ability to empathize are compro-
mised.
These are our natural responses to stress. If we experience chronic stress, then,
one must wonder whether the chronic stress contributes to so many of us feel-
ing chronically sick and tired.
Stress may be at the root of cognitive issues as well. Too much stress for too
long of a period can actually cause inflammation in the brain and may be
linked to Alzheimer’s disease, schizophrenia, and multiple sclerosis. So stress
is a chronic, widespread problem that 79% of Americans try to deal with on
their own.
The author cites a study by Steve Maier of the University of Colorado, which
shows that the degree of control we feel over stress determines how much
stress impacts us physiologically. Pg. 7
At the end of the chapter, the author provides a recommended exercise: a Stress
Questionnaire.
Chapter 2: Expanding our Humanity:The Discipline of Empathy
In this chapter, the author explains and unpacks empathy and what happens to
humans on a physiological and psychological level when empathy is–and isn’t–
being practiced. The author states that empathy is an innate capacity but also
considers it a ‘discipline’. That’s because, he says, it “cannot be easily mastered,”
but rather requires “careful nurturing and constant attention.” Pg. 9
The lives we live hamper our empathy and our ability to develop and practice it.
Hectic, harried, tired, and poorly nourished (due to haphazard eating habits), we
become angry, detached, and less caring / empathetic.
30
“We need the help of others to slow down and calm ourselves, confiding in those
close to us so that we can begin the process of dissipating stress…empathy,
and the positive neurochemicals it produces, cannot exist in the absence of trust
and a sense of security…” Pg. 13
If we live lives of constant stress and depletion, our empathetic range becomes
narrower. Our situation can be compounded by secondhand stress. We’ve all
experienced it: we get swept along in the low mood of a partner or colleague.
And when their stress pulls us down, it raises our blood pressure (along with the
other physiological and cognitive effects that come from stress).
All the things our physicians have long told us would benefit us such as adequate
sleep, proper nutrition, strong relationships, etc., can also contribute to determin-
ing the range of our empathy in a given moment, according to the author. Key to
how we respond to others and our ability to be empathetic: keen awareness of
our state of mind.
It’s important to be in touch with our own state of mind; but we practice the
discipline of empathy when we look beyond the surface of someone’s response
to us. This helps us recognize the underlying issues in play. Their response to
us may be anger, for example, but it’s often fueled by hurt, disappointment, and
insecurity.
Inwardly, when we are hurt, and we harbor that unresolved hurt, we tend to
have anger and a sense of helplessness, which changes how we think and be-
have. The author cites a study by psychologist Paul Levine and his colleagues at
the Foundation of Human Enrichment showing that “a fixation on major or minor
hurts makes people shun intimacy and aggravates stress.”
The author then gives an interesting take on sadness and depression. He calls
sadness “the body’s cue to stop, think, and work through what is troubling us.
Depression is often...an attempt to avoid sadness.” Pg. 15
The downward/inward spiral of shunning intimacy and aggravating stress is best
broken, according to the author, with compassionate, empathetic help from oth-
er people. Allowing ourselves to be open and vulnerable, share hurts, and accept
empathetic feedback helps us break from old thought patterns and the ‘story’
we created when we were first experienced hurt. Pg. 15
At the end of the chapter, the author provides a recommended exercise: Empa-
thy Quotient Questionnaire located in the Appendix.
31
Chapter 3: Empathetic Listening: Loving Away Stress
To introduce empathetic listening, Ciaramicoli compares and contrasts two peo-
ple in his life:
•	 His mother, who was empathetic and self-giving for the whole time that
the author knew her, and continued listening and giving, even into her
final hours
•	 His grandfather, who was known widely as a highly stressed, shrewd
business person who took little interest in other people.
At his grandfather’s wake and subsequent funeral, no one shed a tear. Contrast
this with the author’s mother’s funeral, which was attended by people from all
walks of life who shed copious tears and shared openly about the impact she
had had on their lives.
The author then uses the stories of Dmitri, a family friend, and several of the
author’s counseling clients, to explain the tenets of empathetic listening and
to provide examples of how empathetic listening, when put into practice, can
change individuals and relationships.
Do you listen, truly listen, listen more than you talk, and with compassion and
empathy, to understand?
Most of us listen, but we’re planning our response while we do. Or we listen
with sympathy, that is, listening and relating what we hear to our own experi-
ences. We’re often distracted, whether by external stimuli or our own internal
dialogue. And all of this, while we’re purportedly listening to the person talking.
Pg. 24
By contrast, our tendency as humans, especially when our emotions are stim-
ulated as in a disagreement with a loved one, is to be prone to the cognitive
distortion of generalization and to perceive a situation from our own perspective,
which “prevents empathetic listening and causes defensive reactions in the
person who is talking.” Pg. 24
In empathetic listening, we give up our own view to participate fully in another
person’s experience. According to the author, empathetic listening with depth
and clarity goes deep into the other person’s heart to reveal what has been
hidden by fear, anger, grief, or despair. The result is that we “listen our souls into
life.” Pg. 25
According to Ciaramicoli, “Listening empathetically creates a feeling of trust,
which releases the compassionate hormone oxytocin, reducing fear and bias and
creating a feeling of security.” It is when we are calm and secure, he says, that
we can correct distorted thinking. Pg. 26
32
Empathetic listening from others helps us gain awareness of our own story and
where our stresses, caused by biases and distortions about ourselves, originate.
This, the author states, is where the link between empathy and cognitive behav-
ioral therapy lies. Pg. 27
Part of unraveling the causes of stress involves gaining an awareness of your
own story. Many of us carry around distorted views of ourselves that have their
root in our past. Specifically, these views are often negative and they are inaccu-
rate interpretations of reality. Cognitive Behavioral Therapists call this a cognitive
distortion. The author gives the example of Paul, who carried a low self-image
rooted in having been raised in a poor town and having attended a mediocre
college. Pgs. 26-27
These distortions often create patterns or road maps. Think of them like ‘con-
stantly thinking in a rut’. Luckily, the truth can be discerned. And this can come
from empathetic listening and the sharing of honest, thoughtful feedback.
The author then shares a cognitive distortion that many people deal with: Mind
Reading, which is essentially having a preconceived notion about what someone
is thinking or about to say. Pg. 28
He then describes a pattern of behavior that he calls Getting your Loving from
Fighting, essentially, that fighting offers a way of being connected without being
vulnerable. Pg. 29
Two cognitive distortions often at work in this type of relational dysfunction are
negative predictions and projection. The author defines these as “overestimating
the likelihood that an action will have a negative outcome” (negative predictions)
and “imagining that our own unwanted attributes, thoughts, or emotions are
embodied in someone else’ (projection). Pg. 32
At the root of much fighting: Blaming. The author next unpacks and unravels
blaming, for as long as blaming exists, positive change cannot occur. “Blame
puts the problem or need to change on the other person’s shoulders, keeping
the conflict at an impasse.” Pgs. 32-33
Stopping the blaming is hard. However, when a person puts the brakes on blame
and slows down their reaction time of the emotional brain, stress plummets, and
answers become more realistic and rooted in reality/truth. Pgs. 34-35
To come to a place of empathy and listening, and root out blame, people must be
motivated to understand one another.
Another hurdle to empathy is a desire to give advice. We try to fix things rather
than let a person feel the emotion of the situation. This tendency comes about as
33
we listen, and personalize what we hear, making assumptions about the similari-
ty of our situation or experience to the other person’s. Pg. 36
These tendencies of blame and advice-giving come from our tendency to be
self-absorbed. Becoming empathetic requires being able to read the reactions of
others around us. Pg. 37
Entitlement is yet one more empathy-blocker. The behavior here is “I talk, you
listen.” The opposite: empathetic conversations, which involve give and take.
Pg. 38
We often also deal with a fragile self-worth. Achievement and status-seeking
can change us and rob us of empathy as well as our connections with others.
We may have status, success, skill, and competency, yet struggle to be present,
intimate, and empathetic. We therefore don’t feel good about ourselves despite
the outward positive image we project. As a result, it’s hard to live with an oth-
ers-centered mindset and we can’t do much good for those around us. Pg. 39
There are two main factors in empathy training: empathetic listening and ex-
pressing empathy. The author then gives examples of each. Empathetic listening
involves things like:
•	 “Repeating what the other person says
•	 Rephrasing / summarizing, with an emphasis on feelings/emotions
•	 Using statements that invite the speaker to expound, for example, ‘It
appears as if…’ and ‘I imagine that feels…’ ‘Tell me more about that…’”
	 Pg. 41
Finally, expressing empathy takes self-awareness, reflection, and practice. It is
“putting your thoughts and feelings into another person’s heart and soul,” accord-
ing to Ciaramicoli. He shares guidelines for expressing empathy, including:
•	 “Pay attention to body language
•	 Slow down
•	 Ask open-ended questions”
	 Pg. 42
The chapter ends with exercises to help the reader recognize cognitive distortions.
Chapter 4:The Soul’s Pharmacy: How to Produce Calming Neurochemicals
Ciaramicoli starts the chapter sharing about the Siberian Husky puppy he had
when he was a child. The dog was continually frightened and withdrawn and
would hide underneath his bed. His mother was able to help calm the dog and
34
get it to trust and connect with people. The author uses this example to show
the connection between our beliefs, attitudes, and emotions and our physical
well-being. Pg. 48
He and the dog both became calmer in the presence of his mother, who by
nature, had this effect on everyone. The process looks something like this:
•	 Interactions with others can change your neurochemistry.
•	 A change in your neurochemistry can trigger a change in your body, as we
now know from a growing body of scientific research.
	 Pg. 49
We reach others to provide what they need. Ciaramicoli’s mother called this
‘making a relationship’ which is what she did with the Husky. We can practice
this by using the principles the author provides at the end of the previous chap-
ter, Chapter 3. These principles / keys to connecting include:
•	 “Give time
•	 Give time, unselfishly
•	 See beyond the surface
•	 We need to work hard to slow down and make ourselves totally available.
•	 We need to be purposeful to find / make connections”
	 Pg. 50
As previously stated, research shows the great dynamic interplay between mind
and body, mental and physiology.
The good news of this? We’re not ‘set it and forget it’ victims of our genetics.
Rather, according to the author and other Cognitive Behavioral Therapists, close
emotional relationships throughout our lives can actually help provide opportunity
to change the circuitry of our brains that controls behavioral impulses, emotions,
and feelings. This is called neuroplasticity. Pg. 51
We end up changing cognitive distortions and see ourselves and others clearly.
According to the author, there are implications for health, longevity, and state of
mind.
A study by George Vaillant at Harvard University shows relationship factors are
among the key predictors of successful aging. These factors predict health, low-
stress aging. Seven factors were cited. The top three were:
•	 A good marriage before 50
35
•	 Resilience to coping with adversity
•	 Expressing altruistic behavior
Interestingly, none of the seven factors is beyond an individual’s control; for
example: genetic risk for disease. Pg. 52
Based on this study, the author sums up the keys to a healthy life as follows:
manage stress well and form lasting relationships.
Research is increasingly showing that neuroplasticity can even be harnessed to
treat neurological conditions once treated exclusively with drugs. For example,
OCD patients with behavioral therapy can learn to create a calm, balanced state
of mind through casual or loving / intimate human connections. Pg. 53
These relations release serotonin and oxytocin which modulate heart rhythm and
help manage anxiety, anger, impulsiveness, and glucose. This leads to release of
cortisol which lowers stress.
Chapter 5: Illusions We Create: Seeing More Clearly with Cognitive
BehavioralTherapy
Essentially, to show empathy is to be objective. When we fail to see ourselves
and others clearly, we get pulled back to the things in our past that blind our
perceptions today.
The author gives the example of John, a patient, who tried to solve an internal
problem (a fragile sense of self and a desire to feel worthy) with an external
solution: pursuing success in his career, always watching his progress toward
his sales goals, which gave him surges of dopamine. His mood went up or down
solely based on his sales goal accomplishment standing.
The love and steadfastness of John’s family helped him become more open and
genuine. Through empathetic listening and CBT, he was able to examine the core
beliefs about the basis of his worth.
Through some failures, he ended up learning through his suffering. The chapter
ends with exercises, journal questions, and an activity based around the cogni-
tive distortion of performance addiction.
Chapter 6: CBT in Action: Combating the Distortions of Personalization
and Blame
Empathetic CBT is fact-oriented. This helps people untangle the unfortunate
experiences in their lives such as workplace bullying.
Sometimes we take responsibility for something that is out of our control. Help-
36
lessness in these circumstances tends to lead to shame or self-loathing. This,
in turn, leads to the belief that people can’t be trusted and we avoid unguarded
sharing of ourselves.
The workplace can often force us to act in ways counter to (and that put us in
conflict with) our natural being. For example, success at any cost, even if unethi-
cal and lacking integrity and honesty. We try to please others to stabilize a fragile
sense of self and we lose authenticity, which is the exact opposite of what we
need to live lives of low stress.
The chapter ends with journal questions related to the distortions of personaliza-
tion and blame: identifying, listing events in which these distortions may have
occurred, the resultant beliefs we hold, and the assumed consequences.
Chapter 7: CBT in Action: Combating Negative SelfTalk and Ending the
Cycle of Stress
When we grow up experiencing little to no empathy, we develop a punitive
inner voice. In self-defeat, we hear ‘you are not (good) enough.’ The opposite is a
soothing inner voice that says: ‘you are inherently worthy’. Pg. 80
The author encourages readers to recognize familiar self-defeating phrases
and change our internal dialogue. Negative internal dialogue releases stress
hormones which can lead to the cognitive distortion of ignoring situational and
contextual factors.
Strategies for silencing self-criticism include distancing (similar to taking an em-
pathetic stance so we can think objectively about irrational thoughts). This was a
foundational tenet of CBT posed by Aaron Beck, founder of CBT.
What about constructive self-talk? Multiple researchers have hit upon a method
called instructional self-talk which consists of a series of statements that provide
a planned sequence of behaviors.
The author gives an example of a beach vacation cabin owner who had had their
beach vacation invaded by family who were demanding and overstayed their
welcome. When this overbearing family hinted that they planned to return the
following summer, the beach cabin owner–who feared disappointing people–had
to come up with a plan to communicate with the family. Pgs. 82-83
The instructional self-talk method provided both the steps and the mindset he
needed to tackle the sticky situation. This method is different and more effective
than simple encouraging messages such as “you have the confidence you need
to succeed” and the like.
37
That’s because it provides both a mindset and actual steps to overcome and
address an issue. Combined with talking through a specific fear, the method can
help break the cycle of stress.
Steps to changing self-talk include:
•	 “Uncover the origin of your negative story
•	 Use empathy to learn how repeat phrases came about
•	 Journal phrases you speak to yourself
•	 Replace with truths you’ve heard from others
•	 Differentiate between situational causes (the issue was caused by
a situation) and personal causes (I caused the issue) in problematic
situations. If we are burdened by negative self-talk, we can often confuse
these two.”
	 Pgs. 84-85
The chapter ends with journal questions and CBT steps to overcome negative
self talk and ending the cycle of stress.
Chapter 8: Combating Performance Addiction
A pursuit of perfection often causes a person to focus so much on individual
pursuits that they disregard (have a lack of empathy for) the ones around them
who matter most. They sacrifice intimacy for achievement. Pg. 90
Our view of success happens early in our development, when we comprehend
which of our behaviors gain attention and affection. We associate this with our
self-worth. Because these views, and the cognitive distortions associated with
them, are formulated so early on, it can be difficult to alter them. Pg. 91
The challenging thing with performance addiction is that the person tries to per-
fect their way to happiness, doing more and “working harder, faster, and more
proficiently,” says Ciaramicoli. Pg. 91
Unfortunately, this pattern ends up causing anxiety and stress. The author shares
the story of David, a former professional athlete, who attended the author’s
Empathetic CBT sessions.
David was raised by a father who was extremely demanding and critical of him,
expressed through angry outbursts. This led to David developing an intolerance
for feeling out of control. Having been so vulnerable at a young age, later in
life he avoided situations that made him feel out of control. David came to learn
that his own anger led to adrenaline rushes that gave him a superficial sense
of control.
38
The chapter closes with an explanation of the impact of performance addiction
on personal intimate relationships. Performance addicts have difficulty loving
because they base their perception of their lovability on their own performance.
Pg. 98
By participating in group sessions, David witnessed the vulnerability of people
he respected for their personal and professional success. Eventually, he reestab-
lished a loving relationship with his wife and shed the burden of perfection. Pgs.
94-96, 99
The chapter ends with journal questions related to the stress of performance and
CBT steps to overcome the cognitive distortions related to performance addic-
tion. Finally, the author offers a Performance Addiction Questionnaire located in
the Appendix.
In the final five chapters, the author shares skills needed to reduce stress and
develop resilience for personal and professional success.
Chapter 9: Clear Eyes: Perceiving theTruth through Empathy, not Prejudice
In his years of counseling, the author has heard and experienced a lot of prejudi-
cial bias, whether inwardly focused, or focused on others. He has been fascinat-
ed and dismayed by the stress this prejudicial thinking and behaving causes.
Pg. 104
He proposes that empathy is the tool that enables us to subject these views to
rational examination. Pg. 105. As you will recall, the description of Empathy at
the beginning of this Summary under “Understanding Terms” says “Empathy is
objective, based not on assumptions but on truth.”
Prejudice, the author states, is rooted in a lack of awareness combined with a
fragile sense of self. Pg. 105
He also cites research by Arne Roets and Alain Van Hiel of Ghent University in
Belgium that indicates that prejudice and its associated distorted thinking are
more common in people with a low tolerance for ambiguity and uncertainty.
These people, he says, are prone to quick decisions and generalizations. Pg. 108
Research at the University of Queensland showed that students with higher
empathy had more daily exposure to those from different backgrounds. That is,
familiarity had a significant impact on empathy, regardless of race or ethnic back-
ground. Empathy increases and stress decreases with exposure to other groups
of people. Pg. 106
When we are “not stressed by interactions with people from different back-
grounds, we can find common ground and common humanity.” Pg. 108
39
“We all reach adulthood with prejudices of some sort. Our responsibility...is to
reexamine the stories we wrote that were based on incorrect information about
ourselves and others.” Pg. 110
Ciaramicoli shares the effects of closed-minded relating, based on the exam-
ple of Rebecca. She got into a relationship after basing assumptions about her
future partner’s character on his other qualities including handsome appearance
and financial success.
The author states, “When our longings for love are deep and our stress level is
high, the likelihood of biased perceiving is significant.” Pg. 112.
Rebecca participated in group sessions and through mutual vulnerability “real-
ized that good people valued her humanness.” She also learned that you have to
give in order to be given to.
As shared earlier in the book, in order to overcome cognitive distortions that
impact our personal and relational well-being, we cannot go it alone. We need
feedback from a consensus of trusted people who will be honest and straightfor-
ward with us. Pg. 112
The author closes by stating that you don’t have to be in group therapy to rewrite
your story. Butyou do need to be open to honest feedback from trusted individuals.
The chapter closes with journal questions and suggestions for taking action to
overcome prejudice.
Chapter 10: Emotional Learning: Hurts that Never Heal
In this chapter, Ciaramicoli explains how hurts early in our life become part of the
story we create and re-tell to ourselves. Hurt is one of the biggest obstacles to
overcome, in part because (1) the brain is biased to remember hurts and (2) they
are captured in the emotional center of the brain. As a result, our perceptions
about them are influenced by our feelings. And because “we see them through
the lens of our emotions, we mistakenly believe that we are seeing the objective
truth.” Pg. 117
The author shares the process of healing that his patient Laura, who was hurt by
the untimely death of her father, went through. Her experience follows a pattern
common to many people healing from past hurts:
•	 “When we feel strongly, we record certain situations in the light of the
emotions of the moment. This leads us to exaggerations. Pg. 119
•	 We make meaningful connections by sensing what would calm and
40
comfort the other person. It is important to practice this way of perceiving
daily to make it become a habit. Pg. 120
•	 Empathetic relating creates calming brain chemicals that make it easier
to recognize and change cognitive distortions to realistic assessments of
yourself and others. Pg. 122
•	 When our empathy is expanded and expressed, we are often able to
effectively teach aspects of life we ourselves have struggled with and
resolved (as Laura did). Pg. 123
•	 Loss, when unattended to, becomes a cynical force within us. Pg. 124
•	 Unresolved hurts set the stage for cognitive distortions that we believe
are real. Pg. 124
•	 When we have the courage to open up and find people we trust to
genuinely help us by giving us honest feedback, we unleash the
impediments to our biased theories. Pg. 124
•	 When you rediscover the truth, you will likely be more focused on what
is right about you and stop the constant search to find out what is wrong
with you.” Pg. 124
The chapter ends with journal questions and an overcoming cognitive distortions
exercise related to Emotional Learning and healing from past hurts.
Chapter 11: Empathy, Self-care, and Well-being
We’ve long heard that high-stress, driven lifestyles leads to a plethora of physical
ailments. But in this chapter, the author introduces the idea that our emotional
well being, including perceptions of ourselves and the world around us, also
plays a role in our physical health.
The author lists the ‘feel-good’ chemicals that our brains release when we en-
gage in certain activities, such as:
•	 Eating ice cream releases dopamine
•	 A hug releases oxytocin
•	 Physical exercise releases endorphins and serotonin
	 Pg. 129
When we live lives that are stressed and depleted, we tend to forego self-care
like regular exercise and maintaining meaningful relationships, opting, instead, to
‘get by’ or ‘just get through the day.’ Pgs. 128-129
In addition to foregoing self-care, as our high stress levels cause our empathetic
range to narrow, as mentioned in Chapter 2, we are less likely to do some things
that release the happiness chemicals (such as interacting with family and friends
in a loving manner, doing a good deed, or offering a kind word to a stranger).
41
Instead, we turn to external agents to give us this ‘kick’ like nicotine, sugar, choc-
olate, or cocaine. Pg 129
So how can connections with people help us in self-care? A study by develop-
mental psychologist Emmy Werner of the University of California, Davis gives
some insights. Resilient children, researchers found, had a strong bond with a
caretaker (not a parent) and involvement in a community group or church.
“Positive relationships and involvement in meaningful group experiences create
resilience and lessen stress. Such experiences stimulate the release of oxytocin,
the compassion hormone. This hormone produces feelings of security and calm
and inhibits stress and anxiety; thus it protects us against the release of cortisol,”
which has a chain reaction of detrimental physical effects. Pg 130
Dr. Paul Zak, a neuroscientist, has demonstrated that “when oxytocin levels
are high, people’s generosity to strangers increases up to 80 percent. We can
produce this effect with practice by expanding our abilities to communicate with
empathy.” Pg. 130
It’s up to us to decide: reach for the cake or the vodka, or kiss our partner and
hug our kids. The positive effects are the same, and one is healthier. Pg. 131
The author shares the story of his patient, Tricia, who is on the way to developing
habitual self-care. The catalyst: changing how she thought and perceived, over-
coming cognitive distortions by practicing empathetic connections with trusted
people.
The author then shares research on the value of regular exercise and lists a host
of foods that are believed to help reduce stress. The chapter ends with journal
questions and a cognitive distortions exercise.
Chapter 12: Give andYou Shall Receive: How Giving and Goodness
Restore Calm
Studies from the Institute of Gerontology at the University of Michigan have con-
firmed that giving is more powerful than receiving in terms of reducing mortality.
It seems somewhat counter-intuitive that selflessly pouring out your life and
emotional energy to benefit someone else would end up helping you in the long
run. However:
•	 “Isolation is a predictor of early-onset illness.
•	 People who give are healthier and happier and live longer.
•	 One of the simplest ways to give is through empathy, and in the process
we make meaningful connections that produce the health-giving
neurochemicals we need to manage our stress and improve our lives.”
	 Pgs. 141-142
42
This is confirmed by Allan Luks, director of Big Brothers and Big Sisters of New
York City, who found that people who help others on a regular basis are ten
times more likely to be healthy than people who do not. Pg. 142
The author believes, however, that many of us have suppressed our goodness as
a result of stress. He goes on to address some of the things that can inhibit the
expression of goodness, such as:
•	 A lack of forgiveness
•	 Fear, prejudice, and misunderstanding/being misunderstood
•	 Grief
	 Pgs. 146-148
The author shares the story of his patient Randy, who lived with an abusive
stepfather. Unlike his siblings, Randy continued in relationship with this man into
adulthood. And despite having become somewhat hardened, tough, and impa-
tient, Randy actually ended up helping his stepfather through a severe illness.
Despite how he had been treated, Randy learned an invaluable lesson, stating:
“In a strange way, he [the stepfather] has given me something. I’ve learned I’m
not such a hard-ass after all.” Pg. 151
This is an example of what Ciaramicoli calls a Goodness Breakthrough. This
comes about “by the way we live, not by holding on to fixed ideas that shore up
our fragile sense of self. Be honest with yourself. Acknowledge the situations
and the people who threaten you. Strive to resolve these issues rather than pun-
ishing innocent people for being their authentic selves.” Pg. 148
Goodness breakthroughs, the author believes, “can result in a life in which good-
ness is expressed daily.” Pg. 152
The chapter ends with journal questions and a cognitive distortions exercise relat-
ed to practicing giving and goodness to restore calm.
Chapter 13: I Am Who I Am: How Authenticity Soothes the Soul
A tension that most of us live with in varying degrees is a disconnect between
our ‘real’ self in which we live authentically and true to our core values and be-
liefs and our ‘false’ self, which is a life of pretense. Pg. 157
Often, the desire to please others, fit in, or adhere to other peoples’ expectations
pushes us toward this inauthentic life. As a result, inside, we feel fraudulent. It
reinforces the cognitive distortion that people will love and respect you only if
you perform well and please them. Pg. 160
43
What is ironic is that the opposite is true. People are actually attracted to authen-
ticity. “It relaxes us because we realize we don’t have to be on guard–we can be
human, have flaws, and make mistakes and still be accepted and liked.” Pg. 160
People who constantly prop themselves up by trying to prove their worth and
worthiness create stress within and around themselves. Pg. 161
He challenges readers to live true to self. “Authenticity is energizing. Pretending
to be somebody we’re not is exhausting.” Pg. 163
As the author shares throughout the book, the ability to know and be known
through the process of empathetic cognitive behavioral therapy is key to low-
stress living. Pg. 166
“Genuine, authentic relating enlivens the spirit. This gives us the energy and re-
silience to go into the world, absorb emotional blows, and come home with our
self-respect and integrity intact. Empathetic CBT is the vehicle to maintain this
perspective.” Pg 166
The chapter ends with journal questions and an exercise to help the reader work
toward living an authentic life.
44
Service. Driven. Commerce

Mais conteúdo relacionado

Mais procurados

2012 Data Acquisition Report
2012 Data Acquisition Report 2012 Data Acquisition Report
2012 Data Acquisition Report Oceanos
 
Business intelligence
Business intelligence Business intelligence
Business intelligence Yona Kasebele
 
Business Intelligence Strategy for SME's
Business Intelligence Strategy for SME'sBusiness Intelligence Strategy for SME's
Business Intelligence Strategy for SME'sOlimjon Suleymanov
 
Aligning Information Insights with the Speed of Business
Aligning Information Insights with the Speed of BusinessAligning Information Insights with the Speed of Business
Aligning Information Insights with the Speed of BusinessCognizant
 
Geurts supporting the-agile-enterprise
Geurts supporting the-agile-enterpriseGeurts supporting the-agile-enterprise
Geurts supporting the-agile-enterpriseThei Geurts
 
Knowledge Management Model for Indian Commercial Banking Sector
Knowledge Management Model for Indian Commercial Banking Sector Knowledge Management Model for Indian Commercial Banking Sector
Knowledge Management Model for Indian Commercial Banking Sector Himanshu Dutt
 
MIS amazon-knowledge management
MIS  amazon-knowledge managementMIS  amazon-knowledge management
MIS amazon-knowledge managementSiamak A.Bazzaz
 
Knowledge management systems in electronic business ahmed adel
Knowledge management systems in electronic business ahmed adelKnowledge management systems in electronic business ahmed adel
Knowledge management systems in electronic business ahmed adelAhmed Adel
 
Sales Growth: Find Big Growth in Big Data - Lattice Engines & McKinsey
Sales Growth: Find Big Growth in Big Data - Lattice Engines & McKinseySales Growth: Find Big Growth in Big Data - Lattice Engines & McKinsey
Sales Growth: Find Big Growth in Big Data - Lattice Engines & McKinseyLattice Engines
 
How Do You Improve Data Skills and Data Literacy in your Business?
How Do You Improve Data Skills and Data Literacy in your Business?How Do You Improve Data Skills and Data Literacy in your Business?
How Do You Improve Data Skills and Data Literacy in your Business?Bernard Marr
 
Business - IT Alignment Increases Value Of IT
Business - IT Alignment Increases Value Of ITBusiness - IT Alignment Increases Value Of IT
Business - IT Alignment Increases Value Of ITDinesh O Bareja
 
Business intelligence for SMEs with Data Analytics
Business intelligence for SMEs with Data AnalyticsBusiness intelligence for SMEs with Data Analytics
Business intelligence for SMEs with Data AnalyticsTzar Umang
 
Mis for class lecture 1 final
Mis for class lecture 1 finalMis for class lecture 1 final
Mis for class lecture 1 finalAwais Idrees
 
Assignment 3 - Big Data - Ed.02
Assignment 3 - Big Data - Ed.02Assignment 3 - Big Data - Ed.02
Assignment 3 - Big Data - Ed.02Hosein Nafisi
 

Mais procurados (20)

2012 Data Acquisition Report
2012 Data Acquisition Report 2012 Data Acquisition Report
2012 Data Acquisition Report
 
Business intelligence
Business intelligence Business intelligence
Business intelligence
 
Robert hillard presentation 2
Robert hillard   presentation 2Robert hillard   presentation 2
Robert hillard presentation 2
 
Business Intelligence Strategy for SME's
Business Intelligence Strategy for SME'sBusiness Intelligence Strategy for SME's
Business Intelligence Strategy for SME's
 
Who Should Own Big Data
Who Should Own Big DataWho Should Own Big Data
Who Should Own Big Data
 
Aligning Information Insights with the Speed of Business
Aligning Information Insights with the Speed of BusinessAligning Information Insights with the Speed of Business
Aligning Information Insights with the Speed of Business
 
Geurts supporting the-agile-enterprise
Geurts supporting the-agile-enterpriseGeurts supporting the-agile-enterprise
Geurts supporting the-agile-enterprise
 
The Big Data Talent Gap
The Big Data Talent GapThe Big Data Talent Gap
The Big Data Talent Gap
 
Knowledge Management Model for Indian Commercial Banking Sector
Knowledge Management Model for Indian Commercial Banking Sector Knowledge Management Model for Indian Commercial Banking Sector
Knowledge Management Model for Indian Commercial Banking Sector
 
MIS amazon-knowledge management
MIS  amazon-knowledge managementMIS  amazon-knowledge management
MIS amazon-knowledge management
 
BIG DATA, small workforce
BIG DATA, small workforceBIG DATA, small workforce
BIG DATA, small workforce
 
Knowledge mgmt
Knowledge mgmtKnowledge mgmt
Knowledge mgmt
 
Knowledge management systems in electronic business ahmed adel
Knowledge management systems in electronic business ahmed adelKnowledge management systems in electronic business ahmed adel
Knowledge management systems in electronic business ahmed adel
 
Sales Growth: Find Big Growth in Big Data - Lattice Engines & McKinsey
Sales Growth: Find Big Growth in Big Data - Lattice Engines & McKinseySales Growth: Find Big Growth in Big Data - Lattice Engines & McKinsey
Sales Growth: Find Big Growth in Big Data - Lattice Engines & McKinsey
 
How Do You Improve Data Skills and Data Literacy in your Business?
How Do You Improve Data Skills and Data Literacy in your Business?How Do You Improve Data Skills and Data Literacy in your Business?
How Do You Improve Data Skills and Data Literacy in your Business?
 
Business - IT Alignment Increases Value Of IT
Business - IT Alignment Increases Value Of ITBusiness - IT Alignment Increases Value Of IT
Business - IT Alignment Increases Value Of IT
 
Business intelligence for SMEs with Data Analytics
Business intelligence for SMEs with Data AnalyticsBusiness intelligence for SMEs with Data Analytics
Business intelligence for SMEs with Data Analytics
 
Mis for class lecture 1 final
Mis for class lecture 1 finalMis for class lecture 1 final
Mis for class lecture 1 final
 
Assignment 3 - Big Data - Ed.02
Assignment 3 - Big Data - Ed.02Assignment 3 - Big Data - Ed.02
Assignment 3 - Big Data - Ed.02
 
ACCT Paper
ACCT Paper ACCT Paper
ACCT Paper
 

Semelhante a Xenial Book Summary for Busy IT Leaders

Data Driven Marketing: the DNA of customer orientated companies
Data Driven Marketing: the DNA of customer orientated companiesData Driven Marketing: the DNA of customer orientated companies
Data Driven Marketing: the DNA of customer orientated companiesGood Rebels
 
Board matters quarterly – volume 3
Board matters quarterly – volume 3Board matters quarterly – volume 3
Board matters quarterly – volume 3elithomas202
 
Driving Business Performance with effective Enterprise Information Management
Driving Business Performance with effective Enterprise Information ManagementDriving Business Performance with effective Enterprise Information Management
Driving Business Performance with effective Enterprise Information ManagementRay Bachert
 
Revealing B2B Digital Marketers biggest challenges
Revealing B2B Digital Marketers biggest challengesRevealing B2B Digital Marketers biggest challenges
Revealing B2B Digital Marketers biggest challengesidio Ltd
 
Evaluation Of A Customer Relation Assignment
Evaluation Of A Customer Relation AssignmentEvaluation Of A Customer Relation Assignment
Evaluation Of A Customer Relation AssignmentJan Champagne
 
Age Friendly Economy - Improving your business with data
Age Friendly Economy - Improving your business with dataAge Friendly Economy - Improving your business with data
Age Friendly Economy - Improving your business with dataAgeFriendlyEconomy
 
Itsnotthesizeofthedataitshowyouuseitsmartermarketingwithanalyticsanddashboards
ItsnotthesizeofthedataitshowyouuseitsmartermarketingwithanalyticsanddashboardsItsnotthesizeofthedataitshowyouuseitsmartermarketingwithanalyticsanddashboards
ItsnotthesizeofthedataitshowyouuseitsmartermarketingwithanalyticsanddashboardsKoen Pauwels
 
From Information Overload to Organized Insights
From Information Overload to Organized InsightsFrom Information Overload to Organized Insights
From Information Overload to Organized InsightsLexisNexis
 
Smart Data Module 4 d drive_business models
Smart Data Module 4 d drive_business modelsSmart Data Module 4 d drive_business models
Smart Data Module 4 d drive_business modelscaniceconsulting
 
Fundamentals of Data Analytics Outline
Fundamentals of Data Analytics OutlineFundamentals of Data Analytics Outline
Fundamentals of Data Analytics OutlineDan Meyer
 
Age Friendly Economy - Improving your business with external data
Age Friendly Economy - Improving your business with external dataAge Friendly Economy - Improving your business with external data
Age Friendly Economy - Improving your business with external dataAgeFriendlyEconomy
 
BIGDATA-DIGITAL TRANSFORMATION AND STRATEGY
BIGDATA-DIGITAL TRANSFORMATION AND STRATEGYBIGDATA-DIGITAL TRANSFORMATION AND STRATEGY
BIGDATA-DIGITAL TRANSFORMATION AND STRATEGYGeorgeDiamandis11
 
PresentationThe capability of enormous information - or the new .pdf
PresentationThe capability of enormous information - or the new .pdfPresentationThe capability of enormous information - or the new .pdf
PresentationThe capability of enormous information - or the new .pdfaradhana9856
 
Decision-making Leveraging Technology
Decision-making Leveraging TechnologyDecision-making Leveraging Technology
Decision-making Leveraging TechnologyInfosys
 
From the End of Information Chaos to Contextual Knowledge
From the End of Information Chaos to Contextual KnowledgeFrom the End of Information Chaos to Contextual Knowledge
From the End of Information Chaos to Contextual Knowledgei-SCOOP
 
A Practical Guide To Information Governance
A Practical Guide To Information GovernanceA Practical Guide To Information Governance
A Practical Guide To Information GovernanceMichael Curcio
 
Manish tripathi-devenport-10-principles-km
Manish tripathi-devenport-10-principles-kmManish tripathi-devenport-10-principles-km
Manish tripathi-devenport-10-principles-kmA P
 
Data-Analytics-Resource-updated for analysis
Data-Analytics-Resource-updated for analysisData-Analytics-Resource-updated for analysis
Data-Analytics-Resource-updated for analysisBhavinGada5
 

Semelhante a Xenial Book Summary for Busy IT Leaders (20)

Data Driven Marketing: the DNA of customer orientated companies
Data Driven Marketing: the DNA of customer orientated companiesData Driven Marketing: the DNA of customer orientated companies
Data Driven Marketing: the DNA of customer orientated companies
 
Board matters quarterly – volume 3
Board matters quarterly – volume 3Board matters quarterly – volume 3
Board matters quarterly – volume 3
 
The new patterns of innovation
The new patterns of innovationThe new patterns of innovation
The new patterns of innovation
 
Driving Business Performance with effective Enterprise Information Management
Driving Business Performance with effective Enterprise Information ManagementDriving Business Performance with effective Enterprise Information Management
Driving Business Performance with effective Enterprise Information Management
 
Revealing B2B Digital Marketers biggest challenges
Revealing B2B Digital Marketers biggest challengesRevealing B2B Digital Marketers biggest challenges
Revealing B2B Digital Marketers biggest challenges
 
Information Management White Paper
Information Management White PaperInformation Management White Paper
Information Management White Paper
 
Evaluation Of A Customer Relation Assignment
Evaluation Of A Customer Relation AssignmentEvaluation Of A Customer Relation Assignment
Evaluation Of A Customer Relation Assignment
 
Age Friendly Economy - Improving your business with data
Age Friendly Economy - Improving your business with dataAge Friendly Economy - Improving your business with data
Age Friendly Economy - Improving your business with data
 
Itsnotthesizeofthedataitshowyouuseitsmartermarketingwithanalyticsanddashboards
ItsnotthesizeofthedataitshowyouuseitsmartermarketingwithanalyticsanddashboardsItsnotthesizeofthedataitshowyouuseitsmartermarketingwithanalyticsanddashboards
Itsnotthesizeofthedataitshowyouuseitsmartermarketingwithanalyticsanddashboards
 
From Information Overload to Organized Insights
From Information Overload to Organized InsightsFrom Information Overload to Organized Insights
From Information Overload to Organized Insights
 
Smart Data Module 4 d drive_business models
Smart Data Module 4 d drive_business modelsSmart Data Module 4 d drive_business models
Smart Data Module 4 d drive_business models
 
Fundamentals of Data Analytics Outline
Fundamentals of Data Analytics OutlineFundamentals of Data Analytics Outline
Fundamentals of Data Analytics Outline
 
Age Friendly Economy - Improving your business with external data
Age Friendly Economy - Improving your business with external dataAge Friendly Economy - Improving your business with external data
Age Friendly Economy - Improving your business with external data
 
BIGDATA-DIGITAL TRANSFORMATION AND STRATEGY
BIGDATA-DIGITAL TRANSFORMATION AND STRATEGYBIGDATA-DIGITAL TRANSFORMATION AND STRATEGY
BIGDATA-DIGITAL TRANSFORMATION AND STRATEGY
 
PresentationThe capability of enormous information - or the new .pdf
PresentationThe capability of enormous information - or the new .pdfPresentationThe capability of enormous information - or the new .pdf
PresentationThe capability of enormous information - or the new .pdf
 
Decision-making Leveraging Technology
Decision-making Leveraging TechnologyDecision-making Leveraging Technology
Decision-making Leveraging Technology
 
From the End of Information Chaos to Contextual Knowledge
From the End of Information Chaos to Contextual KnowledgeFrom the End of Information Chaos to Contextual Knowledge
From the End of Information Chaos to Contextual Knowledge
 
A Practical Guide To Information Governance
A Practical Guide To Information GovernanceA Practical Guide To Information Governance
A Practical Guide To Information Governance
 
Manish tripathi-devenport-10-principles-km
Manish tripathi-devenport-10-principles-kmManish tripathi-devenport-10-principles-km
Manish tripathi-devenport-10-principles-km
 
Data-Analytics-Resource-updated for analysis
Data-Analytics-Resource-updated for analysisData-Analytics-Resource-updated for analysis
Data-Analytics-Resource-updated for analysis
 

Mais de Michael Kowalski

Xenial optimize operations infographic_wendys
Xenial optimize operations infographic_wendysXenial optimize operations infographic_wendys
Xenial optimize operations infographic_wendysMichael Kowalski
 
QSR magazine article: How Artificial Intelligence is Reshaping Restaurant
QSR magazine article: How Artificial Intelligence is Reshaping RestaurantQSR magazine article: How Artificial Intelligence is Reshaping Restaurant
QSR magazine article: How Artificial Intelligence is Reshaping RestaurantMichael Kowalski
 
Campaign Workbook_ Preserve the Port Gamble Forest
Campaign Workbook_ Preserve the Port Gamble ForestCampaign Workbook_ Preserve the Port Gamble Forest
Campaign Workbook_ Preserve the Port Gamble ForestMichael Kowalski
 
Technical Brochure Cloud Infrastructure Cisco Systems
Technical Brochure Cloud Infrastructure Cisco SystemsTechnical Brochure Cloud Infrastructure Cisco Systems
Technical Brochure Cloud Infrastructure Cisco SystemsMichael Kowalski
 
Blog Sample Three Email Security Features
Blog Sample Three Email Security FeaturesBlog Sample Three Email Security Features
Blog Sample Three Email Security FeaturesMichael Kowalski
 
Integrated Marketing Example MegaPath One Unified Communications
Integrated Marketing Example MegaPath One Unified CommunicationsIntegrated Marketing Example MegaPath One Unified Communications
Integrated Marketing Example MegaPath One Unified CommunicationsMichael Kowalski
 
Blog sample of_titles_topics
Blog sample of_titles_topicsBlog sample of_titles_topics
Blog sample of_titles_topicsMichael Kowalski
 
eBook How to do More with Unified Communications_Lead Nurture
eBook How to do More with Unified Communications_Lead NurtureeBook How to do More with Unified Communications_Lead Nurture
eBook How to do More with Unified Communications_Lead NurtureMichael Kowalski
 
Hosted Microsoft Exchange Product Sheet
Hosted Microsoft Exchange Product SheetHosted Microsoft Exchange Product Sheet
Hosted Microsoft Exchange Product SheetMichael Kowalski
 
Managed WiFi Product Sheet
Managed WiFi Product SheetManaged WiFi Product Sheet
Managed WiFi Product SheetMichael Kowalski
 
White Paper_Cisco_Manufacturing_Point of View
White Paper_Cisco_Manufacturing_Point of ViewWhite Paper_Cisco_Manufacturing_Point of View
White Paper_Cisco_Manufacturing_Point of ViewMichael Kowalski
 
White Paper_CRM_Microsoft_311Citizen Services
White Paper_CRM_Microsoft_311Citizen ServicesWhite Paper_CRM_Microsoft_311Citizen Services
White Paper_CRM_Microsoft_311Citizen ServicesMichael Kowalski
 

Mais de Michael Kowalski (14)

Xenial optimize operations infographic_wendys
Xenial optimize operations infographic_wendysXenial optimize operations infographic_wendys
Xenial optimize operations infographic_wendys
 
QSR magazine article: How Artificial Intelligence is Reshaping Restaurant
QSR magazine article: How Artificial Intelligence is Reshaping RestaurantQSR magazine article: How Artificial Intelligence is Reshaping Restaurant
QSR magazine article: How Artificial Intelligence is Reshaping Restaurant
 
Campaign Workbook_ Preserve the Port Gamble Forest
Campaign Workbook_ Preserve the Port Gamble ForestCampaign Workbook_ Preserve the Port Gamble Forest
Campaign Workbook_ Preserve the Port Gamble Forest
 
Mp cs the_community_ymca
Mp cs the_community_ymcaMp cs the_community_ymca
Mp cs the_community_ymca
 
Technical Brochure Cloud Infrastructure Cisco Systems
Technical Brochure Cloud Infrastructure Cisco SystemsTechnical Brochure Cloud Infrastructure Cisco Systems
Technical Brochure Cloud Infrastructure Cisco Systems
 
VoIP Blog Post
VoIP Blog PostVoIP Blog Post
VoIP Blog Post
 
Blog Sample Three Email Security Features
Blog Sample Three Email Security FeaturesBlog Sample Three Email Security Features
Blog Sample Three Email Security Features
 
Integrated Marketing Example MegaPath One Unified Communications
Integrated Marketing Example MegaPath One Unified CommunicationsIntegrated Marketing Example MegaPath One Unified Communications
Integrated Marketing Example MegaPath One Unified Communications
 
Blog sample of_titles_topics
Blog sample of_titles_topicsBlog sample of_titles_topics
Blog sample of_titles_topics
 
eBook How to do More with Unified Communications_Lead Nurture
eBook How to do More with Unified Communications_Lead NurtureeBook How to do More with Unified Communications_Lead Nurture
eBook How to do More with Unified Communications_Lead Nurture
 
Hosted Microsoft Exchange Product Sheet
Hosted Microsoft Exchange Product SheetHosted Microsoft Exchange Product Sheet
Hosted Microsoft Exchange Product Sheet
 
Managed WiFi Product Sheet
Managed WiFi Product SheetManaged WiFi Product Sheet
Managed WiFi Product Sheet
 
White Paper_Cisco_Manufacturing_Point of View
White Paper_Cisco_Manufacturing_Point of ViewWhite Paper_Cisco_Manufacturing_Point of View
White Paper_Cisco_Manufacturing_Point of View
 
White Paper_CRM_Microsoft_311Citizen Services
White Paper_CRM_Microsoft_311Citizen ServicesWhite Paper_CRM_Microsoft_311Citizen Services
White Paper_CRM_Microsoft_311Citizen Services
 

Último

Distribution Ad Platform_ The Role of Distribution Ad Network.pdf
Distribution Ad Platform_ The Role of  Distribution Ad Network.pdfDistribution Ad Platform_ The Role of  Distribution Ad Network.pdf
Distribution Ad Platform_ The Role of Distribution Ad Network.pdfTransports Advertising
 
VIP Call Girls Dongri WhatsApp +91-9833363713, Full Night Service
VIP Call Girls Dongri WhatsApp +91-9833363713, Full Night ServiceVIP Call Girls Dongri WhatsApp +91-9833363713, Full Night Service
VIP Call Girls Dongri WhatsApp +91-9833363713, Full Night Servicemeghakumariji156
 
The seven principles of persuasion by Dr. Robert Cialdini
The seven principles of persuasion by Dr. Robert CialdiniThe seven principles of persuasion by Dr. Robert Cialdini
The seven principles of persuasion by Dr. Robert CialdiniSurya Prasath
 
Cartona.pptx. Marketing how to present your project very well , discussed a...
Cartona.pptx.   Marketing how to present your project very well , discussed a...Cartona.pptx.   Marketing how to present your project very well , discussed a...
Cartona.pptx. Marketing how to present your project very well , discussed a...BeshoyFawaz1
 
Gain potential customers through Lead Generation
Gain potential customers through Lead GenerationGain potential customers through Lead Generation
Gain potential customers through Lead Generationvidhyalakshmiveerapp
 
HITECH CITY CALL GIRL IN 9234842891 💞 INDEPENDENT ESCORT SERVICE HITECH CITY
HITECH CITY CALL GIRL IN 9234842891 💞 INDEPENDENT ESCORT SERVICE HITECH CITYHITECH CITY CALL GIRL IN 9234842891 💞 INDEPENDENT ESCORT SERVICE HITECH CITY
HITECH CITY CALL GIRL IN 9234842891 💞 INDEPENDENT ESCORT SERVICE HITECH CITYNiteshKumar82226
 
Mastering Affiliate Marketing: A Comprehensive Guide to Success
Mastering Affiliate Marketing: A Comprehensive Guide to SuccessMastering Affiliate Marketing: A Comprehensive Guide to Success
Mastering Affiliate Marketing: A Comprehensive Guide to SuccessAbdulsamad Lukman
 
TAM_AdEx-Cross_Media_Report-Banking_Finance_Investment_(BFSI)_2023.pdf
TAM_AdEx-Cross_Media_Report-Banking_Finance_Investment_(BFSI)_2023.pdfTAM_AdEx-Cross_Media_Report-Banking_Finance_Investment_(BFSI)_2023.pdf
TAM_AdEx-Cross_Media_Report-Banking_Finance_Investment_(BFSI)_2023.pdfSocial Samosa
 
How consumers use technology and the impacts on their lives
How consumers use technology and the impacts on their livesHow consumers use technology and the impacts on their lives
How consumers use technology and the impacts on their livesMathuraa
 
2024 Social Trends Report V4 from Later.com
2024 Social Trends Report V4 from Later.com2024 Social Trends Report V4 from Later.com
2024 Social Trends Report V4 from Later.comnmislamchannal
 
Unveiling the Legacy of the Rosetta stone A Key to Ancient Knowledge.pptx
Unveiling the Legacy of the Rosetta stone A Key to Ancient Knowledge.pptxUnveiling the Legacy of the Rosetta stone A Key to Ancient Knowledge.pptx
Unveiling the Legacy of the Rosetta stone A Key to Ancient Knowledge.pptxelizabethella096
 
Aligarh Hire 💕 8250092165 Young and Hot Call Girls Service Agency Escorts
Aligarh Hire 💕 8250092165 Young and Hot Call Girls Service Agency EscortsAligarh Hire 💕 8250092165 Young and Hot Call Girls Service Agency Escorts
Aligarh Hire 💕 8250092165 Young and Hot Call Girls Service Agency Escortsmeghakumariji156
 
SP Search Term Data Optimization Template.pdf
SP Search Term Data Optimization Template.pdfSP Search Term Data Optimization Template.pdf
SP Search Term Data Optimization Template.pdfPauleneNicoleLapira
 
HOW TO HANDLE SALES OBJECTIONS | SELLING AND NEGOTIATION
HOW TO HANDLE SALES OBJECTIONS | SELLING AND NEGOTIATIONHOW TO HANDLE SALES OBJECTIONS | SELLING AND NEGOTIATION
HOW TO HANDLE SALES OBJECTIONS | SELLING AND NEGOTIATIONpratheeshraj987
 
personal branding kit for music business
personal branding kit for music businesspersonal branding kit for music business
personal branding kit for music businessbrjohnson6
 
Discover Ardency Elite: Elevate Your Lifestyle
Discover Ardency Elite: Elevate Your LifestyleDiscover Ardency Elite: Elevate Your Lifestyle
Discover Ardency Elite: Elevate Your LifestyleMy Heart Throw Pillow
 
Crypto Quantum Leap - Digital - membership area
Crypto Quantum Leap -  Digital - membership areaCrypto Quantum Leap -  Digital - membership area
Crypto Quantum Leap - Digital - membership areajaynee G
 
The Impact Of Social Media Advertising.pdf
The Impact Of Social Media Advertising.pdfThe Impact Of Social Media Advertising.pdf
The Impact Of Social Media Advertising.pdfishikajaiswal116
 
Alpha Media March 2024 Buyers Guide.pptx
Alpha Media March 2024 Buyers Guide.pptxAlpha Media March 2024 Buyers Guide.pptx
Alpha Media March 2024 Buyers Guide.pptxDave McCallum
 
10 Email Marketing Best Practices to Increase Engagements, CTR, And ROI
10 Email Marketing Best Practices to Increase Engagements, CTR, And ROI10 Email Marketing Best Practices to Increase Engagements, CTR, And ROI
10 Email Marketing Best Practices to Increase Engagements, CTR, And ROIShamsudeen Adeshokan
 

Último (20)

Distribution Ad Platform_ The Role of Distribution Ad Network.pdf
Distribution Ad Platform_ The Role of  Distribution Ad Network.pdfDistribution Ad Platform_ The Role of  Distribution Ad Network.pdf
Distribution Ad Platform_ The Role of Distribution Ad Network.pdf
 
VIP Call Girls Dongri WhatsApp +91-9833363713, Full Night Service
VIP Call Girls Dongri WhatsApp +91-9833363713, Full Night ServiceVIP Call Girls Dongri WhatsApp +91-9833363713, Full Night Service
VIP Call Girls Dongri WhatsApp +91-9833363713, Full Night Service
 
The seven principles of persuasion by Dr. Robert Cialdini
The seven principles of persuasion by Dr. Robert CialdiniThe seven principles of persuasion by Dr. Robert Cialdini
The seven principles of persuasion by Dr. Robert Cialdini
 
Cartona.pptx. Marketing how to present your project very well , discussed a...
Cartona.pptx.   Marketing how to present your project very well , discussed a...Cartona.pptx.   Marketing how to present your project very well , discussed a...
Cartona.pptx. Marketing how to present your project very well , discussed a...
 
Gain potential customers through Lead Generation
Gain potential customers through Lead GenerationGain potential customers through Lead Generation
Gain potential customers through Lead Generation
 
HITECH CITY CALL GIRL IN 9234842891 💞 INDEPENDENT ESCORT SERVICE HITECH CITY
HITECH CITY CALL GIRL IN 9234842891 💞 INDEPENDENT ESCORT SERVICE HITECH CITYHITECH CITY CALL GIRL IN 9234842891 💞 INDEPENDENT ESCORT SERVICE HITECH CITY
HITECH CITY CALL GIRL IN 9234842891 💞 INDEPENDENT ESCORT SERVICE HITECH CITY
 
Mastering Affiliate Marketing: A Comprehensive Guide to Success
Mastering Affiliate Marketing: A Comprehensive Guide to SuccessMastering Affiliate Marketing: A Comprehensive Guide to Success
Mastering Affiliate Marketing: A Comprehensive Guide to Success
 
TAM_AdEx-Cross_Media_Report-Banking_Finance_Investment_(BFSI)_2023.pdf
TAM_AdEx-Cross_Media_Report-Banking_Finance_Investment_(BFSI)_2023.pdfTAM_AdEx-Cross_Media_Report-Banking_Finance_Investment_(BFSI)_2023.pdf
TAM_AdEx-Cross_Media_Report-Banking_Finance_Investment_(BFSI)_2023.pdf
 
How consumers use technology and the impacts on their lives
How consumers use technology and the impacts on their livesHow consumers use technology and the impacts on their lives
How consumers use technology and the impacts on their lives
 
2024 Social Trends Report V4 from Later.com
2024 Social Trends Report V4 from Later.com2024 Social Trends Report V4 from Later.com
2024 Social Trends Report V4 from Later.com
 
Unveiling the Legacy of the Rosetta stone A Key to Ancient Knowledge.pptx
Unveiling the Legacy of the Rosetta stone A Key to Ancient Knowledge.pptxUnveiling the Legacy of the Rosetta stone A Key to Ancient Knowledge.pptx
Unveiling the Legacy of the Rosetta stone A Key to Ancient Knowledge.pptx
 
Aligarh Hire 💕 8250092165 Young and Hot Call Girls Service Agency Escorts
Aligarh Hire 💕 8250092165 Young and Hot Call Girls Service Agency EscortsAligarh Hire 💕 8250092165 Young and Hot Call Girls Service Agency Escorts
Aligarh Hire 💕 8250092165 Young and Hot Call Girls Service Agency Escorts
 
SP Search Term Data Optimization Template.pdf
SP Search Term Data Optimization Template.pdfSP Search Term Data Optimization Template.pdf
SP Search Term Data Optimization Template.pdf
 
HOW TO HANDLE SALES OBJECTIONS | SELLING AND NEGOTIATION
HOW TO HANDLE SALES OBJECTIONS | SELLING AND NEGOTIATIONHOW TO HANDLE SALES OBJECTIONS | SELLING AND NEGOTIATION
HOW TO HANDLE SALES OBJECTIONS | SELLING AND NEGOTIATION
 
personal branding kit for music business
personal branding kit for music businesspersonal branding kit for music business
personal branding kit for music business
 
Discover Ardency Elite: Elevate Your Lifestyle
Discover Ardency Elite: Elevate Your LifestyleDiscover Ardency Elite: Elevate Your Lifestyle
Discover Ardency Elite: Elevate Your Lifestyle
 
Crypto Quantum Leap - Digital - membership area
Crypto Quantum Leap -  Digital - membership areaCrypto Quantum Leap -  Digital - membership area
Crypto Quantum Leap - Digital - membership area
 
The Impact Of Social Media Advertising.pdf
The Impact Of Social Media Advertising.pdfThe Impact Of Social Media Advertising.pdf
The Impact Of Social Media Advertising.pdf
 
Alpha Media March 2024 Buyers Guide.pptx
Alpha Media March 2024 Buyers Guide.pptxAlpha Media March 2024 Buyers Guide.pptx
Alpha Media March 2024 Buyers Guide.pptx
 
10 Email Marketing Best Practices to Increase Engagements, CTR, And ROI
10 Email Marketing Best Practices to Increase Engagements, CTR, And ROI10 Email Marketing Best Practices to Increase Engagements, CTR, And ROI
10 Email Marketing Best Practices to Increase Engagements, CTR, And ROI
 

Xenial Book Summary for Busy IT Leaders

  • 1. The Xenial summary of: Infonomics, by Douglas B. Laney The Cloud Adoption Playbook, by Moe Abdula, Ingo Averdunk, Roland Barcia, Kyle Brown, and Ndu Emuchay The Stress Solution, by Arthur P. Ciaramicoli Book Summary for Busy IT Leaders
  • 2. Authors SethTemko Rockin’ VP of Marketing, is an entrepreneur who never seems to run out of ideas. This book summary is one of those ideas. Andy Grindstaff Manager, Product Management, has two modes: full-tilt enthusiasm and asleep. Fortunately, those of us at Xenial only ever see the former. Michael Kowalski Director Product Communications, geeks out over technology and storytelling. © 2019 Xenial, Inc. A Global Payments Company. All Rights Reserved.
  • 3. 1 Thank you! Xenial is deeply honored to serve you in this challenging industry. We care about you. We care about your personal and your professional success. We know in that commitment to success “staying sharp” with knowledge is a key driver. But for most, time is in limited supply. To that end, Xenial offers as a gift three key books to help with your personal success and your professional development. We’ve also taken the time to write summaries of the books to help you in making the most use of your valuable time.Thank you for being that great, wonderful you. Sincerely, The Xenial Team
  • 4. 2 Infonomics: The Xenial Summary...........................................................................3 The Cloud Adoption Playbook: The Xenial Summary............................................ 16 The Stress Solution: The Xenial Summary............................................................28
  • 5. 3 Infonomics:The Xenial Summary How to Monetize, Manage, and Measure Information as an Asset for Competitive Advantage Written by Douglas B. Laney Summarized by Seth Temko, Xenial Summary If you believe that competitive advantage in your business is a “data game”, that data is undervalued in your overall organization and you seek to significantly increase your company’s cultural embrace of data as a significant business tool then… Infonomics is a must read. Infonomics is not a deep dive into Big Data, machine learning or AI. Instead it’s a strategic guide from a consultative perspective in recognizing the value of data in your organization and a planning strategy tool to get buy in organizationally to creating a data-centric and data-driven organization. This book is a good blend of theory and implementation. Its concepts are laid out very logically that adapts well to a presentation of concept and hierarchy thought and action. This book is high on logic and zero on entertainment. Written in a dry style, there is nothing riveting or entertaining about this tomb. It is dense on content that will make you think but not “wonder about the stars”. Consider this book a tool to give you a framework of thought, conversation and planning to raise the profile of data in your business outside of “just” the IT orga- nization. Please note this book is a product of Gartner, Inc. which draws heavily from that consulting organization’s philosophy and engagement methods. Introduction This short introduction pulls from a childhood story of the author’s life as an illus- tration of the changing role and importance of information. It also introduces the term “infonomics” as the marriage of “information” and “economics”.
  • 6. 4 Chapter One:Why Monetize Information Laney opens the chapter with a description of a multi-thousand-acre farm com- pletely attended by fully autonomous farm equipment tied to networks, software and databases allowing a single farmer to manage, operate and control all opera- tions from a single table using a single computer. Unheard of decades ago, farms have become enormously large using the same “small farm” workforce. How? Data tied to technology. Within this food production industry metaphor, he then discusses the equipment manufacturers that are collecting and utilizing data feeds from their own field-de- ployed equipment to drive the value cycle to the farmers. Finally, he discusses data utilization by seed, fertilizer, pesticide and other suppliers. This data “chain” has caused unparalleled levels of food production efficiency. It also sets the key example for context around the theory of infonom- ics which is “the theory, study, and discipline of asserting economic significance to information”. Infonomics theory posits that information should be valued as its own asset class in the same way that money and capital goods are assets. “Infonomics provides the framework businesses and governments need to value information, manage it , and wield it as a real asset.” This book, Infonomics, is focused on CEOs, CIOs, CFOs and enterprise archi- tects. The book is structured in three parts as a guide to “monetize, manage and measure your information”. Monetize: Justification, Inspiration, Execution Manage: Barriers, Framework, Organization/Roles Measure: Quality, Value, Economics The author lists top monetization myths: • “Information must be sold to be monetized • Monetization requires an exchange of cash • Monetization only involves your own information • Monetized information typically is in raw form • One must be in the information business to monetize information • Few others would want our information • It’s best for us just to share our information with our suppliers and partners.”
  • 7. 5 Section I: Monetization Chapter 2: Prime Ways to Monetize Information Monetization of information can be direct and indirect “cash in the door”. There are many business opportunities and improvements that are derived from strate- gic use of information. These include: • “Increasing customer acquisition/retention • Creating a supplemental revenue stream • Introducing a new line of business • Entering new markets • Enabling competitive differentiation • Bartering for goods and services • Bartering for favorable terms and conditions, and improved relationships • Defraying the costs of information management and analytics • Reducing maintenance costs, cost overruns, and delays • Improving citizen well-being.” Chapter 3: Methods of Monetizing Information The author uses a corporate relocation to illustrate the economic opportunity for vendors who served him in the relocation. Additionally, he points out that his “former” banker called him a year later to sell him a product but didn’t realize that (1) he’d moved and (2) the bank had purchased his new mortgage so he was already a customer. This serves as a backdrop to discuss the methods of moneti- zation of information. These include: • “Establish an information product management function tasked with generating measurable economic benefits from available information assets • Develop and maintain an inventory of possible information assets from throughout the organization as well as from second- and third- party sources • Evaluate alternatives for both direct and indirect information monetization • Identify, adopt, and adapt high-value information monetization ideas from other organizations, especially those in other industries • Test information monetization ideas for feasibility • Prepare and package information for monetization
  • 8. 6 • Establish and cultivate a market for the information asset.” The author provides extensive examples and guidelines for the above points. Chapter 4: Analytics -The Engine of Information Monetization The author uses Mobilink, Pakistan’s leading provider of telecommunications, as a case study of a market dominant business needing to defend its market share from competitive pressures. In this case, Mobilink used SAP’s InfiniteIn- sight product to analyze customer behaviors and needs in order to provide new products and provide value to prevent its customer base from switching over to competitors and generate new revenues. The author discusses the need to move from “Descriptive to Diagnostic, Predic- tive, and Prescriptive Analytics”. He then uses efforts from Coca-Cola to illustrate this value shift. The keys to the value shift include: Exploiting Big Data. Improved and actionable decision making. Identifying monetizable insights. The author breaks down these high-level topics into specific examples and breakdowns such as monetizing increased data volumes and velocity, embracing complexity, automating gover- nance, etc. Section II Managing Information as an Asset Chapter 5: Information Management Maturity and Principles The author laments that businesses create best practices to track their balance sheet but have inadequate data management and data history practices. This lack of recognition is a challenge with CEOs and CFOs. “Why don’t organizations manage their information with the same discipline as their other, formally-recog- nized enterprise assets?” The author lays out Gartner’s EIM (enterprise information management) maturity model, which consists of Vision, Strategy, Metrics, Governance, People, Process and Infrastructure. There are 5 levels of EIM maturity: • Level 1- They are generally aware of key issues and challenges, but lack the budget, resources, and/or leadership to make any meaningful advances in EIM. This is 10% of organizations. • Level 2- They are generally reactive, application-centric, waiting for problems and then reacting, which can manifest in significant business losses. This is 30% of organizations.
  • 9. 7 • Level 3- They are somewhat proactive and have begun building information management frameworks. This is 40% of organizations. • Level 4- They have clear leadership in this area and can manage and leverage information across multiple programs. They have organized, enterprise-level coordination and management. This is 15% of organizations. • Level 5- They have optimized many or most aspects of “acquiring, administering, and applying information as an actual enterprise asset with high-functioning organization structures, talent and technologies. This is 5% of organizations. There are five barriers to information asset management: Awareness, Leader- ship/Management, Business Governance, Enabling Systems/Practices and Justi- fication. The author outlines systems and constraints around these topics. Chapter 6: Information Supply Chains and Ecosystems The author uses the concept of “information supply chain” as an illustration for the collection, organization and delivery of information within and outside of an organization. “A supply chain is a system of activities and resources involved in moving a prod- uct or service from the point where it is manufactured to where it is consumed.” The author applies SCOR, the Supply Chain Operations Reference, to this infor- mation model, as follows: • “Plan- Process that balances aggregate demand and supply to develop a course of action which best meets sourcing, production and delivery requirements. • Source- Processes that procure goods and services to meet planned or actual demand. • Make- Processes that transform products to a finished state to meet planned or actual demand. • Deliver- Processes that provide finished goods and services to meet planned or actual demand, typically including order management, transportation management, and distribution management. • Return- Processes that provide finished goods and services to meet planned or actual demand, typically including order management, transportation management, and distribution management. • Enable- Processes for establishing and operating the supply chain procedures, resources, and facilities, including relationships with all stakeholders and other involved parties.”
  • 10. 8 The author translates the metrics from the SCOR model to the Information Supply Chain which include: Reliability, Responsiveness, Agility, Costs and Asset Management Efficiency. The author then turns to an information ecosystem definition of Ecosystem Entities, Ecosystem Features, Ecosystem Processes, Ecosystem Influences and Ecosystem Management. Chapter 7: Leveraging Information Asset Management Standards and Approaches In this chapter, the author begins by highlighting the lack of official data/infor- mation quality standards. There are several unofficial organizations but not an ISO certified body. These ISO standards are currently established for software standards but they are not specific to information assets. ITSM (Information Technology Service Management) has a set of processes, procedures and other tools known as an Information Technology Infrastructure Library (ITIL) that encompasses ITIL service strategy, service design, service transition, service operation and continual service improvement. The author proposes that these processes and procedures could be borrowed from the ITIL playbooks to be Information Service Strategy, Information Services Design, Information Service Transition, Information Service Operations and Infor- mation Service Continual Service Improvement. The author then explores content management approaches and discusses Re- cords Information Management (RIM), Enterprise Content Management (ECM), Library Science and Balance Sheet Asset Approaches. Fiduciary Management is discussed in the light of Controllership, Treasury Duties and Economic Strategy. Human Capital Management is discussed with the People Capability Maturity Model (P-CMM) which is a human capital resourcing model first developed in 1995. By substituting “information” for “workforce” he lays out an information management model based on this workforce management model. Chapter 8: Applied Asset Management for Improved Information Maturity This chapter begins with a deep dive into the Gartner EIM model. The author elaborates on the full seven dimensions of this model: Vision, Strategy, Metrics, Governance, Organization Roles, Life Cycle and Infrastructure. Each topic has some illustrative stories/examples and discusses the cons of not addressing these areas.
  • 11. 9 Section III: Measuring Information as an Asset Chapter 9: Is Information an Asset? The author uses a financial event in 2000 to illustrate the failure of transparency in corporate accounting practices as a model failure preventing effective busi- ness decisions from being made. It introduces the view that accounting infor- mation is an asset of a company and sets the stage for the rest of the book, in which the author explores “what constitutes an asset from the perspectives of accounting professionals and the law”. The author points out that even the information assets of “information compa- nies” such as TransUnion, Onvia, HG Data, and The Nielsen Company (formerly known as A. Nielsen) are nowhere to be found in the balance sheet. According to accounting rules, information is not considered “valuable” for these compa- nies. Some persons claim information cannot be tracked, that it is non-depleting and therefore can not be part of accounting. To the accounting profession today, this means information should not and is not valued by a company. The author spends several pages giving real world examples and concepts of Information Economic Value. This is nowhere more obvious than Wall Street’s valuations of “info-savvy” companies. The author defines an asset and the reporting of assets on balance sheets. He then poses the question “Is information a liability?”. Chapter 10:Who Owns the Information? This chapter explores information ownership from several angles: • Legal precedent for information ownership claims • Accounting principles • Language used inside of organizations • Ownership of our personal information • Whether we can own something related to information In a disagreement over ownership of a database in the UK, the court ruled that information should not be considered property. A dissenting justice in the case, however, pointed out that the ruling was based on “ignorant notions of informa- tion and antiquated property laws…[since] today, we live in an electronic world in which information holds legitimate commercial value.”
  • 12. 10 Legal precedent for information ownership is complex. The author cites The Aus- tralian Computer Society’s Data Taskforce working paper: “The ability to use, replicate and share data means it cannot be considered in the same way as a physical asset with an ‘owner’. Rather, it is important to think of rights, roles responsibilities and limitations for those who access data in the various process from collection, sharing and storage.” Even laws regarding ownership of a physical asset such as a home vary widely. Liens, mortgages, property taxes, and the like put parameters, restrictions, and limitations on true ownership. Control vs location: it matters. The author cites a case in which a U.S. court ordered Microsoft to relinquish information stored in a data center in Ireland. The upshot for CIOs or others responsible for corporate information storage and transfer: limit your assumptions with regard to the locality of information. As a result of the Ireland data case, Microsoft took the bold step of having local com- panies own the hardware and data centers upon which Microsoft data sits. The author cites a case in which one party misused the database created by an- other party. The lesson from this is that “until sufficient and consistent laws are formulated, assume that information is not legal property and you cannot confi- dently own it. Therefore, your focus should be squarely on the rights of those to whom you entrust and avail information within your control.” The author next turns to the question of whether information can be considered an asset, as it so often is referred to in everyday casual conversation. He gives the accounting definition of an asset: • “Something owned and controlled by an entity • Something exchangeable for cash, and • Something that generates probable future economic benefits which flow to that entity.” Control. The issues in play here include: • Whether information is shared (you may retain rights to it, but it may be no longer under your control) • Separability, that is, is it bound to an application, e.g., ‘the salesforce. com data’? In the past, the two may have been inseparable; however, increasingly, information generated by one function or application is leveraged elsewhere, and is, in effect, becoming unbound. Exchangeable for Cash. The author checks this box by citing data brokers Equifax and J.D. Power, among others.
  • 13. 11 Probable Future Economic Benefits. The author argues that, just like a car sitting on an auto sales lot or a can of soup on a grocery store shelf, dormant informa- tion assets have probable future economic value. Next the author considers ownership from several angles. Usage. Although information cannot be protected, for the most part, like other forms of intellectual property, “how information is created or used can be consid- ered property in the eyes of the law.” Individuals and companies today are using the business method patent to secure ownership of processes. An example is the increase in patents on Algorithms, which the author cites “have grown 30x over the last fifteen years.” Ownership by Departments or Individuals The author juxtaposes the ideas of ownership and trustee, having found several leaders in the industry who prefer the latter and quotes Barb Latulippe, the Chief Data Officer at Dell EMC, “Ownership? I don’t like the term. We’re trying not to use it anymore. It just encourages politics and information silos. Our policy states that data is a shared asset and the property of the company, not individual business units or people.” “Data trustee... may not have the authoritative connotation “data owner” does... in the context of a fiduciary, discussed in chapter 8, it carries both legal and ethical weight.” Trustee conveys the idea of shared ownership and shared responsibility as ap- plied to information, the author says. “Information sovereignty conundrums” do exist, however, and these come into play when geopolitical and regulatory factors are applied. The author cites the example of McDonald’s Corporation in the U.S. trying to access data from some of its operations in Europe. Depending on a given country’s regulations on data, international borders can create hurdles–and formal processes–for information sharing. Within the U.S. even federal and state agencies end up in unintended information sharing battles, guided and constrained by the regulations they must follow. Chapter 11: Quantifying and Accounting for Information Assets An interesting test of the value of information and whether it is considered an asset was the tragic September 11, 2001 terrorist attacks on the World Trade Center’s Twin Towers. In the aftermath, companies reeling from the loss of
  • 14. 12 data (this was before cloud storage and redundancy had been widely adopted), many sought recourse by appealing to their liability insurance carriers. Insurers, however, denied the claims on the grounds that information was not considered property. Shortly after, the U.S. insurance industry updated its liability policy template to exclude information assets from property coverage. Further, the accounting profession updated a key financial standard to state that “certain intangibles including customer lists and the like cannot be capitalized.” Despite how insurers and accountants view information assets, the author ar- gues that there are many reasons why companies should measure their informa- tion quality of value. He also shares various models of how this can be done. First, Why. The author re-frames an oft-quoted saying “You can’t manage what you don’t measure” as follows: “It’s easier to manage what you measure.” Or, “It’s best to measure what you intend to manage.” When applied to information: If we get a handle on information the way we do other company assets – if we can get our arms around it – “measure it, report on it, understand its characteristics and how it’s used”, this, in itself, ends up affect- ing how we “capture, produce, manage, and use it.” Here are some possible information-related benefits of getting a handle on our information and assigning it a value: • Prioritizing information-related initiatives and justifying their benefits: knowing which information assets are most critical can help you decide which activities related to information are most important. Of course, it’s good to have data behind these decisions. • Creating a common language about information- its “quality, security, availability” and so on leads to common understanding among the people in the information value chain. • Improving information security: Organizations look for–but seldom find–a benchmark for how to budget for infosec. Quantifying the value of information helps at least put a stake in the sand as a reference point. Next, the author discusses the business-related benefits of measuring informa- tion value:
  • 15. 13 Improving information monetization. The author poses the question: “If acquiring and administering an information asset has a measurable expense, shouldn’t you be recouping it, at least?” Understanding corporate value. Doesn’t proper alignment of strategy and bud- gets require a valuation of all assets, including information? Growing market valuations. If no one else sees information as an asset, investors seem to. “Nearly half of equity analysts consider a company’s information along with its analytics capabilities in valuing the business as a whole.” Making an impression on investors. “There’s evidence from IP advisory firms to suggest that companies that are internally valuing their information assets, even though they are non-auditable per accounting regulations, are rewarded by potential suitors.” Next the author discusses measuring the value of information. The author posits that “companies that take seriously the notion of information as a corporate asset should engage in the same quality assessment discipline as with their traditional physical and financial assets.” He next lists and describes objective and subjective data quality metrics. Then the author gets to the heart of the chapter, describing various informa- tion asset valuation models. He quotes the celebrated statistician Dr. George Box, who said “All models are wrong; some models are helpful.” He goes on to remind readers that “Models are meant to approximate reality using available inputs and accessible formulae; they are not a substitute for reality itself.” As a prelude to his descriptions of various valuation models, the author states, “All asset valuation-related methods such as internal rate of return (IRR) or eco- nomic value add (EVA), along with all accounting methods for any kind of asset, are based on a set of assumptions. It is important that assumptions are properly described and consistently applied.” For several valuation models, he gives an Overview, a Formula, Implementation notes, and finally Benefits & Challenges. The author then lists additional models and their author(s) / developer(s). Next, he covers understanding and closing information value gaps. He closes the chapter by giving examples of how certain information valuation models may be used in combination.
  • 16. 14 Chapter 12: Adapting Economic Principles for Information As the author stated in various places in the book, Infonomics is a concept and a set of disciplines that is in its infancy. Therefore, applying economic principles to information assets will need some examination and formulation. “In the current information-driven society and increasingly digitalized world, sen- timents are shifting from the economics of tangible assets to the economics of information—“infonomics”—and other intangible assets.” “Classic macro- and microeconomic principles were developed to better un- derstand and improve the consumption of traditional goods and services, not information assets.” Therefore, “The unique qualities of information assets and the way they are pro- duced and consumed compel us to re-examine economic principles and models, and adjust them as necessary for this new age asset.” In the remainder of the chapter, the author describes and reformulates the princi- ples of economic principles that apply to information, including: • “How the principle of supply and demand operates differently with information than with other assets • How to understand and apply the forces of information pricing and elasticity • How understanding the marginal utility of information for both human and technology-based consumers of information assets must be factored into selecting and publishing them • How the information production possibility frontier affects information- related behavior and investments • How to use Gartner’s information yield curve to conceptually integrate the concepts of information monetization, management, and measurement for improved information-related and business strategies.” Chapter 13: InfonomicsTrends To close the book, the author discusses trends in infonomics. He starts by listing eleven trends that indicate that various players in the information ecosystem are directly or indirectly urging information leaders to treat information as a legiti- mate asset. Three of the eleven are: • “Continued globalization requires that organizations improve information sharing and ingestion • Smart government services based almost entirely on a platform of information • The rise of the machines, algorithmic sprawl, and the promise of AI rely on...information sources…”
  • 17. 15 The author then describes what he foresees happening in six areas related to information itself: • Big data • Organizational inhibitors to information monetization • Information rights conscientiousness • Advanced analytics, algorithms, and artificial intelligence • Information infrastructure • Information security and privacy Finally, the author shares his outlook on the future of Infonomics. He introduces his predictions with a quote from a company that has made great strides in view- ing and valuing information as an asset. “Our finance people used to chuckle about the idea of information as an asset. The reality is that for most employees, our business is data. 70% of our employ- ees don’t touch an aircraft, but everyone touches data.” —Matt Cordner, Director of Global ERP and Analytics, Textron (Parent company of Bell Helicopter, Beech- craft, and Cesna) The author then gives is predictions for each of the three areas he structured the book upon: • Monetization • Management • Measurement Appendices The book offers two handy appendices: • Appendix A contains a bullet list of information management maturity challenges grouped by categories such as vision, strategy, etc. • Appendix B lists sample legal rulings related to information property rights, with a short description of each case.
  • 18. 16 The Cloud Adoption Playbook: The Xenial Summary Proven Strategies for Transforming Your Organization with the Cloud Written by Moe Abdula, Ingo Averdunk, Roland Barcia, Kyle Brown, and Ndu Emuchay Summarized by Andy Grindstaff, Xenial Summary The vast majority of people who are reading this have, in one way, shape or form, been confronted with the question of when or how to move their business into a model that leverages cloud technology. Most are probably already leveraging cloud technology in some way, but might be wondering if this is something they should be pursuing more seriously. They’ve probably encountered naysayers who wonder if this is just another technology trend that won’t really make it past the Early Adopters chasm (as defined in the Beal and Bohlen technology diffusion process in 1957). What this book (and those of us at Xenial) can state, with finality, is that the cloud has made it past the technology adoption chasm. It can no longer be considered an emerging technology or a fad; cloud is now an intrinsic part of the enterprise fabric. In a 2017 Forbes article, Louis Columbus quoted from an Intel survey that showed 80 percent of all IT budgets would be committed to cloud applications and solutions. The thesis of this book is that if your business is not thinking along the lines of that, you could be at a serious disadvantage. Consider this excerpt: A recent IBM study of more than 800 cloud decision-makers defined organizations that utilize the cloud to gain competitive advantages as “Pacesetters.” These organizations use cloud to re-imagine business models, make better decisions based on analytic insights, and serve customers in new ways to create winning business outcomes. Pacesetters experienced almost 2 times the revenue growth and nearly 2.5 times higher gross profit than their peer group. What this book helps to do is answer the inevitable next question someone might have after reading that: “Ok, that sounds great. How do I actually adopt this new technology?” This book is appropriately titled The Cloud Adoption
  • 19. 17 Playbook because it breaks down all the pieces of your business that need to be addressed to successfully adopt this technology that is transforming businesses all over the world. This Playbook is for those who are (or aspire to be) catalysts for digital transformation in their organizations, leaders who see the need for transformation as well as those who have direct responsibility in executing it. The authors are a group of experts who are part of IBM’s Cloud Garage and have consulted with many large enterprises from a variety of industries to help them move part or all of their technology platforms to the cloud. The reader can be confident that when advice is offered through this book, it’s done with an expertise that’s already been there and done that. They believe “the most crucial decision that a company can make to successfully pursue a digital transformation strategy is to wholeheartedly yet thoughtfully adopt the cloud as the IT platform of choice.” Many companies have dabbled in the cloud; however, no business has ever dab- bled its way to success. What follows are summaries and important points of the 10 chapters in this book to help equip your enterprise to do more than just dabble in cloud adoption. It is a Playbook that provides the necessary moves to make for undertaking a holistic technology transformation that will forever change the future of your company. Chapter 1 – Business Drivers First, let’s offer up the definition for what cloud computing is: “Cloud computing is a model for enabling ubiquitous, convenient, on- demand network access to a shared pool of configurable computing resources (e.g. networks, servers, storage, applications, and services) that can be rapidly provisioned and released with minimal management effort or service provider interaction.” (National Institute of Standards and Technology, 2011) Ultimately, cloud technology is just a means to an end and that end needs to be defined for an organization to be successful with the cloud. The intent you have for cloud adoption is the first step, and identifying those business drivers is key. Within enterprises, leaders are aligning their cloud adoption and digital transfor- mation programs through strategic intents such as: • Creating a customer-focused enterprise by optimizing data and leveraging analytics • Increasing flexibility and streamlining operations • Driving innovation while managing cost • Optimizing enterprise risk management When defining these strategic intents, you must also consider your enterprise’s tolerance for sustained or disruptive innovation and how that fits into its priori-
  • 20. 18 ties. The process begins by clarifying your objectives. You must decide what you really want from digital transformation and cloud adoption. You must determine the strategic intent behind those objectives, determine how well aligned your enterprise is to those objectives, and continually re-evaluate what you must do to align with these objectives. Digital transformation is not easy; it requires inspiration, a clear and consistent focus, and persistence over time. As Simon Sinek famously wrote: “Start with the why.” Chapter 2 - Framework Overview Every good plan needs an outline and this chapter gives just that. First, it is important to recognize and understand the challenges that an enter- prise will encounter during the transformation process. These are some areas the authors identified: • Organizations moving to the cloud must make migration and modernization decisions to determine the best fit for existing applications and data. • Organizations require the right talent to fuel innovation and usually require organizational-culture upgrades to support new ways of working to achieve the intended velocity of change. • Organizations can encounter risks as tool selections made for traditional enterprise application development may not be the right ones for development in the cloud. • Organizations require a development methodology that is suited for both cloud-enabled and cloud-native development, as well as enabling management and delivery in a multicloud model at scale. • Organizations face operational challenges in integrating, managing, and securing off- and on-premises applications and data as a consistent whole. To overcome these challenges, organizations must: • Practice new forms of agile engagement and organizational alignment • Rethink and renegotiate relationships with providers • Establish new foundations (in terms of methods, tools, and skills) to propel transformation For this, the authors created their framework- which is discussed across Chap- ters 4-10. In this chapter however, they outline the ten key actions within this framework that they believe must be taken to ensure the types of alignment needed for successful outcomes:
  • 21. 19 1. Involve the right people 2. Achieve business and technology alignment 3. Take a holistic approach across business dimensions 4. Assume an outside-in, client-centered approach 5. Open the aperture of your business considerations to new possibilities 6. Show progress and identify quick wins (This one is key to sustaining momentum!) 7. Collaborate actively 8. Balance sustained and disruptive innovation 9. Establish success criteria 10. Account for a multicloud hybrid model Chapter 3 - Strategy A vision without a strategy remains an illusion.- Lee Bolman Ninety percent of business and technology executives are including cloud computing in their current or three-year plans. While the value of cloud is well un- derstood, and investments are funneled to make progress toward a cloud-based transformation, the experience of the authors highlights that only a small per- centage of enterprises had a documented cloud adoption strategy when asked. Strategy is what enables alignment between vision and execution. That strate- gy should translate vision into practical roadmaps that are broad, prescriptive, actionable and most critically, flexible. Here are six prescriptive steps that the authors identify as being required to develop a cloud strategy: 1. Define business objectives and constraints. 2. Complete analysis of your workload portfolio. 3. Envision your future state and analyze your current state. 4. Assess your organization’s readiness. 5. Build an execution framework with defined strategic milestones. 6. Define proven approaches best suited to your organization. Remember this: the technologies used are only part of implementing a success- ful cloud strategy. An organization’s structure and its willingness to adopt new technologies and to manage new operating models are equally important and should not be overlooked.
  • 22. 20 Chapter 4 - Culture and Organization An organizational culture is the combination of the shared values, beliefs, and social norms in an organization, resulting in behaviors, practices, and customs that the members of the organization follow. It is formed and molded by inter- nal and external forces acting on the organization; it reflects the history of the organization, sometimes derived from a shared mythology and the philosophy of the organization. Understanding your company’s culture is the first step toward making the right organizational decisions. Here are some cultural elements of your company that you need to consider and weigh: • Willingness to embrace change- Cloud services change A LOT of the way traditional IT is run, especially when it comes to pace and methodology. • Decision-making style- Cloud technology allows for a lot of flexibility to adapt to various styles. You just need to know which style your enterprise falls under. • Attitude toward risk- You must find the balance between risk-averse and gun-slinging. • View of failure- When working in a cloud-enabled world, you must provide a culture in which small failures are viewed as learning experiences. It’s the only way that a team can move on to larger, more ambitious experiments with potentially larger payoffs. When adopting the cloud, you are going to need to make changes in your talent and embrace flexibility. Remember, any time you propose a change in an orga- nization, you will encounter resistance to that change. Here are two changes in your organization that will happen in a successful adoption of the cloud: • You’re going to need more generalists and fewer specialists. • Your organization will become less compartmentalized and more integrated. The rest of the chapter is devoted to suggestions of organization that the authors have seen be effective in enterprises adopting the cloud. First, the goal would be that the organization can evolve to an agile-based squad model (which was originally formulated by Spotify). These squads would: • Be divided into either an application development squad or a specialized support squad • Be made up of 10 people or fewer working in development pairs with a squad lead and a product owner • Be small, autonomous, and co-located
  • 23. 21 • Be able to be grouped up with other squads to form a guild with similar interests or specializations who could then be grouped into tribes for larger development efforts Second, to effectively transition from traditional models to agile-based squad models, the authors recommend establishing a center of competency (COC). A COC is: • An independent body that is not owned by any particular development group, architecture board or operations team. It is supported and staffed by all organizations that have a stake in the success of the new technology. • A managed entity with real priorities and deliverables, not a think tank to come up with new ideas. • In charge of overseeing project conception, skills acquisition, and knowledge dissemination with the goals of promoting best practices, providing as-needed expertise and helping teams become self-sufficient so that the enterprise is able to look ahead at new disruptive technologies. Putting a COC in place is the best recommendation the authors can give for building an organization that will be successful at embracing change. Sometimes prior to implementing a full COC, starting with one or more pilot projects can help get momentum but the goal is that an enterprise can expand that in order to be successful. Chapter 5 - Architecture andTechnology In this chapter, the book begins to dive into more of the technical recommen- dations associated with moving an enterprise to the cloud. The main focus here is on the crucial role of architecture in modern cloud projects and the architects who are crucial for setting direction and guidance for cloud migration. Enterprise architects are responsible for: • Empowering developers and site reliability engineers to make more decisions during project execution so that architects can focus more on strategy for repeatable success • Properly assessing workloads of teams so that there is not an imbalance • Building artifacts (diagrams and texts describing the abstract concepts) for the broader platform so that developers can execute upon them • Defining non-functional requirements such as page-response time or maintainability and manageability of the platform Just as a conductor of an orchestra can play every instrument they conduct, the architect should understand and have experience in all the systems they are designing. They are expected to be leaders in the development and operations
  • 24. 22 spaces because of their experience. Ultimately, the architect role will be re- sponsible for providing a reference architecture and guidance to the team that is implementing a DevOps approach (an approach that the authors deem critical to being a successful cloud-based enterprise). The components of a reference architecture are: • Define a clear set of architectural styles- such as microservices and web development • Define a clear set of nonfunctional architectural aspects • Convey meaning by using only simple, minimal pictures • Provide example implementation artifacts in the language of implementation- such as GitHub pages of sample code for developers In order to be successful in a microservices application environment, the concept of DevOps should be instilled. Several development- and operation-specific aspects of this are: • Continuous provision • Continuous build • Dependency management • Continuous testing • Continuous deployment • Monitoring and logging • Cloud management services This chapter also gives an example of a reference architecture using a modern microservices approach to applications as well as tips on instilling the concept of DevOps into the enterprise. Chapter 6 - Security and Compliance This chapter is specifically designed for the Chief Information Security Officer (CISO) at your enterprise. Security and compliance looks very different in the cloud but is no less important. First, here are some assumptions from the traditional IT model that you might have that will change when moving to the cloud: 1. You can control access, security, and confidentiality all the way down to the physical hardware. This will never be the case and you will have to work more closely with the providers and vendors you select to make sure they meet your criteria. 2. Everything is contained within your network. This will also never fully be
  • 25. 23 the case. You will need to ensure that you set up proper monitoring and validation to ensure compliance is maintained. 3. Your team is responsible for everything. This will cease to be the case. The roles on your team must change and adopt the role of generalists rather than specialists. Then you can leverage the specialization of the providers and vendors you are partnering with. 4. All your data must be stored locally. By nature of the cloud, this will never fully be the case either. You will likely need to adopt multicloud hybrid models and lean on your enterprise architects and vendors to properly adhere to regulations. 5. Your developers need to be security experts. They do not need to become full-time security experts, but instead can leverage approved, hardened security services available from the cloud platform. Here are some of the main questions this chapter addresses in detail: • How do I protect against data breaches and loss? This solution brings in a combination of encryption key management, digital certificate management and monitoring for data integrity. • How do I protect against networking vulnerabilities? This is addressed through a combination of cloud-hosted firewalls, intrusion prevention systems (IPS), Distributed Denial of Service (DDoS) mitigation services like Akamai or CloudFlare, and microsegmentation practices. Leveraging secure DevOps procedures, a cloud platform can offer many solu- tions for dealing with threats to your business and cover any level of security and compliance needed. This chapter goes into depth on examples of mitigation for the risks above, how to properly manage identity and access management, what a secure cloud-native solution looks like, and what secure DevOps practices a team can adhere to. Chapter 7 - Emerging Innovation Spaces Innovation is definitely something that is near and dear to our hearts here at Xenial and is commonly a reason we see enterprises pursuing a cloud platform/ strategy. The authors of this book rightly identify that innovation can often be a business driver in itself. Here are several examples of how the authors identify the cloud driving innovation: • Data and Analytics- A proper cloud architecture offers better ways to explore and deploy new analytics approaches that enable speed and agility. Part of the challenge of data analytics in an enterprise is that the data points needed are stored all over the place, but with the cloud, that kind of distribution falls right into the benefits of cloud architecture design. • Blockchain- As most are aware, this concept emerged from the digital
  • 26. 24 currency movement but the idea has matured into open-source and commercial products with the cloud in mind. Leveraging this shared ledger technology, any time a limited amount of trust exists among multiple parties, the blockchain creates an environment that can eliminate fraud and create transparency. • Containers- Within the microservice architecture, the concept of containerization provides consistent application development models from development through production. This has caused a massive speed boost to the way new code is moved into the real world. • Internet of Things (IoT)- IoT is the connection of devices to the internet. It is projected that the amount of connected devices will reach 20.4 billion by 2020, providing massive amounts of data points that can be sliced and diced to drive innovation in so many ways it can’t be fit into this summary. • Cognitive- Sometimes referred to as artificial intelligence (AI), cognitive technologies are essentially conversational or discovery applications that can answer questions and provide guidance that help people make decisions. Some cognitive services that can be added to these applications include visual recognition, speech-to-text, text-to-speech, personality insights, tone analysis, and language translation. Chapter 8 - Methodology A software methodology is something that sounds much more impressive than it is. A methodology is nothing more than a description of the guiding principles and set of steps that a team follows in developing a system. Every team, no matter the size, has one whether they like it or not. This chapter breaks down the IBM Cloud Garage Method into seven parts. Culture: • Build diverse teams • Define organizational roles • Work in autonomous co-located squads • Adopt Agile principles Think: • Use a continuous cycle of observing, reflecting and making • Define a minimum viable product (MVP) • Hold “playbacks” to gather feedback and keep the team in sync • Plan iterations by using a rank-ordering backlog Code: • Hold daily standup meetings
  • 27. 25 • Use test-driven development- a process of writing a failing test case and implementing just enough code to pass the test • Practice pair programming- the idea of letting developers work together, in pairs, at one set of keyboards and monitors to double the amount of attention on each piece of code • Continuously integrate all working code • Automate testing Deliver: • Deliver continuously by using a pipeline • Automate deployments Run: • High Availability (HA) infrastructure- deploy multiple data centers with the ability to fail over • Dark launch and feature toggle to get initial evaluation and feedback before going live to all customers • Implement auto-scaling Manage: • Automate monitoring • Enable fast recovery mechanisms • Test for the unexpected- know how your application responds when someone pulls the plug • Automate operations to reduce cost Learn: • Run A/B tests • Drive development with hypothesis- you must be experimenting continuously Chapter 9 - Service Management and Operations Independent of where applications run- in traditional IT data centers or in the cloud- they must be managed to ensure availability, security, and adequate qual- ity for users. Service management and operations is a mature and well-defined discipline that designs, delivers and manages the functions necessary to use IT within an organization. The big question is “How can a process-heavy, mature operations team evolve to support modern Agile and cloud-oriented approaches?” This chapter takes
  • 28. 26 an extensive look at that transformation, which is far-reaching and should not be underestimated because it is quite disruptive to traditional IT operations. The important piece to remember is that both the traditional and cloud approaches are accomplishing the same goal: delivering reliable services to the users at a justifiable cost. This transformation affects established roles, processes, technologies, and cul- ture and the authors provide examples of each of these aspects based on their experience. They also describe in great detail the impact of cloud transformation on important operational processes like: • Incident Management • Root-Cause Analysis • Deployment • Release Management For everything from those processes to future roles that must be created, to various new kinds of tools that can be leveraged like Slack and Kubernetes, the authors provide in-depth details and suggestions to set your operations depart- ment up for success in the future cloud-oriented state. Chapter 10 - Governance Cloud adoption and digital transformation are the future of IT. However, the reality is that this future is multichannel, multicloud, and multivendor. This com- plexity creates the obvious need for a governance model that is well thought out by your organization. A governance model should establish core principles, rights, and standards that enable you to govern cloud-related decisions and do the following: • Enable you to identify, manage, and mitigate risks • Help you ensure regulatory compliance • Help you drive toward standardized solutions • Promote consistent cloud adoption throughout your organization • Drive synergy through sharing and reusing processes that work. For such a model to be effective, the following elements must be in place: • Strong technical leaders who understand strategy and architecture • A transparent operational model • Appropriate talent management and human resources to attract and retain the right expertise and capabilities
  • 29. 27 • If your organization is multinational, you must have buy-in from global partnerships and alliances to create collaborative ecosystems. The chapter then offers two different models of organizational constructs that the authors have seen to be effective in implementing governance in a cloud model: the Center of Competence model and the Chapters and Guilds model.
  • 30. The Stress Solution: The Xenial Summary Using Empathy and Cognitive Behavioral Therapy to Reduce Anxiety and Develop Resilience Written by Arthur P. Ciaramicoli Summarized by Michael Kowalski, Xenial Introduction The Stress Solution was written by Arthur P. Ciaramicoli, EdD, PhD. Dr. Ciaramicoli is a licensed clinical psychologist and the chief medical officer of soundmindz.org, a popular mental health platform. He has served on the faculty of Harvard Medical School and also chief psychologist of Metrowest Medical Center. His other books include The Power of Empathy. In The Stress Solution, Dr. Ciaramicoli presents a method he calls empathetic cognitive behavioral therapy to overcome stress. The author starts by describing the problem: Stress and how common and impactful it is on our emotional and physical well-being. He then describes the practices of Empathy and Cognitive Behavioral Therapy, and how they interrelate in his practice. He uses examples from his own counseling practice to help the reader understand the concepts and see the outcomes and benefits of empa- thetic cognitive behavioral therapy in practice. To help the reader apply the prac- tices and methods described, Ciaramicoli provides exercises at the end of each chapter and Assessment Tools in the Appendix. 28
  • 31. Understanding Terms Empathy: the psychological identification with or vicarious experiencing of the feelings, thoughts, or attitudes of another (according to dictionary.com). Empathy is objective, based not on assumptions but on truth. “Empathy is centered on the uniqueness of the other person’s experience...a thoughtful response rather than a general reaction,” according to Ciaramicoli. Sympathy: harmony of or agreement in feeling, as between persons or on the part of one person with respect to another (according to dictionary.com). Sympa- thy is subjective, in that it is based on assumptions as to whether our experienc- es are similar. Cognitive BehavioralTherapy: A psycho-social intervention that aims to improve mental health. CBT focuses on challenging and changing unhelpful cog- nitive distortions (e.g. thoughts, beliefs, and attitudes) and behaviors, improving emotional regulation, and the development of personal coping strategies that target solving current problems (according to wikipedia.org) 29
  • 32. Chapter 1:WhyYou Should Care About Stress According to the Centers for Disease Control and Prevention, 66% of visits to primary care doctors are stress-related, and 50% of American workers say they stay awake at night troubled by the physical or emotional effects of stress. There are physiological and cognitive symptoms / repercussions from stress, yet only 17% of Americans ever talk with their health care providers about stress, cites the author. Pg. 2, pg. 6 Here’s how stress affects the brain and body: the amygdala (emotional center of the brain) sends a signal to the hypothalamus which alerts the adrenal gland to release the stress hormone cortisol. Blood pressure, heart rate, and blood sugar rise, while your immune system, digestion, sex drive, and other functions are put on the back burner. Memory, learning, and the ability to empathize are compro- mised. These are our natural responses to stress. If we experience chronic stress, then, one must wonder whether the chronic stress contributes to so many of us feel- ing chronically sick and tired. Stress may be at the root of cognitive issues as well. Too much stress for too long of a period can actually cause inflammation in the brain and may be linked to Alzheimer’s disease, schizophrenia, and multiple sclerosis. So stress is a chronic, widespread problem that 79% of Americans try to deal with on their own. The author cites a study by Steve Maier of the University of Colorado, which shows that the degree of control we feel over stress determines how much stress impacts us physiologically. Pg. 7 At the end of the chapter, the author provides a recommended exercise: a Stress Questionnaire. Chapter 2: Expanding our Humanity:The Discipline of Empathy In this chapter, the author explains and unpacks empathy and what happens to humans on a physiological and psychological level when empathy is–and isn’t– being practiced. The author states that empathy is an innate capacity but also considers it a ‘discipline’. That’s because, he says, it “cannot be easily mastered,” but rather requires “careful nurturing and constant attention.” Pg. 9 The lives we live hamper our empathy and our ability to develop and practice it. Hectic, harried, tired, and poorly nourished (due to haphazard eating habits), we become angry, detached, and less caring / empathetic. 30
  • 33. “We need the help of others to slow down and calm ourselves, confiding in those close to us so that we can begin the process of dissipating stress…empathy, and the positive neurochemicals it produces, cannot exist in the absence of trust and a sense of security…” Pg. 13 If we live lives of constant stress and depletion, our empathetic range becomes narrower. Our situation can be compounded by secondhand stress. We’ve all experienced it: we get swept along in the low mood of a partner or colleague. And when their stress pulls us down, it raises our blood pressure (along with the other physiological and cognitive effects that come from stress). All the things our physicians have long told us would benefit us such as adequate sleep, proper nutrition, strong relationships, etc., can also contribute to determin- ing the range of our empathy in a given moment, according to the author. Key to how we respond to others and our ability to be empathetic: keen awareness of our state of mind. It’s important to be in touch with our own state of mind; but we practice the discipline of empathy when we look beyond the surface of someone’s response to us. This helps us recognize the underlying issues in play. Their response to us may be anger, for example, but it’s often fueled by hurt, disappointment, and insecurity. Inwardly, when we are hurt, and we harbor that unresolved hurt, we tend to have anger and a sense of helplessness, which changes how we think and be- have. The author cites a study by psychologist Paul Levine and his colleagues at the Foundation of Human Enrichment showing that “a fixation on major or minor hurts makes people shun intimacy and aggravates stress.” The author then gives an interesting take on sadness and depression. He calls sadness “the body’s cue to stop, think, and work through what is troubling us. Depression is often...an attempt to avoid sadness.” Pg. 15 The downward/inward spiral of shunning intimacy and aggravating stress is best broken, according to the author, with compassionate, empathetic help from oth- er people. Allowing ourselves to be open and vulnerable, share hurts, and accept empathetic feedback helps us break from old thought patterns and the ‘story’ we created when we were first experienced hurt. Pg. 15 At the end of the chapter, the author provides a recommended exercise: Empa- thy Quotient Questionnaire located in the Appendix. 31
  • 34. Chapter 3: Empathetic Listening: Loving Away Stress To introduce empathetic listening, Ciaramicoli compares and contrasts two peo- ple in his life: • His mother, who was empathetic and self-giving for the whole time that the author knew her, and continued listening and giving, even into her final hours • His grandfather, who was known widely as a highly stressed, shrewd business person who took little interest in other people. At his grandfather’s wake and subsequent funeral, no one shed a tear. Contrast this with the author’s mother’s funeral, which was attended by people from all walks of life who shed copious tears and shared openly about the impact she had had on their lives. The author then uses the stories of Dmitri, a family friend, and several of the author’s counseling clients, to explain the tenets of empathetic listening and to provide examples of how empathetic listening, when put into practice, can change individuals and relationships. Do you listen, truly listen, listen more than you talk, and with compassion and empathy, to understand? Most of us listen, but we’re planning our response while we do. Or we listen with sympathy, that is, listening and relating what we hear to our own experi- ences. We’re often distracted, whether by external stimuli or our own internal dialogue. And all of this, while we’re purportedly listening to the person talking. Pg. 24 By contrast, our tendency as humans, especially when our emotions are stim- ulated as in a disagreement with a loved one, is to be prone to the cognitive distortion of generalization and to perceive a situation from our own perspective, which “prevents empathetic listening and causes defensive reactions in the person who is talking.” Pg. 24 In empathetic listening, we give up our own view to participate fully in another person’s experience. According to the author, empathetic listening with depth and clarity goes deep into the other person’s heart to reveal what has been hidden by fear, anger, grief, or despair. The result is that we “listen our souls into life.” Pg. 25 According to Ciaramicoli, “Listening empathetically creates a feeling of trust, which releases the compassionate hormone oxytocin, reducing fear and bias and creating a feeling of security.” It is when we are calm and secure, he says, that we can correct distorted thinking. Pg. 26 32
  • 35. Empathetic listening from others helps us gain awareness of our own story and where our stresses, caused by biases and distortions about ourselves, originate. This, the author states, is where the link between empathy and cognitive behav- ioral therapy lies. Pg. 27 Part of unraveling the causes of stress involves gaining an awareness of your own story. Many of us carry around distorted views of ourselves that have their root in our past. Specifically, these views are often negative and they are inaccu- rate interpretations of reality. Cognitive Behavioral Therapists call this a cognitive distortion. The author gives the example of Paul, who carried a low self-image rooted in having been raised in a poor town and having attended a mediocre college. Pgs. 26-27 These distortions often create patterns or road maps. Think of them like ‘con- stantly thinking in a rut’. Luckily, the truth can be discerned. And this can come from empathetic listening and the sharing of honest, thoughtful feedback. The author then shares a cognitive distortion that many people deal with: Mind Reading, which is essentially having a preconceived notion about what someone is thinking or about to say. Pg. 28 He then describes a pattern of behavior that he calls Getting your Loving from Fighting, essentially, that fighting offers a way of being connected without being vulnerable. Pg. 29 Two cognitive distortions often at work in this type of relational dysfunction are negative predictions and projection. The author defines these as “overestimating the likelihood that an action will have a negative outcome” (negative predictions) and “imagining that our own unwanted attributes, thoughts, or emotions are embodied in someone else’ (projection). Pg. 32 At the root of much fighting: Blaming. The author next unpacks and unravels blaming, for as long as blaming exists, positive change cannot occur. “Blame puts the problem or need to change on the other person’s shoulders, keeping the conflict at an impasse.” Pgs. 32-33 Stopping the blaming is hard. However, when a person puts the brakes on blame and slows down their reaction time of the emotional brain, stress plummets, and answers become more realistic and rooted in reality/truth. Pgs. 34-35 To come to a place of empathy and listening, and root out blame, people must be motivated to understand one another. Another hurdle to empathy is a desire to give advice. We try to fix things rather than let a person feel the emotion of the situation. This tendency comes about as 33
  • 36. we listen, and personalize what we hear, making assumptions about the similari- ty of our situation or experience to the other person’s. Pg. 36 These tendencies of blame and advice-giving come from our tendency to be self-absorbed. Becoming empathetic requires being able to read the reactions of others around us. Pg. 37 Entitlement is yet one more empathy-blocker. The behavior here is “I talk, you listen.” The opposite: empathetic conversations, which involve give and take. Pg. 38 We often also deal with a fragile self-worth. Achievement and status-seeking can change us and rob us of empathy as well as our connections with others. We may have status, success, skill, and competency, yet struggle to be present, intimate, and empathetic. We therefore don’t feel good about ourselves despite the outward positive image we project. As a result, it’s hard to live with an oth- ers-centered mindset and we can’t do much good for those around us. Pg. 39 There are two main factors in empathy training: empathetic listening and ex- pressing empathy. The author then gives examples of each. Empathetic listening involves things like: • “Repeating what the other person says • Rephrasing / summarizing, with an emphasis on feelings/emotions • Using statements that invite the speaker to expound, for example, ‘It appears as if…’ and ‘I imagine that feels…’ ‘Tell me more about that…’” Pg. 41 Finally, expressing empathy takes self-awareness, reflection, and practice. It is “putting your thoughts and feelings into another person’s heart and soul,” accord- ing to Ciaramicoli. He shares guidelines for expressing empathy, including: • “Pay attention to body language • Slow down • Ask open-ended questions” Pg. 42 The chapter ends with exercises to help the reader recognize cognitive distortions. Chapter 4:The Soul’s Pharmacy: How to Produce Calming Neurochemicals Ciaramicoli starts the chapter sharing about the Siberian Husky puppy he had when he was a child. The dog was continually frightened and withdrawn and would hide underneath his bed. His mother was able to help calm the dog and 34
  • 37. get it to trust and connect with people. The author uses this example to show the connection between our beliefs, attitudes, and emotions and our physical well-being. Pg. 48 He and the dog both became calmer in the presence of his mother, who by nature, had this effect on everyone. The process looks something like this: • Interactions with others can change your neurochemistry. • A change in your neurochemistry can trigger a change in your body, as we now know from a growing body of scientific research. Pg. 49 We reach others to provide what they need. Ciaramicoli’s mother called this ‘making a relationship’ which is what she did with the Husky. We can practice this by using the principles the author provides at the end of the previous chap- ter, Chapter 3. These principles / keys to connecting include: • “Give time • Give time, unselfishly • See beyond the surface • We need to work hard to slow down and make ourselves totally available. • We need to be purposeful to find / make connections” Pg. 50 As previously stated, research shows the great dynamic interplay between mind and body, mental and physiology. The good news of this? We’re not ‘set it and forget it’ victims of our genetics. Rather, according to the author and other Cognitive Behavioral Therapists, close emotional relationships throughout our lives can actually help provide opportunity to change the circuitry of our brains that controls behavioral impulses, emotions, and feelings. This is called neuroplasticity. Pg. 51 We end up changing cognitive distortions and see ourselves and others clearly. According to the author, there are implications for health, longevity, and state of mind. A study by George Vaillant at Harvard University shows relationship factors are among the key predictors of successful aging. These factors predict health, low- stress aging. Seven factors were cited. The top three were: • A good marriage before 50 35
  • 38. • Resilience to coping with adversity • Expressing altruistic behavior Interestingly, none of the seven factors is beyond an individual’s control; for example: genetic risk for disease. Pg. 52 Based on this study, the author sums up the keys to a healthy life as follows: manage stress well and form lasting relationships. Research is increasingly showing that neuroplasticity can even be harnessed to treat neurological conditions once treated exclusively with drugs. For example, OCD patients with behavioral therapy can learn to create a calm, balanced state of mind through casual or loving / intimate human connections. Pg. 53 These relations release serotonin and oxytocin which modulate heart rhythm and help manage anxiety, anger, impulsiveness, and glucose. This leads to release of cortisol which lowers stress. Chapter 5: Illusions We Create: Seeing More Clearly with Cognitive BehavioralTherapy Essentially, to show empathy is to be objective. When we fail to see ourselves and others clearly, we get pulled back to the things in our past that blind our perceptions today. The author gives the example of John, a patient, who tried to solve an internal problem (a fragile sense of self and a desire to feel worthy) with an external solution: pursuing success in his career, always watching his progress toward his sales goals, which gave him surges of dopamine. His mood went up or down solely based on his sales goal accomplishment standing. The love and steadfastness of John’s family helped him become more open and genuine. Through empathetic listening and CBT, he was able to examine the core beliefs about the basis of his worth. Through some failures, he ended up learning through his suffering. The chapter ends with exercises, journal questions, and an activity based around the cogni- tive distortion of performance addiction. Chapter 6: CBT in Action: Combating the Distortions of Personalization and Blame Empathetic CBT is fact-oriented. This helps people untangle the unfortunate experiences in their lives such as workplace bullying. Sometimes we take responsibility for something that is out of our control. Help- 36
  • 39. lessness in these circumstances tends to lead to shame or self-loathing. This, in turn, leads to the belief that people can’t be trusted and we avoid unguarded sharing of ourselves. The workplace can often force us to act in ways counter to (and that put us in conflict with) our natural being. For example, success at any cost, even if unethi- cal and lacking integrity and honesty. We try to please others to stabilize a fragile sense of self and we lose authenticity, which is the exact opposite of what we need to live lives of low stress. The chapter ends with journal questions related to the distortions of personaliza- tion and blame: identifying, listing events in which these distortions may have occurred, the resultant beliefs we hold, and the assumed consequences. Chapter 7: CBT in Action: Combating Negative SelfTalk and Ending the Cycle of Stress When we grow up experiencing little to no empathy, we develop a punitive inner voice. In self-defeat, we hear ‘you are not (good) enough.’ The opposite is a soothing inner voice that says: ‘you are inherently worthy’. Pg. 80 The author encourages readers to recognize familiar self-defeating phrases and change our internal dialogue. Negative internal dialogue releases stress hormones which can lead to the cognitive distortion of ignoring situational and contextual factors. Strategies for silencing self-criticism include distancing (similar to taking an em- pathetic stance so we can think objectively about irrational thoughts). This was a foundational tenet of CBT posed by Aaron Beck, founder of CBT. What about constructive self-talk? Multiple researchers have hit upon a method called instructional self-talk which consists of a series of statements that provide a planned sequence of behaviors. The author gives an example of a beach vacation cabin owner who had had their beach vacation invaded by family who were demanding and overstayed their welcome. When this overbearing family hinted that they planned to return the following summer, the beach cabin owner–who feared disappointing people–had to come up with a plan to communicate with the family. Pgs. 82-83 The instructional self-talk method provided both the steps and the mindset he needed to tackle the sticky situation. This method is different and more effective than simple encouraging messages such as “you have the confidence you need to succeed” and the like. 37
  • 40. That’s because it provides both a mindset and actual steps to overcome and address an issue. Combined with talking through a specific fear, the method can help break the cycle of stress. Steps to changing self-talk include: • “Uncover the origin of your negative story • Use empathy to learn how repeat phrases came about • Journal phrases you speak to yourself • Replace with truths you’ve heard from others • Differentiate between situational causes (the issue was caused by a situation) and personal causes (I caused the issue) in problematic situations. If we are burdened by negative self-talk, we can often confuse these two.” Pgs. 84-85 The chapter ends with journal questions and CBT steps to overcome negative self talk and ending the cycle of stress. Chapter 8: Combating Performance Addiction A pursuit of perfection often causes a person to focus so much on individual pursuits that they disregard (have a lack of empathy for) the ones around them who matter most. They sacrifice intimacy for achievement. Pg. 90 Our view of success happens early in our development, when we comprehend which of our behaviors gain attention and affection. We associate this with our self-worth. Because these views, and the cognitive distortions associated with them, are formulated so early on, it can be difficult to alter them. Pg. 91 The challenging thing with performance addiction is that the person tries to per- fect their way to happiness, doing more and “working harder, faster, and more proficiently,” says Ciaramicoli. Pg. 91 Unfortunately, this pattern ends up causing anxiety and stress. The author shares the story of David, a former professional athlete, who attended the author’s Empathetic CBT sessions. David was raised by a father who was extremely demanding and critical of him, expressed through angry outbursts. This led to David developing an intolerance for feeling out of control. Having been so vulnerable at a young age, later in life he avoided situations that made him feel out of control. David came to learn that his own anger led to adrenaline rushes that gave him a superficial sense of control. 38
  • 41. The chapter closes with an explanation of the impact of performance addiction on personal intimate relationships. Performance addicts have difficulty loving because they base their perception of their lovability on their own performance. Pg. 98 By participating in group sessions, David witnessed the vulnerability of people he respected for their personal and professional success. Eventually, he reestab- lished a loving relationship with his wife and shed the burden of perfection. Pgs. 94-96, 99 The chapter ends with journal questions related to the stress of performance and CBT steps to overcome the cognitive distortions related to performance addic- tion. Finally, the author offers a Performance Addiction Questionnaire located in the Appendix. In the final five chapters, the author shares skills needed to reduce stress and develop resilience for personal and professional success. Chapter 9: Clear Eyes: Perceiving theTruth through Empathy, not Prejudice In his years of counseling, the author has heard and experienced a lot of prejudi- cial bias, whether inwardly focused, or focused on others. He has been fascinat- ed and dismayed by the stress this prejudicial thinking and behaving causes. Pg. 104 He proposes that empathy is the tool that enables us to subject these views to rational examination. Pg. 105. As you will recall, the description of Empathy at the beginning of this Summary under “Understanding Terms” says “Empathy is objective, based not on assumptions but on truth.” Prejudice, the author states, is rooted in a lack of awareness combined with a fragile sense of self. Pg. 105 He also cites research by Arne Roets and Alain Van Hiel of Ghent University in Belgium that indicates that prejudice and its associated distorted thinking are more common in people with a low tolerance for ambiguity and uncertainty. These people, he says, are prone to quick decisions and generalizations. Pg. 108 Research at the University of Queensland showed that students with higher empathy had more daily exposure to those from different backgrounds. That is, familiarity had a significant impact on empathy, regardless of race or ethnic back- ground. Empathy increases and stress decreases with exposure to other groups of people. Pg. 106 When we are “not stressed by interactions with people from different back- grounds, we can find common ground and common humanity.” Pg. 108 39
  • 42. “We all reach adulthood with prejudices of some sort. Our responsibility...is to reexamine the stories we wrote that were based on incorrect information about ourselves and others.” Pg. 110 Ciaramicoli shares the effects of closed-minded relating, based on the exam- ple of Rebecca. She got into a relationship after basing assumptions about her future partner’s character on his other qualities including handsome appearance and financial success. The author states, “When our longings for love are deep and our stress level is high, the likelihood of biased perceiving is significant.” Pg. 112. Rebecca participated in group sessions and through mutual vulnerability “real- ized that good people valued her humanness.” She also learned that you have to give in order to be given to. As shared earlier in the book, in order to overcome cognitive distortions that impact our personal and relational well-being, we cannot go it alone. We need feedback from a consensus of trusted people who will be honest and straightfor- ward with us. Pg. 112 The author closes by stating that you don’t have to be in group therapy to rewrite your story. Butyou do need to be open to honest feedback from trusted individuals. The chapter closes with journal questions and suggestions for taking action to overcome prejudice. Chapter 10: Emotional Learning: Hurts that Never Heal In this chapter, Ciaramicoli explains how hurts early in our life become part of the story we create and re-tell to ourselves. Hurt is one of the biggest obstacles to overcome, in part because (1) the brain is biased to remember hurts and (2) they are captured in the emotional center of the brain. As a result, our perceptions about them are influenced by our feelings. And because “we see them through the lens of our emotions, we mistakenly believe that we are seeing the objective truth.” Pg. 117 The author shares the process of healing that his patient Laura, who was hurt by the untimely death of her father, went through. Her experience follows a pattern common to many people healing from past hurts: • “When we feel strongly, we record certain situations in the light of the emotions of the moment. This leads us to exaggerations. Pg. 119 • We make meaningful connections by sensing what would calm and 40
  • 43. comfort the other person. It is important to practice this way of perceiving daily to make it become a habit. Pg. 120 • Empathetic relating creates calming brain chemicals that make it easier to recognize and change cognitive distortions to realistic assessments of yourself and others. Pg. 122 • When our empathy is expanded and expressed, we are often able to effectively teach aspects of life we ourselves have struggled with and resolved (as Laura did). Pg. 123 • Loss, when unattended to, becomes a cynical force within us. Pg. 124 • Unresolved hurts set the stage for cognitive distortions that we believe are real. Pg. 124 • When we have the courage to open up and find people we trust to genuinely help us by giving us honest feedback, we unleash the impediments to our biased theories. Pg. 124 • When you rediscover the truth, you will likely be more focused on what is right about you and stop the constant search to find out what is wrong with you.” Pg. 124 The chapter ends with journal questions and an overcoming cognitive distortions exercise related to Emotional Learning and healing from past hurts. Chapter 11: Empathy, Self-care, and Well-being We’ve long heard that high-stress, driven lifestyles leads to a plethora of physical ailments. But in this chapter, the author introduces the idea that our emotional well being, including perceptions of ourselves and the world around us, also plays a role in our physical health. The author lists the ‘feel-good’ chemicals that our brains release when we en- gage in certain activities, such as: • Eating ice cream releases dopamine • A hug releases oxytocin • Physical exercise releases endorphins and serotonin Pg. 129 When we live lives that are stressed and depleted, we tend to forego self-care like regular exercise and maintaining meaningful relationships, opting, instead, to ‘get by’ or ‘just get through the day.’ Pgs. 128-129 In addition to foregoing self-care, as our high stress levels cause our empathetic range to narrow, as mentioned in Chapter 2, we are less likely to do some things that release the happiness chemicals (such as interacting with family and friends in a loving manner, doing a good deed, or offering a kind word to a stranger). 41
  • 44. Instead, we turn to external agents to give us this ‘kick’ like nicotine, sugar, choc- olate, or cocaine. Pg 129 So how can connections with people help us in self-care? A study by develop- mental psychologist Emmy Werner of the University of California, Davis gives some insights. Resilient children, researchers found, had a strong bond with a caretaker (not a parent) and involvement in a community group or church. “Positive relationships and involvement in meaningful group experiences create resilience and lessen stress. Such experiences stimulate the release of oxytocin, the compassion hormone. This hormone produces feelings of security and calm and inhibits stress and anxiety; thus it protects us against the release of cortisol,” which has a chain reaction of detrimental physical effects. Pg 130 Dr. Paul Zak, a neuroscientist, has demonstrated that “when oxytocin levels are high, people’s generosity to strangers increases up to 80 percent. We can produce this effect with practice by expanding our abilities to communicate with empathy.” Pg. 130 It’s up to us to decide: reach for the cake or the vodka, or kiss our partner and hug our kids. The positive effects are the same, and one is healthier. Pg. 131 The author shares the story of his patient, Tricia, who is on the way to developing habitual self-care. The catalyst: changing how she thought and perceived, over- coming cognitive distortions by practicing empathetic connections with trusted people. The author then shares research on the value of regular exercise and lists a host of foods that are believed to help reduce stress. The chapter ends with journal questions and a cognitive distortions exercise. Chapter 12: Give andYou Shall Receive: How Giving and Goodness Restore Calm Studies from the Institute of Gerontology at the University of Michigan have con- firmed that giving is more powerful than receiving in terms of reducing mortality. It seems somewhat counter-intuitive that selflessly pouring out your life and emotional energy to benefit someone else would end up helping you in the long run. However: • “Isolation is a predictor of early-onset illness. • People who give are healthier and happier and live longer. • One of the simplest ways to give is through empathy, and in the process we make meaningful connections that produce the health-giving neurochemicals we need to manage our stress and improve our lives.” Pgs. 141-142 42
  • 45. This is confirmed by Allan Luks, director of Big Brothers and Big Sisters of New York City, who found that people who help others on a regular basis are ten times more likely to be healthy than people who do not. Pg. 142 The author believes, however, that many of us have suppressed our goodness as a result of stress. He goes on to address some of the things that can inhibit the expression of goodness, such as: • A lack of forgiveness • Fear, prejudice, and misunderstanding/being misunderstood • Grief Pgs. 146-148 The author shares the story of his patient Randy, who lived with an abusive stepfather. Unlike his siblings, Randy continued in relationship with this man into adulthood. And despite having become somewhat hardened, tough, and impa- tient, Randy actually ended up helping his stepfather through a severe illness. Despite how he had been treated, Randy learned an invaluable lesson, stating: “In a strange way, he [the stepfather] has given me something. I’ve learned I’m not such a hard-ass after all.” Pg. 151 This is an example of what Ciaramicoli calls a Goodness Breakthrough. This comes about “by the way we live, not by holding on to fixed ideas that shore up our fragile sense of self. Be honest with yourself. Acknowledge the situations and the people who threaten you. Strive to resolve these issues rather than pun- ishing innocent people for being their authentic selves.” Pg. 148 Goodness breakthroughs, the author believes, “can result in a life in which good- ness is expressed daily.” Pg. 152 The chapter ends with journal questions and a cognitive distortions exercise relat- ed to practicing giving and goodness to restore calm. Chapter 13: I Am Who I Am: How Authenticity Soothes the Soul A tension that most of us live with in varying degrees is a disconnect between our ‘real’ self in which we live authentically and true to our core values and be- liefs and our ‘false’ self, which is a life of pretense. Pg. 157 Often, the desire to please others, fit in, or adhere to other peoples’ expectations pushes us toward this inauthentic life. As a result, inside, we feel fraudulent. It reinforces the cognitive distortion that people will love and respect you only if you perform well and please them. Pg. 160 43
  • 46. What is ironic is that the opposite is true. People are actually attracted to authen- ticity. “It relaxes us because we realize we don’t have to be on guard–we can be human, have flaws, and make mistakes and still be accepted and liked.” Pg. 160 People who constantly prop themselves up by trying to prove their worth and worthiness create stress within and around themselves. Pg. 161 He challenges readers to live true to self. “Authenticity is energizing. Pretending to be somebody we’re not is exhausting.” Pg. 163 As the author shares throughout the book, the ability to know and be known through the process of empathetic cognitive behavioral therapy is key to low- stress living. Pg. 166 “Genuine, authentic relating enlivens the spirit. This gives us the energy and re- silience to go into the world, absorb emotional blows, and come home with our self-respect and integrity intact. Empathetic CBT is the vehicle to maintain this perspective.” Pg 166 The chapter ends with journal questions and an exercise to help the reader work toward living an authentic life. 44