Recommended reading

Habits of Green Organizations
Source: Computerworld

Successful organizations often share some common practices. For its third annual Top Green-IT Organizations awards, Computerworld honored 12 applicants out of nearly 100, and the following approaches are present among multiple green IT superstars.

  • Server virtualization. State Street has virtualized 65 percent of its servers for a $3.5 million annual energy savings, and George Washington University has hit the same mark for a savings of more than 800,000 kilowatt hours annually.
  • PC management. Many organizations automatically shut down and wake up desktop PCs for patches and upgrades, saving the company $1 million annually in the case of State Street.
  • Printer management. Pacific Gas and Electric makes green IT best practices its gold standard: Users don't opt in, they have to opt out. So all printers are set to two-sided, black-and-white printing by default. That policy cut printing by 51 million pages last year, saving $460,000 in paper and consumables costs, said Scott McDonald, IT architect at the power company.

What Leaders Are Made Of
Source: Bnet

Gen. George Patton might have been a great leader, but that doesn’t mean he is a good model for others.

Classic leadership skills — developing a vision, translating it into a strategy and, yes, motivating employees — are important, but they are not enough to inspire others to follow, writes Sean Silverthorne, a member of the faculty at Harvard Business School.

Instead, people look for softer attributes, beginning with humanness. “Nobody wants to work with a perfect leader,” Silverthorne writes. “Build collaboration and solidarity by revealing your weaknesses.”

Other key attributes include intuition (“To be most effective, you need to know what’s going on without others spelling it out for you”), tough empathy (“Care deeply about employees, but accept nothing less than their best”) and uniqueness (“Demonstrate that you are singular by showing your unique qualities to those around you”).

Reining in Stealth Clouds
Source: CIO.com

Employees everywhere are seeing the appeal of cloud computing in their personal lives, and those activities are seeping into their work lives — with or without the IT department’s blessing.

Writing at CIO.com, Nimbus CEO Ian Gotts assigns the label “stealth cloud” to cloud “services being consumed by business users without the knowledge, permission or support of the CIO and the IT department.”

He argues that “IT departments should see cloud computing as an ally, because embracing it will make them appear far more responsive to the business.” And he offers some practical tips for doing so, including the questions to ask when evaluating cloud services and a step-by-step process for getting those stealth clouds back into the fold of managed, compliant IT activities.

About the Author

Connect with the FCW staff on Twitter @FCWnow.

The Fed 100

Save the date for 28th annual Federal 100 Awards Gala.

Featured

  • Social network, census

    5 predictions for federal IT in 2017

    As the Trump team takes control, here's what the tech community can expect.

  • Rep. Gerald Connolly

    Connolly warns on workforce changes

    The ranking member of the House Oversight Committee's Government Operations panel warns that Congress will look to legislate changes to the federal workforce.

  • President Donald J. Trump delivers his inaugural address

    How will Trump lead on tech?

    The businessman turned reality star turned U.S. president clearly has mastered Twitter, but what will his administration mean for broader technology issues?

  • Login.gov moving ahead

    The bid to establish a single login for accessing government services is moving again on the last full day of the Obama presidency.

  • Shutterstock image (by Jirsak): customer care, relationship management, and leadership concept.

    Obama wraps up security clearance reforms

    In a last-minute executive order, President Obama institutes structural reforms to the security clearance process designed to create a more unified system across government agencies.

  • Shutterstock image: breached lock.

    What cyber can learn from counterterrorism

    The U.S. has to look at its experience in developing post-9/11 counterterrorism policies to inform efforts to formalize cybersecurity policies, says a senior official.

Reader comments

Please post your comments here. Comments are moderated, so they may not appear immediately after submitting. We will not post comments that we consider abusive or off-topic.

Please type the letters/numbers you see above

More from 1105 Public Sector Media Group