IT Best Practices

IT Leaders, You’re The Cavemen Who Survived

Despite what dystopian critics would lead you to believe, current technology practices are not replacing the human element. Nor has new technology changed the basic human skills that are employed by leaders of IT. As Scott Carlson writing for InformationWeek explains, the traits that made it easy for Paleolithic peoples to spot the “weakest mammoth” are helping IT pros single out danger signals in scrolling lines of code. 

The Digital Hunter

Carlson jokes about trying to explain his work roles to IT outsiders. Though the techno jargon might seem daunting (Carlson: “We lost grandma.”), there’s really nothing novel about the everyday techniques employed by those in the IT field.

For instance, Carlson compares the elimination of shadow IT to one’s ancestor recognizing that a member of the tribe has the plague, and decidedly drowning them before the infection is spread. It’s a useful (and hilarious) analogy that drives home a crucial point: technology is causing people to rely on their innate human abilities more than ever. Carlson encapsulates that message:

Sometimes technology develops in a way that lets us build on skills of the past, sometimes it doesn't. We have to adapt our brains, fingers, and eyes. But that doesn't negate our humanity.

Thinking long and hard on this analogy, a CIO explaining what they do for a living might one day proudly declare that they are, in fact, a digital hunter.

Read the full article at:

Eric Anderson

Eric Anderson is a staff writer for CAI's Accelerating IT Success. He is an intern at Computer Aid Inc., pursuing his master's degree in communications at Penn State University.

Related Articles

Leave a Reply

Your email address will not be published. Required fields are marked *

Back to top button

We use cookies on our website

We use cookies to give you the best user experience. Please confirm, if you accept our tracking cookies. You can also decline the tracking, so you can continue to visit our website without any data sent to third party services.