Why CIOs should mentor startups
- 15 September, 2012 21:12
Working with technology startups has long been a part of every CIO's job, but the relative importance of that work waxes and wanes with market forces. When the pace of tech change is predictable and the biggest vendors call all the shots, why wander out on a limb with some no-name, bleeding-edge newbie?
Then everything changes again, as it has in today's new era of mobility, cloud and consumer technologies. Suddenly, those slow-moving legacy vendors can't help your business keep up, let alone get ahead of competitors.
"A lot of startups are not only solving the newest problems out there," says CIO Ben Haines of Pabst Brewing, "they're solving them at a faster rate." Haines is one of the CIOs featured in our cover story (" The Risks and Rewards of Using Startups"), which examines the good, the bad and the occasionally ugly outcomes of this risky business of relying on startups.
The upsides can be considerable. Reasonable pricing. Simpler contracts. Faster implementation. Greater influence over product design. Access to leading-edge technology that delivers a competitive edge.
"Startups are a good way to experiment at the edges of your priorities and position your company as an innovator," says William Hsu, co-founder of startup accelerator MuckerLabs.
"A lot of my peers are too risk-averse. They want to make the absolute safest choice," adds Rob Duchscher, CIO of Starkey Industries. "Safe choices lead to a culture of status quo. And status quo, especially today, can make it hard to survive and remain profitable."
Yet the downsides can be daunting. Shaky financials. Lousy customer support. Integration nightmares. Dysfunctional leadership teams. Technology that can't scale to handle enterprise needs.
"It takes time and direct involvement," says CIO Tracey Rothenberger of Ricoh. "But if you're truly getting a unique value proposition that you can't get elsewhere, you have to be willing to invest in this stuff."
That time-and-attention factor is perhaps the most significant piece of the startup puzzle. CIOs who do the best job of managing vendors will tell you they spend 20-30 percent of their time nurturing these partnerships, especially when new ventures are part of the mix.
If you haven't mentored any startups lately, our story may inspire you to get back in the game.
Read more about cio role in CIO's CIO Role Drilldown.
Join the CIO Australia group on LinkedIn. The group is open to CIOs, IT Directors, COOs, CTOs and senior IT managers.
Dual-Persona Smartphones Not a BYOD Panacea
After two-year hiatus, EFF accepts bitcoin donations again
CIOs struggle to deliver timely mobile business apps: survey
Spiceworks' free management software gets integrated MDM
Opinion: Why national e-health is not for everyone
Detecting APT Activity with Network Traffic Analysis
Today’s successful targeted attacks use a combination of social engineering, malware, and backdoor activities. This research paper will discuss how advanced detection techniques can be used to identify malware command-and control (C&C) communications related to these attacks, illustrating how even the most high-profile and successful attacks of the past few years could have been discovered.
Six Reasons to Empower Your SharePoint Citizen Developers
More and more business applications are being created by “citizen developers” - end users who are not IT developers but who create solutions for themselves and their groups. This white paper explores six reasons to embrace citizen development in an intelligent way that minimises risks and maximises the return on your SharePoint investment. Read now.
Spear-Phishing Email: Most Favored APT Attack Bait
This research paper presents findings on APT-related spear phishing from February to September 2012. We analysed APT-related spear-phishing emails collected throughout this period to understand and mitigate attacks. The information we gathered not only allowed us to obtain specific details on spear phishing but also on targeted attacks. We found, for instance, that 91% of targeted attacks involve spear-phishing emails, reinforcing the belief that spear phishing is a primary means by which APT attackers infiltrate target networks.