Some people prefer Dear Abby, others Ann Landers. I’m an Ann kind of guy — too often, Abby’s advice lacks specifics and substance, whereas Ann’s advice is always practical and specific.

One of Ann’s better pieces of advice goes to “the other woman”. “If he cheated on his wife with you,” Ann regularly points out, “he’ll cheat on you, too.”

Unfamiliarity with Ann’s analysis is just one of the many flaws in a new Gartner Group report titled, “The Cost of Migrating COBOL Developers to Java,” by J. Feiman and R. Flatau-Reynoso (mentioned to me by IS Survivalist Joe Kruger who also pointed out some of its flaws). If you’re the kind of person who likes to look at the aftermath of train wrecks and traffic accidents, you might want to read the report yourself — you’ll find it at http://gartner5.gartnerweb.com/public/static/hotc/00092702.html.

The report begins, “Gartner has warned IS organizations that migrating their mainframe COBOL developers to Internet and Java development would be a painful experience. Here, we measure in dollars just how painful this process would be.” What’s painful is reading the report. It totes up every imaginable cost associated with retraining COBOL programmers in Java, compares it with just one of the costs of new Java programmers (their compensation), and concludes the Java recruits cost about $20,000 less.

It’s pretty hard to take seriously an analysis that ignores recruiting costs and hiring bonuses. These obvious omissions are less astounding, though, than the report’s assumption that Java developers will be available and productive the day the company starts recruiting.

Last I heard, the average lag time for hiring a skilled Java developer was about three months, but there’s no estimate of the business impact from a three month recruiting-generated project delay.

Nor is there any recognition of the ramp-up time any new developer needs to get accustomed to a new company, corporate culture, and IT environment. If the standard tools used by their new employer are different from those they already know, that will cause additional delays. Usually, new developers also find it pretty handy to understand the legacy environment they’re going to be dealing with. That learning isn’t instantaneous either.

New developers are never productive their first day of employment, and in fact are rarely productive the first month. Significantly, most of the process they go through to become productive requires the involvement of currently productive programmers, whose productivity suffers a bit from the time needed to get the newbies up to speed.

And then there’s the Ann Landers effect. A company that replaces long-time employees rather than retraining them will do the same thing again for the next bunch. I’m guessing most Java recruits will be familiar with Ann’s advice, which means the chance they’ll be loyal to their new employer is exactly bupkis. The next good offer they get and they’re gone, and why not? The report ignores this factor, but ironically it does comment on the risk of retrained COBOL programmers either demanding a raise or leaving. Maybe it’s assuming the Java recruits will all be here on H1b visas, where they can’t change employers.

When Ann Landers gives bad advice, she accepts 50 lashes with a wet noodle. Perhaps we should all mail some noodles to the Gartner Group and see what it does with them.

Can we give the president some privacy? Zippergate, which was a trivial scandal compared to its recent presidential predecessors, pretty much ended it.

Not that the current crop of candidates helps anything by parading their religiosity on their sleeves. It goes beyond poor fashion sense. The presidency already resembles an episode of Big Brother. Why worsen the situation by making yet another private matter public?

Presidential privacy may be both an oxymoron and a hopeless issue, but the issue of customer privacy is very much alive. Consumer advocates thunder (as always) that it’s important, industry (as always) whines that it should be self-policing, and Congress (as always) holds hearings on the subject.

But what’s the subject? “Privacy” is more slippery than a presidential candidate. But since IT helps formulate and implement privacy policies, you need to understand it. And it’s complicated.

For example: Does automated identification violate privacy? Yes! Consumer advocates yell, but does it really? As stated here last week, the Internet has properties of place — your activities in cyberspace happen there, not in your home. The right to anonymity isn’t absolute in actual reality; why should it be in virtual reality?

Everyone knew Norm’s name at Cheers and that didn’t violate his privacy. Presumably, when Norm first began to patronize Cheers he introduced himself to Sam. Sam’s remembering his name was an act of courtesy, not a privacy violation. On the other hand, total strangers can’t just grab your wallet and read your driver’s license, just because they want to. Nor, for that matter, can the police, unless they’re investigating a crime.

This gives you a pretty good guideline. A customer’s right to anonymity isn’t absolute, nor solely a matter of permission, but it also isn’t waived just because they enter your web site, any more than they waive it by entering a department store. Which means your company’s identification process should be explicit and overt … a login process, or a request for permission to set a cookie.

Does privacy mean your company shouldn’t track and predict customers’ buying preferences once you’ve legitimately identified them? Woody knew what kind of beer Norm liked, and that didn’t violate Norm’s privacy — presumably, Norm would have been offended had it been otherwise.

If you tell me something, I don’t violate your privacy by remembering it. If you buy something, pay with a credit card, and provide a shipping address, the seller doesn’t violate your privacy by recording the transaction and using the information.

Until it sells the information to another company. It’s fine for Sam to know whatever Norm tells him about Vera; it isn’t fine for Sam to sell Vera’s name, address, telephone number, and size to the lingerie shop down the street.

But what if your company owns both Cheers and the lingerie company? That’s a bit fuzzier. So in your privacy policy, list the companies and brands that share customer information. If you state the policy and your customers agree to it, there’s no privacy violation; if they don’t agree to it they can take their business elsewhere. It’s a matter of mutual consent, as it should be. (If you have no policy, caveat emptor, but shame on you.)

As for companies like Doubleclick, that surreptitiously follow you from site to site, in real space, we call that “stalking”, and we arrest people for it.

Why should cyberspace be any different?