Energy Informatics Getting Energized

Carl Pritchard

A colleague and I started talking and writing about Energy Informatics about three years ago as a result of a request from the Advanced Practices Council (APC) of the Society for Information Management to make its members, typically CIOs, aware of developments in green IS. Our ideas were well received, and Energy Informatics emerged from the APC-funded research.


Providing the Architecture for Progressive Modernization

Scott Simmons

A key tenet for modernizing core systems is to assess the current solution and to define the context for the to-be solution. While working with a large customer in Europe, my colleagues and I focused an eight-week effort on assessing the current environment and the readiness to renew core systems. The assessment revealed issues about product currency in operational environments and resulted in our recommendation to correct these infrastructure matters before embarking on a renewal. These tasks are ongoing as part of broader development initiatives.


Embedded Analytics: Business and Intelligence Together

Babu Ramakrishnan

Embedded analytics has gained significance recently, as businesses seek more optimization. This Executive Update deals with the context of embedded analytics, its technicalities, and inherent challenges.


SCM and Build: Keys to an Agile Lifecycle

Steve Berczuk

Software configuration management (SCM) and build management are misunderstood disciplines. Many organizations have practices in these areas that either hinder productivity or sacrifice too much traceability in the name of improving short-term productivity. SCM and build, when done correctly, can provide a framework that allows a team to develop code quickly. However, it's also possible to establish practices that can hinder your development team.


Industry-Specific Social Media Monitoring Applications on the Rise

Curt Hall

"Citrus dreamsicle cake... HEAVEN!!! Why did I only give them four stars as opposed to five?!?!??! the cake was too small. :( sad face... yup.. def. sad face there. My previous cake for the same price was 3 layers and the citrus one was only 2 layers. I should have specified. But it was AWESOMELY! good cake."


Educate and Communicate -- Over and Over Again: Why You Need Journalists, Lobbyists, and Marketers on Your Technology Teams

Steve Andriole

While we're all busy doing technology, it's essential we understand -- and communicate -- what we're doing. The need for education and communication has never been greater, especially from the uninitiated, cynical, and happily ignorant.


Educate and Communicate -- Over and Over Again: Why You Need Journalists, Lobbyists, and Marketers on Your Technology Teams

Steve Andriole

While we're all busy doing technology, it's essential we understand -- and communicate -- what we're doing. The need for education and communication has never been greater, especially from the uninitiated, cynical, and happily ignorant.


Less Is More

Israel Gat

Just about every one of my clients wrestles with the problem of governing the software process. As the process often eludes us, the natural tendency is to add more and more performance measures in order to ensure "completeness" of the governance system. More often than not, the end result is a baroque system that is difficult to implement, use, and comprehend.


Sorry for Whose "Inconvenience"?

Robert Charette

APOLOGIZE, v.i. To lay the foundation for a future offence.

-- Ambrose Bierce, The Devil's Dictionary

Ah, another day, another data breach; another insincere apology most probably written by a corporate lawyer.


Sorry for Whose "Inconvenience"?

Robert Charette

APOLOGIZE, v.i. To lay the foundation for a future offence.

-- Ambrose Bierce, The Devil's Dictionary

Ah, another day, another data breach; another insincere apology most probably written by a corporate lawyer.


Sorry for Whose "Inconvenience"?

Robert Charette

APOLOGIZE, v.i. To lay the foundation for a future offence.

-- Ambrose Bierce, The Devil's Dictionary

Ah, another day, another data breach; another insincere apology most probably written by a corporate lawyer.


The New Outsourcing: Is It the Death of Corporate IT?

Jim Love

Outsourcing is inevitable. In X years, all companies will be outsourced, primarily to SaaS applications. The only question is, "What is X?" And this isn't a conclusion I have come to lightly. Nor is it the position of an outsourcing zealot. In fact, I have some deep concerns about what might happen to companies in this "brave new world."


The New Outsourcing: Is It the Death of Corporate IT?

Jim Love

Outsourcing is inevitable. In X years, all companies will be outsourced, primarily to SaaS applications. The only question is, "What is X?" And this isn't a conclusion I have come to lightly. Nor is it the position of an outsourcing zealot. In fact, I have some deep concerns about what might happen to companies in this "brave new world."


Corporate Cyber Attacks, Threats, and Security

Arun Majumdar
Abstract

This Executive Report by Arun K. Majumdar provides executives, government workers, and security professionals a fast track to gaining insight into cyber security.


Corporate Cyber Attacks, Threats, and Security

Arun Majumdar
Abstract

This Executive Report by Arun K. Majumdar provides executives, government workers, and security professionals a fast track to gaining insight into cyber security.


Corporate Cyber Attacks, Threats, and Security

Arun Majumdar

The accompanying Executive Report provides executives, government workers, and security professionals a fast track to gaining insight into cyber security. It covers executive liabilities and accountabilities, the top eight cyber security cases, situational awareness, and a multitude of need-to-know issues for immediate practical use.


Corporate Cyber Attacks, Threats, and Security

Arun Majumdar

The accompanying Executive Report provides executives, government workers, and security professionals a fast track to gaining insight into cyber security. It covers executive liabilities and accountabilities, the top eight cyber security cases, situational awareness, and a multitude of need-to-know issues for immediate practical use.


What Suppliers Say About Clients: Part I -- Establishing the Outsourcing Arrangement

Leslie Willcocks, Mary Lacity
More in this series What Suppliers Say About Clients: Part I Part II Abstract

In Part I of this two-part Executive Report series about suppliers by Mary C. Lacity and Leslie P.


What Suppliers Say About Clients: Part I -- Establishing the Outsourcing Arrangement

Mary Lacity, Leslie Willcocks, Leslie Willcocks

In this two-part Executive Report series, we share in detail what suppliers have been saying to us and our colleagues about clients during the past two decades -- the things they wish clients would know or do as well as things they wish clients didn't know or do. In Part I, we cover the 10 statements suppliers make about establishing the outsourcing arrangement.


What Suppliers Say About Clients: Part I -- Establishing the Outsourcing Arrangement

Mary Lacity, Leslie Willcocks, Leslie Willcocks

In this two-part Executive Report series, we share in detail what suppliers have been saying to us and our colleagues about clients during the past two decades -- the things they wish clients would know or do as well as things they wish clients didn't know or do. In Part I, we cover the 10 statements suppliers make about establishing the outsourcing arrangement.


The Good, the Bad, and the Ugly

Claude Baudoin

Consider some well-known examples of user interfaces, varying from extremely simple to extremely complicated.1 At one end of this spectrum we have the Google search engine, which initially captured our attention not only because its "secret sauce" -- the page-ranking algorithm -- gave better results, but also because the search page was so extremely simple: the Google logo, a search box, a s


Chromebooks Will Shake Up Enterprise Computing

Curt Hall

Google's introduction of the Chromebook has serious implications for cloud computing and IT -- and threatens to shake up enterprise computing. Google is hoping that companies will find Chromebook's reduced maintenance and lower cost of ownership too good to resist. But Google does not expect companies to embrace Chromebook overnight.


Contracting to the Cloud: SLAs Remain Up In the Air

Brian Dooley

Cloud services can supplant or supplement traditional outsourcing, and it is easy to enter into these arrangements without considering the impact sufficiently or to treat them in the same manner as conventional outsourcing. Agreements are one mouse click away, but there can be unforeseen repercussions, depending on the specific services used.


Contracting to the Cloud: SLAs Remain Up In the Air

Brian Dooley

Cloud services can supplant or supplement traditional outsourcing, and it is easy to enter into these arrangements without considering the impact sufficiently or to treat them in the same manner as conventional outsourcing. Agreements are one mouse click away, but there can be unforeseen repercussions, depending on the specific services used.


Streaming Analytics for High-Volume Real-Time Analytics

Curt Hall

We first started hearing about streaming analytics (especially by IBM) back in 2009.