Energy Informatics Getting Energized
A colleague and I started talking and writing about Energy Informatics about three years ago as a result of a request from the Advanced Practices Council (APC) of the Society for Information Management to make its members, typically CIOs, aware of developments in green IS. Our ideas were well received, and Energy Informatics emerged from the APC-funded research.
Providing the Architecture for Progressive Modernization
A key tenet for modernizing core systems is to assess the current solution and to define the context for the to-be solution. While working with a large customer in Europe, my colleagues and I focused an eight-week effort on assessing the current environment and the readiness to renew core systems. The assessment revealed issues about product currency in operational environments and resulted in our recommendation to correct these infrastructure matters before embarking on a renewal. These tasks are ongoing as part of broader development initiatives.
Embedded Analytics: Business and Intelligence Together
Embedded analytics has gained significance recently, as businesses seek more optimization. This Executive Update deals with the context of embedded analytics, its technicalities, and inherent challenges.
SCM and Build: Keys to an Agile Lifecycle
Software configuration management (SCM) and build management are misunderstood disciplines. Many organizations have practices in these areas that either hinder productivity or sacrifice too much traceability in the name of improving short-term productivity. SCM and build, when done correctly, can provide a framework that allows a team to develop code quickly. However, it's also possible to establish practices that can hinder your development team.
Industry-Specific Social Media Monitoring Applications on the Rise
"Citrus dreamsicle cake... HEAVEN!!! Why did I only give them four stars as opposed to five?!?!??! the cake was too small. :( sad face... yup.. def. sad face there. My previous cake for the same price was 3 layers and the citrus one was only 2 layers. I should have specified. But it was AWESOMELY! good cake."
Less Is More
Just about every one of my clients wrestles with the problem of governing the software process. As the process often eludes us, the natural tendency is to add more and more performance measures in order to ensure "completeness" of the governance system. More often than not, the end result is a baroque system that is difficult to implement, use, and comprehend.
Sorry for Whose "Inconvenience"?
APOLOGIZE, v.i. To lay the foundation for a future offence.
-- Ambrose Bierce, The Devil's Dictionary
Ah, another day, another data breach; another insincere apology most probably written by a corporate lawyer.
Sorry for Whose "Inconvenience"?
APOLOGIZE, v.i. To lay the foundation for a future offence.
-- Ambrose Bierce, The Devil's Dictionary
Ah, another day, another data breach; another insincere apology most probably written by a corporate lawyer.
Sorry for Whose "Inconvenience"?
APOLOGIZE, v.i. To lay the foundation for a future offence.
-- Ambrose Bierce, The Devil's Dictionary
Ah, another day, another data breach; another insincere apology most probably written by a corporate lawyer.
The New Outsourcing: Is It the Death of Corporate IT?
Outsourcing is inevitable. In X years, all companies will be outsourced, primarily to SaaS applications. The only question is, "What is X?" And this isn't a conclusion I have come to lightly. Nor is it the position of an outsourcing zealot. In fact, I have some deep concerns about what might happen to companies in this "brave new world."
The New Outsourcing: Is It the Death of Corporate IT?
Outsourcing is inevitable. In X years, all companies will be outsourced, primarily to SaaS applications. The only question is, "What is X?" And this isn't a conclusion I have come to lightly. Nor is it the position of an outsourcing zealot. In fact, I have some deep concerns about what might happen to companies in this "brave new world."
Corporate Cyber Attacks, Threats, and Security
This Executive Report by Arun K. Majumdar provides executives, government workers, and security professionals a fast track to gaining insight into cyber security.
Corporate Cyber Attacks, Threats, and Security
This Executive Report by Arun K. Majumdar provides executives, government workers, and security professionals a fast track to gaining insight into cyber security.
Corporate Cyber Attacks, Threats, and Security
The accompanying Executive Report provides executives, government workers, and security professionals a fast track to gaining insight into cyber security. It covers executive liabilities and accountabilities, the top eight cyber security cases, situational awareness, and a multitude of need-to-know issues for immediate practical use.
Corporate Cyber Attacks, Threats, and Security
The accompanying Executive Report provides executives, government workers, and security professionals a fast track to gaining insight into cyber security. It covers executive liabilities and accountabilities, the top eight cyber security cases, situational awareness, and a multitude of need-to-know issues for immediate practical use.
What Suppliers Say About Clients: Part I -- Establishing the Outsourcing Arrangement
What Suppliers Say About Clients: Part I -- Establishing the Outsourcing Arrangement
In this two-part Executive Report series, we share in detail what suppliers have been saying to us and our colleagues about clients during the past two decades -- the things they wish clients would know or do as well as things they wish clients didn't know or do. In Part I, we cover the 10 statements suppliers make about establishing the outsourcing arrangement.
What Suppliers Say About Clients: Part I -- Establishing the Outsourcing Arrangement
In this two-part Executive Report series, we share in detail what suppliers have been saying to us and our colleagues about clients during the past two decades -- the things they wish clients would know or do as well as things they wish clients didn't know or do. In Part I, we cover the 10 statements suppliers make about establishing the outsourcing arrangement.
The Good, the Bad, and the Ugly
Consider some well-known examples of user interfaces, varying from extremely simple to extremely complicated.1 At one end of this spectrum we have the Google search engine, which initially captured our attention not only because its "secret sauce" -- the page-ranking algorithm -- gave better results, but also because the search page was so extremely simple: the Google logo, a search box, a s
Chromebooks Will Shake Up Enterprise Computing
Google's introduction of the Chromebook has serious implications for cloud computing and IT -- and threatens to shake up enterprise computing. Google is hoping that companies will find Chromebook's reduced maintenance and lower cost of ownership too good to resist. But Google does not expect companies to embrace Chromebook overnight.
Contracting to the Cloud: SLAs Remain Up In the Air
Cloud services can supplant or supplement traditional outsourcing, and it is easy to enter into these arrangements without considering the impact sufficiently or to treat them in the same manner as conventional outsourcing. Agreements are one mouse click away, but there can be unforeseen repercussions, depending on the specific services used.
Contracting to the Cloud: SLAs Remain Up In the Air
Cloud services can supplant or supplement traditional outsourcing, and it is easy to enter into these arrangements without considering the impact sufficiently or to treat them in the same manner as conventional outsourcing. Agreements are one mouse click away, but there can be unforeseen repercussions, depending on the specific services used.