Reserve Data Centers As Rescue Tool for Business
With the increasing importance of information systems for business success, the risks associated with the temporary inaccessibility of information due to any unplanned failure of computer systems have significantly increased. Failure of a computer system may be the result of various factors, such as faulty or improper actions of users, or external factors, including man-made or natural disasters.
Reserve Data Centers As Rescue Tool for Business
With the increasing importance of information systems for business success, the risks associated with the temporary inaccessibility of information due to any unplanned failure of computer systems have significantly increased. Failure of a computer system may be the result of various factors, such as faulty or improper actions of users, or external factors, including man-made or natural disasters.
Seven Fundamental Checks Before Adopting a Middleware Adapter
Middleware software adapters used between dissimilar technologies play an important role in data integration. Dissimilar technologies in this context could be ETL, database, an enterprise package solution, such as SAP, or any technology that can consume or source data. These middleware adapters could be developed by participating technology vendors, through a strategic partnership, or by a third-party independent software vendor.
From Site to Service: Part II -- Syndication and Provision
Firms are increasingly moving toward syndicating Web content rather than just publishing it and providing Web services rather than just Web applications. Likewise, contemporary websites typically consume the content and services supplied by other Web providers.
From Site to Service: Part II -- Syndication and Provision
Firms are increasingly moving toward syndicating Web content rather than just publishing it and providing Web services rather than just Web applications. Likewise, contemporary websites typically consume the content and services supplied by other Web providers.
Lessons from la Tour Eiffel
As Unstructured Data Rises, So Does View of Text Mining
Back in December, when making predictions for the upcoming year regarding important BI trends, I wrote that we could expect to see use of text mining and analysis increase in 2011, just as it has almost every year since we've measured its adoption (see "What Lies Ahead: BI and D
As Unstructured Data Rises, So Does View of Text Mining
Back in December, when making predictions for the upcoming year regarding important BI trends, I wrote that we could expect to see use of text mining and analysis increase in 2011, just as it has almost every year since we've measured its adoption (see "What Lies Ahead: BI and D
Changes Sweeping IT Mean Managers Face Significant Decisions
Maintaining the Client/Vendor Marriage
In the IT world of project management, clients are the bread and butter. It's critical, of course, that what we do, the systems we implement, the processes we use, and the technology we employ falls within our organization's current direction and overall mission. That's definitely important. But even more important is our customer. I'm not saying we serve them at all costs. But it is the customer's money, after all, and this contributes to our bottom line. So satisfaction is important.
Starting Agile Adoption: Avoiding Common Pitfalls of Planning
Agile software development involves people working together, across disciplines, to deliver business value efficiently. While the Agile Manifesto states that agile development values "responding to change over following a plan" and "working software over documentation," that does not mean plans are not important. A plan allows you to measure your progress, focus your efforts, or, more important, present a target that stakeholders can invest in.
Jumping the Radioactive Walrus: Nuclear Risk Mismanagement in Japan
Last year, I wrote an Advisor titled "Jumping the Walrus: When Risk Management Goes Bad" (1 July 2010), which discussed the systemic risk management blunders by BP and the oil industry in general that came to light in the aftermath of the
Jumping the Radioactive Walrus: Nuclear Risk Mismanagement in Japan
Last year, I wrote an Advisor titled "Jumping the Walrus: When Risk Management Goes Bad" (1 July 2010), which discussed the systemic risk management blunders by BP and the oil industry in general that came to light in the aftermath of the
Rebooters Versus Doubters: Debate Affects Our Minds
Rebooters Versus Doubters: Debate Affects Our Minds
12 Steps Toward Confident Excellence
Reuse Maturity Model: Establishing a Software Vocabulary
Software development has been full of fast-paced advancements, with a focus on increasing efficiency and reducing cost/efforts for stakeholders. Applying these changes forms a crucial part of the reusability concern that has been at the forefront of new business initiatives or development. Reuse has been central to many of the development models as have such tenets as "don't reinvent the wheel" and "don't repeat yourself."
How the Offshoring Debate Affects US Employment
There is growing apprehension among business leaders, economists, and ordinary Americans that we are witnessing what may well be the largest outmigration of nonmanufacturing jobs in the history of the US economy.
-- Askok Bardhan and Cynthia Kroll
How the Offshoring Debate Affects US Employment
There is growing apprehension among business leaders, economists, and ordinary Americans that we are witnessing what may well be the largest outmigration of nonmanufacturing jobs in the history of the US economy.
-- Askok Bardhan and Cynthia Kroll
Chinese Wall: An Information Security Approach
This Executive Report by Sebastian Konkol presents one type of advanced information access control: Chinese Wall security policy (CWSP).
Chinese Wall: An Information Security Approach
This Executive Report by Sebastian Konkol presents one type of advanced information access control: Chinese Wall security policy (CWSP).


