Five Strategic Opportunities/Risks that Will Define Success
The Evolution of BPM: Part II — Toward Service Orientation
In this Executive Update, we continue the discussion begun in Part I1 about the evolution of business process management (BPM) with respect to today's changes in commercial practice toward service orientation.
Cloud Computing and IT Sourcing for the Enterprise
Cloud computing is likely to have a continual and lasting impact on sourcing. While still in its infancy, it is bringing about a "weather change" in how outsourcing is viewed as well as in client expectations. In cloud computing, services are provided on a granular, pay- as-you-go basis through a versatile infrastructure that makes possible innumerable service variations.
Cloud Computing and IT Sourcing for the Enterprise
Cloud computing is likely to have a continual and lasting impact on sourcing. While still in its infancy, it is bringing about a "weather change" in how outsourcing is viewed as well as in client expectations. In cloud computing, services are provided on a granular, pay- as-you-go basis through a versatile infrastructure that makes possible innumerable service variations.
Getting Innovation via Outsourcing Contracts
Most client organizations expect that their providers will continually innovate or carry out some form of value-adding when there is an outsourcing contract. I write "some form" because a typical outsourcing contract does not specify what innovation is expected, let alone when it is to occur (just at the start? continuously?), where it is to occur (technology?
Getting Innovation via Outsourcing Contracts
Most client organizations expect that their providers will continually innovate or carry out some form of value-adding when there is an outsourcing contract. I write "some form" because a typical outsourcing contract does not specify what innovation is expected, let alone when it is to occur (just at the start? continuously?), where it is to occur (technology?
Getting Innovation via Outsourcing Contracts
Most client organizations expect that their providers will continually innovate or carry out some form of value-adding when there is an outsourcing contract. I write "some form" because a typical outsourcing contract does not specify what innovation is expected, let alone when it is to occur (just at the start? continuously?), where it is to occur (technology?
Agile Services As You Go
In my last Advisor, we examined some opportunities for applying agile principles to a "services in advance" (SIA) approach to SOA (see "How to Help Agile Get a Head Start," 23 July 2009).
Secure Your Enterprise Assets from the Perimeter
Is your perimeter secure? The answer to that is simple: NO. As business has become more distributed, outsourcing has gone global, supply chains are more connected, employees have become teleworkers, customers demand better information, and so on, we have systematically punched holes into perimeter security until it now resembles Swiss cheese.
Secure Your Enterprise Assets from the Perimeter
Is your perimeter secure? The answer to that is simple: NO. As business has become more distributed, outsourcing has gone global, supply chains are more connected, employees have become teleworkers, customers demand better information, and so on, we have systematically punched holes into perimeter security until it now resembles Swiss cheese.
Service Orienting Your Business Processes, Part I: Customer Fit and Transparence
Service-oriented viewpoints, which I outlined in an earlier Update (see "Service-Oriented Viewpoints," Vol. 12, No. 1.), provide a useful, low-risk approach that can help leverage your investment in existing process models and services as part of a well-planned business-IT alignment strategy.
Clouds Roll In: The Changing Face of IT
Rich User Experiences and Web 2.0: Part II -- Building Useful Applications
This is the second Executive Update in a three-part series exploring Tim O'Reilly's statement that Web 2.0 applications must go "beyond the page metaphor of Web 1.0 to deliver rich user experiences."1
Rich User Experiences and Web 2.0: Part II -- Building Useful Applications
This is the second Executive Update in a three-part series exploring Tim O'Reilly's statement that Web 2.0 applications must go "beyond the page metaphor of Web 1.0 to deliver rich user experiences."1
Learning to Wield the Strategic Sword
A Forensic Approach to Information Systems Development: Part II -- Ways to Fix the Problem
In the first of this two-part Executive Update series,1 I took a swipe at the currently accepted approach to systems development. My argument was that if a system is to adequately support a business, the information it handles must be rigorously derived from the business itself.
System and Process Maps for Decision Support Systems: Tracing the Data Lineage End to End
This Executive Update touches on a solution for recording and maintaining the data lineage for decision support systems (DSSs). The aim is to increase the effectiveness and pace of impact analysis for enhancements and root-cause analysis of data issues. The solution explores the idea of connecting ETL and BI metadata via a custom-built metadata repository provisioning an end-to-end view of data from upstream to downstream.


