Contractor Under Your Skin? Seek Underlying Values
We all know by now that the relationship between the parties of an outsourcing contract is paramount to the success of the deal. While there is a fair bit of advice out there, it is mainly process-oriented (e.g., communicate frequently, plan together, have improvement workshops). But what if you genuinely do not like your counterpart on the other side?
Including Innovation in the Game of Survival
Including Innovation in the Game of Survival
Making Choices: The Tools We Use
Finally! Cut, Copy, Paste, and Search on iPhone
Finally! Cut, Copy, Paste, and Search on iPhone
Managing the Complete Product Lifecycle, Part III: The Marketing Product Manager
In Part II of this series (see "Managing the Complete Product Lifecycle, Part II: The Technical Product Manager," 3 June 2009), we talked about the product manager role that is primarily focused on the technical integrity of the product.
Key Steps to Ensuring Successful EA
Recently, we've written about some core strategies that help ensure the success of enterprise architecture, such as developing key EA capabilities (see "Six Key Capabilities on Road to EA Success," 18 March 2009) and employing an iterative and incremental approach to EA programs (see "Take Iterative Steps: Start Small, Empower Team Via Vision, Value," 29 April 2009).
Real Life: Stranger, and Often More Threat-Filled, Than Fiction
Many information security and privacy practitioners spend a lot of time thinking up hypothetical situations to use in training content for information security and privacy as well as awareness communications. What a waste of valuable time! All you need to do is scan the headlines for a few minutes, and you're sure to find many security and privacy incidents that have occurred throughout the world.
Innovation on the Cheap: Moving Forward While Standing Still
Innovation on the Cheap: Moving Forward While Standing Still
The Voices We Value
Making business decisions is never easy. It becomes progressively more complicated as those around us offer their "two cents' worth" about how we should act or what practices we should adopt. And the sheer number of those around us sometimes means that we receive input from a host of different parties, all with different perspectives.
I'm Not a Risk Manager, I'm a Risk Ecologist
I'm Not a Risk Manager, I'm a Risk Ecologist
I'm Not a Risk Manager, I'm a Risk Ecologist
Alpha Raises Level of Research
Alpha Raises Level of Research
Making Sense of Agile Design Practices
Design notations, such as UML, and long-lived design documents have at least one advantage: if you're overseeing the work of a software team, they are tangible, auditable deliverables that allow you to assess the team's design practices. You may, however, find this assessment more difficult to make if you're dealing with an agile team. For one thing, there is a widespread perception that agile approaches frown on documentation and prefer direct communication -- which leaves no written trace.
We Need to Improve Financial Management in IT Governance
We've recently spent considerable time in IT organizations in the US and in Latin America dealing with aspects of IT financial management. Through the Cutter Benchmark Review, we've also conducted studies for four years about IT budgeting (see "Linking IT Budgeting, Governance, and Value," Vol. 8, No. 7; "The IT Budget: The Centerpiece of IT Governance," Vol. 7, No.


