The Enterprise Innovation Revolution 2008: Part II
In Part I of this Executive Update series, we described the four components of the enterprise innovation chain (value innovation, management innovation, business model innovation, and invention) and how this concept relates to Cutter's annual survey on innovation practices by comparing the results of our 2007 and 2008 surveys. 1 Here in Part II, we continue our examination of the key findings.
The Enterprise Innovation Revolution 2008: Part II
In Part I of this Executive Update series, we described the four components of the enterprise innovation chain (value innovation, management innovation, business model innovation, and invention) and how this concept relates to Cutter's annual survey on innovation practices by comparing the results of our 2007 and 2008 surveys. 1 Here in Part II, we continue our examination of the key findings.
The Enterprise Innovation Revolution 2008: Part II
In Part I of this Executive Update series, we described the four components of the enterprise innovation chain (value innovation, management innovation, business model innovation, and invention) and how this concept relates to Cutter's annual survey on innovation practices by comparing the results of our 2007 and 2008 surveys. 1 Here in Part II, we continue our examination of the key findings.
Corporate Data Mart and Data Warehouse Consolidation Continues
The need to consolidate disparate data warehouses and data marts is a situation that many organizations have been forced to deal with. Based on our latest research, approximately 39% of organizations indicate that they have already conducted, or are involved in carrying out, some type of effort to consolidate data warehousing or data marts. It also appears that this trend has accelerated.
Corporate Data Mart and Data Warehouse Consolidation Continues
The need to consolidate disparate data warehouses and data marts is a situation that many organizations have been forced to deal with. Based on our latest research, approximately 39% of organizations indicate that they have already conducted, or are involved in carrying out, some type of effort to consolidate data warehousing or data marts. It also appears that this trend has accelerated.
Role Specialization in Agile Projects
The myth surrounding agile projects goes something like this: a small team of developers who can handle any coding task (database, business logic, user interface, middleware, etc.) works hand-in-hand with the end user who talks with the development team about the details of the work requirements. The small-team-filled-with-generalists model may work for some small projects, but it doesn't scale.
BI Search: Corporate Adoption Trends
Agile SOA Governance: Illusion or Reality?
Many service-oriented architecture (SOA) governance initiatives become bogged down in a bureaucracy that militates against the very agility that SOA promises in the first place. Is there a way to achieve agile SOA governance, or is this simply an illusion? Fortunately, our experiences show that there are responsive and practical approaches to SOA governance. As with most things in life, balance is the key.
Agile SOA Governance: Illusion or Reality?
Many service-oriented architecture (SOA) governance initiatives become bogged down in a bureaucracy that militates against the very agility that SOA promises in the first place. Is there a way to achieve agile SOA governance, or is this simply an illusion? Fortunately, our experiences show that there are responsive and practical approaches to SOA governance. As with most things in life, balance is the key.
Help Agile Scale by Fine-Tuning Collaboration
As companies become comfortable using agile methods, larger and larger projects are being undertaken. While the myth, "agile is only good for small projects," is being proved wrong every day, there are still a number of issues that need to be addressed in order to scale agile -- in two dimensions, up and out.
Trends and Anti-Trends for 2009
Trends and Anti-Trends for 2009
New Governance vs. Organizational Terrorism
There's a challenge brewing in the trenches. It's tense, yet full of opportunity. It is bottom-up and top-down. It's personal -- and organizational. It's about power and control. It's therefore complicated and potentially very, very nasty. But, ultimately, it's about survival: we will change, or we will die.
New Governance vs. Organizational Terrorism
There's a challenge brewing in the trenches. It's tense, yet full of opportunity. It is bottom-up and top-down. It's personal -- and organizational. It's about power and control. It's therefore complicated and potentially very, very nasty. But, ultimately, it's about survival: we will change, or we will die.
New Governance vs. Organizational Terrorism
There's a challenge brewing in the trenches. It's tense, yet full of opportunity. It is bottom-up and top-down. It's personal -- and organizational. It's about power and control. It's therefore complicated and potentially very, very nasty. But, ultimately, it's about survival: we will change, or we will die.
Making It Mean What You Think It Means: Embedded Collaboration
"You keep using that word. I do not think it means what you think it means." -- Inigo Montoya, The Princess Bride
In a meeting today with a client, people were talking continually about how the IT organization and business have to improve their collaboration. The business feels a considerable amount of pain about the lack of collaboration with IT, and IT in turn is feeling some pain collaborating with the business during a transition to agile.
The Universal Nature of Enterprise Architecture
I've recently been observing a group of people attempting to develop a local food system for their community. What strikes me is that the principles of enterprise architecture (EA) that I've learned and used over the years are entirely relevant to this endeavor, despite the fact that IT has no role in it whatsoever.
How Information Security, Privacy Training, and Awareness Benefit Business
Training and awareness initiatives within organizations are like the dust bunnies hiding under your bed that you never want to think about. However, business leaders would be wise to realize that there is not a more effective information security and privacy defense than informed and aware personnel, as Part I of this three-part Executive Update series shows.


