Data Obstetrics: The Art and Science of Birthing Digital Data
Allowing for Agile Failures
While agile practices improve the odds of success in many situations, neither agile practices nor any others are silver bullets. There are situations in which projects will fail, regardless of methodology. For example, one of the Agile Manifesto principles is that people are more important than process.
Principles of Planning: Who and Where?
An effective plan provides guidance and direction to the people who will implement the plan. Regardless of the type of initiative that is being planned (business, investment, marketing, project, etc.), the plan describes not only the business problem and proposed solution, but also the strategies and tactics to be followed during implementation.
Important Contributions to the Business Value Discussion
Aligning IT execution with IT strategy means knowing the value projects bring to the table. This value has to be measured in some way meaningful to those providing the funding or consuming the benefits. The units of measure for both the cost and benefits is usually in dollars or some percentage of dollars. The physical prioritization of suggested projects starts with a "paired comparison" analysis rather than a linear ranking. The linear approach falsely sorts the projects by failing to distinguish between real need and perceived need.
The State of BI
For me, the most telling and important statistic in Cutter's recent survey on the state of BI is the percentage of employees that use BI tools: 57% of respondents indicate 0%-9.99% and 70% indicate 0%-14.99% (see Cutter Benchmark Report, "Successful Business Intelligence: Moving Beyond the Obvious," Vol. 7, No. 9).
SAP Buys Business Objects -- Or Keeping Up with the Joneses II
Two weeks ago, I was practically bombarded with e-mail from readers asking if I knew anything about the possibility of Business Objects being acquired. Like many, I'd heard the rumors, but I couldn't really say anything definite because they had been circulating for at least a year. Turns out that all the increased "chatter" was right after all.
SAP Buys Business Objects -- Or Keeping Up with the Joneses II
Two weeks ago, I was practically bombarded with e-mail from readers asking if I knew anything about the possibility of Business Objects being acquired. Like many, I'd heard the rumors, but I couldn't really say anything definite because they had been circulating for at least a year. Turns out that all the increased "chatter" was right after all.
The Portfolio of Lifecycle Management Techniques: The New IT Portfolio Management?
Author's note: The phrase "IT asset management" used in this Update is a term of art and should not be confused with "IT Asset Management" as a defined IT management discipline that includes software license management, configuration management, and a host of other techniques.
No, You Don't Own Your Data (and Other Shocking Truths)
Few areas of technology law may be as frustrating to business owners as the law of database rights. Databases represent a significant investment in time, energy, and, in many cases, money by the businesses that compile them. However, depending on where the business that compiles the database is located, the databases may have a great deal, some, or virtually no protection.
No, You Don't Own Your Data (and Other Shocking Truths)
Few areas of technology law may be as frustrating to business owners as the law of database rights. Databases represent a significant investment in time, energy, and, in many cases, money by the businesses that compile them. However, depending on where the business that compiles the database is located, the databases may have a great deal, some, or virtually no protection.
Sourcing Products in the Commons
Simply put, open source software is software that can be freely used, modified, and redistributed by anyone. These terms of release have two key implications. First, they create the potential for software products to be collaboratively developed by communities of developers (both individuals and organizations) in a mode of production and innovation that Yochai Benkler termed "peer production" [1].
Owning What You Paid For: The Nuts and Bolts of Work Made for Hire
For most businesses, buying the items needed to run the business is simple: order the item, pick it up or have it delivered, perhaps inspect it, pay for it, and it belongs to the business. Whether the item is a box of paper clips or a supertanker, the process is essentially the same.
Owning What You Paid For: The Nuts and Bolts of Work Made for Hire
For most businesses, buying the items needed to run the business is simple: order the item, pick it up or have it delivered, perhaps inspect it, pay for it, and it belongs to the business. Whether the item is a box of paper clips or a supertanker, the process is essentially the same.
Profiling Your Strategic Technology Alliances
This Advisor suggests you take a hard look at your strategic technology alliances. How many do you have? Are they productive? How do you decide which ones to pursue -- and which ones to terminate? Some of the alliances you may have include:
Channel alliances to sell your hardware, software, or services
Profiling Your Strategic Technology Alliances
This Advisor suggests you take a hard look at your strategic technology alliances. How many do you have? Are they productive? How do you decide which ones to pursue -- and which ones to terminate? Some of the alliances you may have include:
Channel alliances to sell your hardware, software, or services
Profiling Your Strategic Technology Alliances
This Advisor suggests you take a hard look at your strategic technology alliances. How many do you have? Are they productive? How do you decide which ones to pursue -- and which ones to terminate? Some of the alliances you may have include:
Channel alliances to sell your hardware, software, or services
Release Planning Themes: Breadth, Depth, BP Flow, Deployment Plan
My 2 August 2007 Advisor discussed the need for, and lack of in many instances, good release planning (see "Release (Project) Planning"). In the rush to deliver in short iterations (weeks), teams often suboptimize their pursuit of business value.
Stupid Security Tricks
Last Wednesday was like any other Wednesday. I was busy working on some reports when at 0819 I received an e-mail from a person named Alex stating that he was changing jobs in a few weeks, and that he would like to receive the US Department of Homeland Security (DHS) daily reports at his new e-mail address.
Stupid Security Tricks
Last Wednesday was like any other Wednesday. I was busy working on some reports when at 0819 I received an e-mail from a person named Alex stating that he was changing jobs in a few weeks, and that he would like to receive the US Department of Homeland Security (DHS) daily reports at his new e-mail address.
Stupid Security Tricks
Last Wednesday was like any other Wednesday. I was busy working on some reports when at 0819 I received an e-mail from a person named Alex stating that he was changing jobs in a few weeks, and that he would like to receive the US Department of Homeland Security (DHS) daily reports at his new e-mail address.


