Collaboration and Business Intelligence
Collaboration and Business Intelligence
The Role of the IT Customer Service Representative
In a previous Executive Update [1], I alluded to the importance of the role of the customer service representative (CSR) in the IT function, attributing to it nothing less than the mythical healing powers of balm from Gideon for the oppressed CIO.
Privacy Issues and Liability in BI
Business intelligence (BI) and analytics technology are continuing to extend into new domains, where the usefulness of developing trends from aggregated data becomes both obvious and possible. At the same time, analysis is increasingly granular, yielding information down to the small group and individual level. As soon as information can be linked at the individual level, some of the many laws regarding information privacy will come into play.
Privacy Issues and Liability in BI
Business intelligence (BI) and analytics technology are continuing to extend into new domains, where the usefulness of developing trends from aggregated data becomes both obvious and possible. At the same time, analysis is increasingly granular, yielding information down to the small group and individual level. As soon as information can be linked at the individual level, some of the many laws regarding information privacy will come into play.
Effective Agile Project Management Begins with a Vanishing IT Organization
On the road to greater value creation from software projects, the principles of agile project management (APM) would do well to meet up with the intentions behind the idea of the disappearing IT organization. Together they represent a potentially powerful set of conditions for improved business performance through more effective software development.
Outsourcing Insights: Bottleneck and Breakthrough
This series of Executive Updates systematically examines the past, present, and future of the global IT outsourcing landscape. In Part I (Vol. 8, No. 5), we analyzed the current status of IT outsourcing using data from a late 2006 Cutter Consortium survey among 95 organizations. In Part II (Vol. 8, No.
Outsourcing Insights: Bottleneck and Breakthrough
This series of Executive Updates systematically examines the past, present, and future of the global IT outsourcing landscape. In Part I (Vol. 8, No. 5), we analyzed the current status of IT outsourcing using data from a late 2006 Cutter Consortium survey among 95 organizations. In Part II (Vol. 8, No.
The Future Web
Pundits have used a variety of terms to describe the rapid change that results from a sudden shift in underlying principles. But whether it is called a revolution, a new paradigm, or a tectonic shift, the nature and the structure of the Web are changing.
The Future Web
Pundits have used a variety of terms to describe the rapid change that results from a sudden shift in underlying principles. But whether it is called a revolution, a new paradigm, or a tectonic shift, the nature and the structure of the Web are changing.
10 New Rules
10 New Rules
The Information Security Maturity Model: A Roadmap to Security Excellence
The responsibility for establishing and maintaining information security today looks like a Scrabble board. COSO, COBIT, ITIL, ISO, and ASIS1 (apologies if I missed any other tiles) are either standards bodies that evangelize practices or acronyms for the management practices themselves -- all designed to help organizations optimize today's information security strategy and contend with tomorrow's threats. Whatever approach an organization adopts, there is one other standard worth considering first.
The Information Security Maturity Model: A Roadmap to Security Excellence
The responsibility for establishing and maintaining information security today looks like a Scrabble board. COSO, COBIT, ITIL, ISO, and ASIS1 (apologies if I missed any other tiles) are either standards bodies that evangelize practices or acronyms for the management practices themselves -- all designed to help organizations optimize today's information security strategy and contend with tomorrow's threats. Whatever approach an organization adopts, there is one other standard worth considering first.
The Information Security Maturity Model: A Roadmap to Security Excellence
The responsibility for establishing and maintaining information security today looks like a Scrabble board. COSO, COBIT, ITIL, ISO, and ASIS1 (apologies if I missed any other tiles) are either standards bodies that evangelize practices or acronyms for the management practices themselves -- all designed to help organizations optimize today's information security strategy and contend with tomorrow's threats. Whatever approach an organization adopts, there is one other standard worth considering first.
Use Web 2.0 to Create Business Value
Plenty to Go Around
The business/IT divide is alive and well. We often cast blame on IT for not "talking to the business in a way they can understand," but it's a two-way street and there is plenty of responsibility to be shared for the situation. Business blames IT for a host of sins. Recently, I heard: "They can't do what we ask ... everything takes too long ...
Politics in IT Governance and Prioritization
Ah, the word "politics" sounds ugly. Yet IT managers always talk about the negative role of politics in making IT investment and prioritization decisions. It would seem that "politics" is something to be avoided, that somehow a more rational decision-making approach could avoid politics.
Does Your IT Shop Need an Alignment?
In helping the founder get a local technology professional organization to take flight, I began to think about some broad themes around the business value of IT that would seed discussions in future meetings among the like-minded folk who populate this informal group. Thinking about business value topics made me realize how useful this exercise is in establishing better alignment between IT and business units.
Using Schedules in Contract Design: Personnel
In the next few Advisors, I'll address some complex rights your organization will want to consider in outsourcing contracts, as well as the obligations you may wish to require of a service provider. Each of these entails having a separate schedule in your outsourcing contract in addition to clauses within the contract.
Using Schedules in Contract Design: Personnel
In the next few Advisors, I'll address some complex rights your organization will want to consider in outsourcing contracts, as well as the obligations you may wish to require of a service provider. Each of these entails having a separate schedule in your outsourcing contract in addition to clauses within the contract.


