Use a Management "Watch List" for IT Projects -- A Great Idea
This week we noticed an article in Federal Computer Week (12 March 2007, pp. 62-63) that describes how US federal agency computer projects can be on several "watch" lists. The article notes that the "Office of Management and Budget lists 246 business cases ... on its ... Watch List."
Choosing Between Captive Centers and Third-Party Vendors in Offshoring
To better understand what factors actually play a role in the sourcing decision offshore, I have discussed this issue in interviews with over 60 representatives of client firms in the US as well as IT services vendor firms and captive units in India, Russia, Ukraine, Czech Republic, and Armenia. From the data I collected, two decision criteria emerged as critical in making the sourcing choice:
Choosing Between Captive Centers and Third-Party Vendors in Offshoring
To better understand what factors actually play a role in the sourcing decision offshore, I have discussed this issue in interviews with over 60 representatives of client firms in the US as well as IT services vendor firms and captive units in India, Russia, Ukraine, Czech Republic, and Armenia. From the data I collected, two decision criteria emerged as critical in making the sourcing choice:
The Business Role of IT Management
Have Your Computer Call My Computer
In the dark, dim days when I was a child, people used mostly black telephones connected to the wall by a wire. They placed calls using a rotary dial. Then came colored phones with push buttons, wireless phones, cellular phones, and VoIP. All of this seemed to happen in the blink of an eye, but it has been at least 30 years. And there's a lot more to come.
Have Your Computer Call My Computer
In the dark, dim days when I was a child, people used mostly black telephones connected to the wall by a wire. They placed calls using a rotary dial. Then came colored phones with push buttons, wireless phones, cellular phones, and VoIP. All of this seemed to happen in the blink of an eye, but it has been at least 30 years. And there's a lot more to come.
Collaborative Leadership Basics: The Power of a Clear and Elevating Goal
In my last Advisor ("Collaborative Leadership Basics, Part 8: Keys for Creating Designer Norms in Teams," 1 March 2007), I told you about how to make and keep operating agreements that develop into a set of custom-designed norms and support a team in achieving high performance.
Is That Our Daylight Savings Time or Yours? Minimizing and Mitigating Communications Risks
The recent switchover to Daylight Savings Time in the US was a challenge for those who live in the States, but in many ways, it was even more of a headache for our allies overseas. Those of us who deal with enterprises outside the US have the unpleasant challenge of trying to figure out what time it is where.
Is That Our Daylight Savings Time or Yours? Minimizing and Mitigating Communications Risks
The recent switchover to Daylight Savings Time in the US was a challenge for those who live in the States, but in many ways, it was even more of a headache for our allies overseas. Those of us who deal with enterprises outside the US have the unpleasant challenge of trying to figure out what time it is where.
Is That Our Daylight Savings Time or Yours? Minimizing and Mitigating Communications Risks
The recent switchover to Daylight Savings Time in the US was a challenge for those who live in the States, but in many ways, it was even more of a headache for our allies overseas. Those of us who deal with enterprises outside the US have the unpleasant challenge of trying to figure out what time it is where.
Smart Sourcing: How Much Does Cultural Diversity Matter?
The most significant component of sourcing is people, or the workforce, and organizations are moving toward a more global workforce to reap the benefits of sourcing. Obviously, the question that arises next is: how do we assemble our global workforce? More importantly, how much does the cultural diversity of our workforce matter?
More on Enterprise 2.0 Considerations
Last fall, I discussed some of the main ideas underlying the Web 2.0 and Enterprise 2.0 concepts (see "Enterprise 2.0: Hip or Hype?" 25 October 2006, and "Beyond the Hype: Enterprise 2.0 Considerations," 22 November 2006).
Creating a Breach Response Plan
A best practice is to prevent a privacy incident from occurring in the first place. Do this by first identifying current privacy exposures and second by prioritizing how to address them. However, when a privacy incident occurs, resolve the issues as quickly as possible by following your established incident response procedures and then analyzing the incident.
Web 2.0
A Recipe for Success, Part 4
In previous Advisors (see "A Recipe for Success," 8 February 2007, "A Recipe for Success, Part 2," 15 February 2007, and "A Recipe for Success, Part 3," 8 March 2007), I introduced
Seeing Value Creation Risks Requires Value Analysis
Are organizations fully capable of understanding the possible risks to value creation from technology investment in the absence of an economic value analysis of that technology? Wal-Mart's tale of RFID tag deployment is illuminating.
Seeing Value Creation Risks Requires Value Analysis
Are organizations fully capable of understanding the possible risks to value creation from technology investment in the absence of an economic value analysis of that technology? Wal-Mart's tale of RFID tag deployment is illuminating.


