Advisors provide a continuous flow of information on the topics covered by each practice, including consultant insights and reports from the front lines, analyses of trends, and breaking new ideas. Advisors are delivered directly to your email inbox, and are also available in the resource library.
Collaborative Leadership Basics: The Power of a Clear and Elevating Goal
In my last Advisor ("Collaborative Leadership Basics, Part 8: Keys for Creating Designer Norms in Teams," 1 March 2007), I told you about how to make and keep operating agreements that develop into a set of custom-designed norms and support a team in achieving high performance.
Is That Our Daylight Savings Time or Yours? Minimizing and Mitigating Communications Risks
The recent switchover to Daylight Savings Time in the US was a challenge for those who live in the States, but in many ways, it was even more of a headache for our allies overseas. Those of us who deal with enterprises outside the US have the unpleasant challenge of trying to figure out what time it is where.
Smart Sourcing: How Much Does Cultural Diversity Matter?
The most significant component of sourcing is people, or the workforce, and organizations are moving toward a more global workforce to reap the benefits of sourcing. Obviously, the question that arises next is: how do we assemble our global workforce? More importantly, how much does the cultural diversity of our workforce matter?
More on Enterprise 2.0 Considerations
Last fall, I discussed some of the main ideas underlying the Web 2.0 and Enterprise 2.0 concepts (see "Enterprise 2.0: Hip or Hype?" 25 October 2006, and "Beyond the Hype: Enterprise 2.0 Considerations," 22 November 2006).
Creating a Breach Response Plan
A best practice is to prevent a privacy incident from occurring in the first place. Do this by first identifying current privacy exposures and second by prioritizing how to address them. However, when a privacy incident occurs, resolve the issues as quickly as possible by following your established incident response procedures and then analyzing the incident.
Web 2.0
A Recipe for Success, Part 4
In previous Advisors (see "A Recipe for Success," 8 February 2007, "A Recipe for Success, Part 2," 15 February 2007, and "A Recipe for Success, Part 3," 8 March 2007), I introduced
Seeing Value Creation Risks Requires Value Analysis
Are organizations fully capable of understanding the possible risks to value creation from technology investment in the absence of an economic value analysis of that technology? Wal-Mart's tale of RFID tag deployment is illuminating.
Sourcing and the Passionate CIO
A new world order has been evolving since around 1990 or so, and we in the IT industry have responded to it with such efforts, fads, buzzwords, and new technologies as reengineering, the Internet, outsourcing, optimization, virtualization, and many others. However, we really have not seen the changes enabled by these new technologies and evolving global business needs holistically -- as a call for new ways of doing business -- and we certainly have not rallied ourselves as a profession to rethink the way we extract value from technology in our businesses.
Versioning, Part 2 -- Loose Coupling's Evil Twin
If you follow astrology, you know that Gemini is the sign of the twins. And it's often said that Gemini have two sides: their good side and the other side -- the evil twin, which emerges at unexpected times, with undesirable results. I don't know if this is generally true about Gemini, but it is often true about other complex things.
Engaging Business Management
We continue to confront a basic problem in IT management: business managers aren't much interested in participating in prioritization, alignment, and planning exercises for IT. This is particularly true for business-unit managers who are components of a multi-line-of-business corporation. While the corporate CFO, and possibly the CEO, do worry about IT costs, individual business unit managers who consume IT services simply aren't interested.
Business Transformation and Innovation: Let's Understand the Practicalities of Business Processes First
No doubt, like many other practitioners, you have indoctrinated yourself with the mantra that transformation and innovation are the two true key cornerstones of your success. You may have recognized that it is not enough for your company simply to be efficient in order to stay ahead of your competitors.
Agents, Defined
Imagine sitting in the park on a nice summer day, and a flock of birds sweeps the sky. One moment they are circling, another they dart to the left or drop to the ground. Each move is so beautiful that it appears choreographed. Furthermore, the movements of the flock seem smoother than those of any one bird in the flock. Yet, the flock has no high-level controller or even a lead bird.
BI Market Happenings: The Oracle-Hyperion Acquisition in Perspective
Oracle's recent acquisition of analytic database and enterprise performance management (EPM) vendor Hyperion Software continues a trend in which the large, enterprise software vendors are aggressively moving to increase their presence in the market for BI tools and performance management applications.
Solved Problems
A Recipe for Success, Part 3
In my last two Advisors (see "A Recipe for Success," 8 February 2007 and "A Recipe for Success, Part 2," 15 February 2007), I introduced David Anderson's recipe for success: focus on quality,
Risk Ain't What It Used To Be
"We have extraordinarily low risk premiums now; risk is no longer perceived as major risk, at least as it was in years past, and that, I must say, I find disturbing," former US Federal Reserve Board Chairman Alan Greenspan said at a conference last week, in which he also said there was a possibility of a US recession before the end of 2007 [1].
Sourcing Is Getting More Strategic
Sourcing maturity has naturally led organizations to investigate the legitimacy of forging initiatives with a more strategic flavor. The next wave of sourcing -- mostly offshoring, but outsourcing too -- is likely to reveal attempts by some ambitious organizations to derive much more strategic sourcing value than those sometimes-elusive cost reductions. It is worth understanding what strategic sourcing might include and the management thinking applied to ensure their success.
Doing SOA Right Today, Part 5: The Reference Architecture Model Connection
Recently, a colleague asked me about my understanding of the reference architecture models for software-oriented architecture (SOA) initiatives. In particular, her question was related to how these architecture models stack up with other frameworks like information service bus (commercially known as enterprise service bus, or ESB).
The Art of the Program Management Office
Traditional project management techniques reveal their limitations when an organization is faced with achieving some business objective in which a number of IT projects require execution to realize that goal. Because the projects share a common objective of driving attainment of the objective, they require a unique management approach not found in traditional project management. The term of art for this enhanced way of managing is called a program management office (PMO).
Build an Insourcing Environment for Excellence
Legal Privacy and Security Requirements
The number of laws and regulations that govern how personal information must be handled continues to grow worldwide. Organizations, and the personnel handling the information, must understand and comply with the requirements and laws for all the locations in which personally identifiable information (PII) is handled.

