Advisors provide a continuous flow of information on the topics covered by each practice, including consultant insights and reports from the front lines, analyses of trends, and breaking new ideas. Advisors are delivered directly to your email inbox, and are also available in the resource library.
Memo to Self on User Interfaces
The Space Race and the Tough Decisions
Enterprise, Architecture, Technical Debt, and Technical Paralysis
Technical paralysis sets in when it becomes impossible for an organization's information systems to be modified in a timely manner to respond to business, technical, or legal changes. Let me give you a couple examples from my own recent experience.
Building Resilience Against Threats
Events move along quickly today, partly due to the onrush of new technology, but also due to the economic and market upheavals of recent years. New risks are emerging in every sector, from missed opportunity to IT security threats, economic hazards, and natural disasters. Companies need to develop the capacity to recover from serious threats and the agility to respond quickly.
Pitfalls of Agile XVI: Blueprints
If you're doing agile consulting, you may meet two different types of clients: the chaotic client, where your major challenge is to introduce at least some discipline into the development work, and the disciplined organizations that welcome you with their process handbook and ask you "to help us write the chapter on agil
Boarding on the Edge of Chaos
Bordering on the Edge of Chaos
Software-to-Order
Recently, I was reading yet another article on the impact of CAD/CAM 3D printing on the engineering and manufacturing of sophisticated parts and products. Increasingly, organizations are looking at the idea of engineering-to-order (ETO) as a means of capturing the demand for more and more sophisticated products.
Use Architecture to Reduce Technical Debt
Arming the Fortress: Principles for Securing Your Enterprise
We as a nation -- and each CEO as the individual custodian of a business enterprise -- are going to have to rethink how we define "secure." On most planets there is no way anybody would consider him or herself safe if the average evil-doer could penetrate a defense simply by walking around it. Nevertheless, that is precisely the situation when it comes to cybersecurity.
Arming the Fortress: Principles for Securing Your Enterprise
We as a nation -- and each CEO as the individual custodian of a business enterprise -- are going to have to rethink how we define "secure." On most planets there is no way anybody would consider him or herself safe if the average evil-doer could penetrate a defense simply by walking around it. Nevertheless, that is precisely the situation when it comes to cybersecurity.
Planning for the Transformation of IT
The move to the cloud, SaaS applications, and even infrastructure is changing corporate IT. Much of the transactional work will be gone forever. There are impacts on the nature and the size of IT staffing. The walls of the enterprise have been breached, and new offerings may level them totally, spreading the net of providers well outside the boundaries of the traditional enterprise.
SCM and Build
Software configuration management (SCM) and build management are misunderstood disciplines. Many organizations have practices in these areas that either hinder productivity or sacrifice too much traceability in the name of improving short-term productivity. SCM and build, when done correctly, can provide a framework that allows a team to develop code quickly. However, it's also possible to establish practices that can hinder your development team.
Leading Change in Your Organization
Leaders of technology companies should take change management more seriously. While this is also true of changes to requirements, products, and other elements normally handled by change-control systems, here we're talking about the type of change management that's associated with organizational change.
Five Opportunities in Outsourcing to China
China's transformation toward a technology powerhouse gives Western firms new opportunities for IT services sourcing. However, with it comes significant managerial challenges.
Business-Driven Roadmaps and Funding Models
Migration Considerations
The general thinking in the cloud provider community -- public or private -- has been to assume that anyone moving applications into the cloud is creating new servers and building new systems and applications, not migrating existing applications and systems.
Four Things the Project Manager Should Expect of Senior Management
Project managers (PMs) are used to working fairly solo. If you have a PMO of, say, 15 PMs, each of whom is running, on average, five projects, then that's 75 projects that may be going on at any given time in the organization. Are we going to involve senior management in every one of those 75 projects? No. Should we, as project managers, expect that our senior management wants to have intimate knowledge of the status of each of those 75 projects? No.
Four Things the Project Manager Should Expect of Senior Management
Project managers (PMs) are used to working fairly solo. If you have a PMO of, say, 15 PMs, each of whom is running, on average, five projects, then that's 75 projects that may be going on at any given time in the organization. Are we going to involve senior management in every one of those 75 projects? No. Should we, as project managers, expect that our senior management wants to have intimate knowledge of the status of each of those 75 projects? No.
Toward a Fusion of Agile Methods, Technical Debt Techniques, and Competitive Strategy
Technical debt is not a new concept. The term itself was coined by Cutter Fellow Ward Cunningham more than 10 years ago. Certain components of technical debt, such as the Cyclomatic Complexity software metric, have been in use since 1976.