Advisors provide a continuous flow of information on the topics covered by each practice, including consultant insights and reports from the front lines, analyses of trends, and breaking new ideas. Advisors are delivered directly to your email inbox, and are also available in the resource library.
Sorry for Whose "Inconvenience"?
APOLOGIZE, v.i. To lay the foundation for a future offence.
-- Ambrose Bierce, The Devil's Dictionary
Ah, another day, another data breach; another insincere apology most probably written by a corporate lawyer.
The New Outsourcing: Is It the Death of Corporate IT?
Outsourcing is inevitable. In X years, all companies will be outsourced, primarily to SaaS applications. The only question is, "What is X?" And this isn't a conclusion I have come to lightly. Nor is it the position of an outsourcing zealot. In fact, I have some deep concerns about what might happen to companies in this "brave new world."
The Good, the Bad, and the Ugly
Consider some well-known examples of user interfaces, varying from extremely simple to extremely complicated.1 At one end of this spectrum we have the Google search engine, which initially captured our attention not only because its "secret sauce" -- the page-ranking algorithm -- gave better results, but also because the search page was so extremely simple: the Google logo, a search box, a s
Chromebooks Will Shake Up Enterprise Computing
Google's introduction of the Chromebook has serious implications for cloud computing and IT -- and threatens to shake up enterprise computing. Google is hoping that companies will find Chromebook's reduced maintenance and lower cost of ownership too good to resist. But Google does not expect companies to embrace Chromebook overnight.
Can Private Industry Learn from E-Government Applications?
Contracting to the Cloud: SLAs Remain Up In the Air
Cloud services can supplant or supplement traditional outsourcing, and it is easy to enter into these arrangements without considering the impact sufficiently or to treat them in the same manner as conventional outsourcing. Agreements are one mouse click away, but there can be unforeseen repercussions, depending on the specific services used.
Managing Innovation During Outsourcing Engagements: Do Contracts Harm Innovation?
Outsourcing firms tend to market themselves as partners in innovation, and firms consider adopting an outsourcing strategy as a way to attain competitive edge. While outsourcing is a promising approach, it can also be a risky endeavor, as it may deter the firm's inherent ability to bring innovative products to market.
Bugs, Technical Debt, and Error Proneness
Not Just in Time This Time
In my last Trends Advisor ("Learning from Disaster -- Again," 28 April 2011), I talked about disaster planning and how the recent earthquake had reawakened our thinking about the unthinkable.
The Great Stagnation in IT
Tyler Cowan, an economics professor at George Mason University, came out with an interesting little electronic book (US $3.99 -- it's more of a long essay than a book) earlier this year entitled The Great Stagnation (Dutton Adult, 2011).
Understand Application Layers and Tiers
In my last Advisor, I discussed the characteristics that you should expect from an enterprise application architecture (see "Are You Ready for New Media?" 27 April 2011). This week, I'll explore two fundamental concepts of the application architecture: layers and tiers.
Stumbling Blocks to Greater Use of Predictive Analytics
According to our research, interest in using predictive analytics by end-user organizations is very high. More than half of organizations say they consider predictive analytics strategically important. Yet use of the technology, although increasing, is still fairly limited. So what are the biggest issues standing in these organizations' way? Cost? Although always an issue, it is by no means the biggest.
Why You Need Agile to Cross the Chasm
Many of the discussions I am exposed to as an agile consultant are about this question, "Have Agile methods crossed the chasm?" The client wants to know whether he or she will be using a software method that has reached a certain level of maturity and acceptance. Needless to say, the question is of critical importance.
How Cloud 2.0 Offers a Way Out of Silicon's Limits
How Cloud 2.0 Offers a Way Out of Silicon's Limits
Let's face it. We are at the end of Moore's Law. The common version of this law says computing power doubles every 18 to 24 months. Advances in silicon engineering have made this possible. But this natural law of silicon is driven by the fundamentals of materials science and the laws of physics. Unless we find a way to change the gravitational constant of the universe or surpass the speed of light, we are likely to face another four decades of computing unlike the past four decades.
The Business Capability Map: Building a Foundation for Business/IT Alignment
Businesses are faced with ever-increasing complexity, competition, and cost pressures. Vendors espouse new products and "silver bullet" solutions, but more often than not, they fall short of expectations, and worse, add to the complexity of IT challenges. Yet there is hope for getting a handle on this complexity and finally addressing the challenge of business/IT alignment. The approach is not based on a new product or technology but on an architectural foundation that brings the complexity of IT into focus from a business perspective.
For Chain Gangers to Check-Ins, a Strategy to Address Change
The Business Capability Map: Building a Foundation for Business/IT Alignment
Businesses are faced with ever-increasing complexity, competition, and cost pressures. Vendors espouse new products and "silver bullet" solutions, but more often than not, they fall short of expectations, and worse, add to the complexity of IT challenges. Yet there is hope for getting a handle on this complexity and finally addressing the challenge of business/IT alignment. The approach is not based on a new product or technology but on an architectural foundation that brings the complexity of IT into focus from a business perspective.
Can We Stop Mobile Privacy Armageddon?
The "smart" phone is becoming more dangerous to information than the PC. Can we learn from the past to secure the mobile workforce and stop a global mobile-security meltdown?
IT folks have always been worried about mobile device security, but the fear was a little vague. Were phones really that dangerous? Would phone viruses become a reality or just a lab experiment? Now our fears are crystallizing into a real vision.
Hey, You, Get Off of My Cloud!
Despite the hype, despite the maturity of some vendors and their offerings, the cloud/software as a service (SaaS) world is still in its infancy. There are mature offerings, but there are also immature offerings.
A Roadmap to Limiting Risk and Spurring Innovation
The most important way to reduce risk in innovation is to establish efficient innovation processes and consider risks versus benefits at each stage of development for new ideas. General practices that can help to build efficiency and reduce tendencies toward a risky "all or nothing" approach include: