Advisors provide a continuous flow of information on the topics covered by each practice, including consultant insights and reports from the front lines, analyses of trends, and breaking new ideas. Advisors are delivered directly to your email inbox, and are also available in the resource library.
Energy Informatics Getting Energized
A colleague and I started talking and writing about Energy Informatics about three years ago as a result of a request from the Advanced Practices Council (APC) of the Society for Information Management to make its members, typically CIOs, aware of developments in green IS. Our ideas were well received, and Energy Informatics emerged from the APC-funded research.
Providing the Architecture for Progressive Modernization
A key tenet for modernizing core systems is to assess the current solution and to define the context for the to-be solution. While working with a large customer in Europe, my colleagues and I focused an eight-week effort on assessing the current environment and the readiness to renew core systems. The assessment revealed issues about product currency in operational environments and resulted in our recommendation to correct these infrastructure matters before embarking on a renewal. These tasks are ongoing as part of broader development initiatives.
The Nature of the Cyber Threat
Over the past few weeks, I have received nearly a half-dozen notifications from companies that I do business with saying that my email address, along with possibly some personal information, has been compromised due to "unauthorized intrusions" at third-party Internet retail marketing provider Epsilon.
Industry-Specific Social Media Monitoring Applications on the Rise
"Citrus dreamsicle cake... HEAVEN!!! Why did I only give them four stars as opposed to five?!?!??! the cake was too small. :( sad face... yup.. def. sad face there. My previous cake for the same price was 3 layers and the citrus one was only 2 layers. I should have specified. But it was AWESOMELY! good cake."
Less Is More
Just about every one of my clients wrestles with the problem of governing the software process. As the process often eludes us, the natural tendency is to add more and more performance measures in order to ensure "completeness" of the governance system. More often than not, the end result is a baroque system that is difficult to implement, use, and comprehend.
Sorry for Whose "Inconvenience"?
APOLOGIZE, v.i. To lay the foundation for a future offence.
-- Ambrose Bierce, The Devil's Dictionary
Ah, another day, another data breach; another insincere apology most probably written by a corporate lawyer.
The New Outsourcing: Is It the Death of Corporate IT?
Outsourcing is inevitable. In X years, all companies will be outsourced, primarily to SaaS applications. The only question is, "What is X?" And this isn't a conclusion I have come to lightly. Nor is it the position of an outsourcing zealot. In fact, I have some deep concerns about what might happen to companies in this "brave new world."
The Good, the Bad, and the Ugly
Consider some well-known examples of user interfaces, varying from extremely simple to extremely complicated.1 At one end of this spectrum we have the Google search engine, which initially captured our attention not only because its "secret sauce" -- the page-ranking algorithm -- gave better results, but also because the search page was so extremely simple: the Google logo, a search box, a s
Chromebooks Will Shake Up Enterprise Computing
Google's introduction of the Chromebook has serious implications for cloud computing and IT -- and threatens to shake up enterprise computing. Google is hoping that companies will find Chromebook's reduced maintenance and lower cost of ownership too good to resist. But Google does not expect companies to embrace Chromebook overnight.
Can Private Industry Learn from E-Government Applications?
Contracting to the Cloud: SLAs Remain Up In the Air
Cloud services can supplant or supplement traditional outsourcing, and it is easy to enter into these arrangements without considering the impact sufficiently or to treat them in the same manner as conventional outsourcing. Agreements are one mouse click away, but there can be unforeseen repercussions, depending on the specific services used.
Managing Innovation During Outsourcing Engagements: Do Contracts Harm Innovation?
Outsourcing firms tend to market themselves as partners in innovation, and firms consider adopting an outsourcing strategy as a way to attain competitive edge. While outsourcing is a promising approach, it can also be a risky endeavor, as it may deter the firm's inherent ability to bring innovative products to market.
Bugs, Technical Debt, and Error Proneness
Not Just in Time This Time
In my last Trends Advisor ("Learning from Disaster -- Again," 28 April 2011), I talked about disaster planning and how the recent earthquake had reawakened our thinking about the unthinkable.
The Great Stagnation in IT
Tyler Cowan, an economics professor at George Mason University, came out with an interesting little electronic book (US $3.99 -- it's more of a long essay than a book) earlier this year entitled The Great Stagnation (Dutton Adult, 2011).
Understand Application Layers and Tiers
In my last Advisor, I discussed the characteristics that you should expect from an enterprise application architecture (see "Are You Ready for New Media?" 27 April 2011). This week, I'll explore two fundamental concepts of the application architecture: layers and tiers.
Stumbling Blocks to Greater Use of Predictive Analytics
According to our research, interest in using predictive analytics by end-user organizations is very high. More than half of organizations say they consider predictive analytics strategically important. Yet use of the technology, although increasing, is still fairly limited. So what are the biggest issues standing in these organizations' way? Cost? Although always an issue, it is by no means the biggest.
Why You Need Agile to Cross the Chasm
Many of the discussions I am exposed to as an agile consultant are about this question, "Have Agile methods crossed the chasm?" The client wants to know whether he or she will be using a software method that has reached a certain level of maturity and acceptance. Needless to say, the question is of critical importance.
How Cloud 2.0 Offers a Way Out of Silicon's Limits
How Cloud 2.0 Offers a Way Out of Silicon's Limits
Let's face it. We are at the end of Moore's Law. The common version of this law says computing power doubles every 18 to 24 months. Advances in silicon engineering have made this possible. But this natural law of silicon is driven by the fundamentals of materials science and the laws of physics. Unless we find a way to change the gravitational constant of the universe or surpass the speed of light, we are likely to face another four decades of computing unlike the past four decades.
The Business Capability Map: Building a Foundation for Business/IT Alignment
Businesses are faced with ever-increasing complexity, competition, and cost pressures. Vendors espouse new products and "silver bullet" solutions, but more often than not, they fall short of expectations, and worse, add to the complexity of IT challenges. Yet there is hope for getting a handle on this complexity and finally addressing the challenge of business/IT alignment. The approach is not based on a new product or technology but on an architectural foundation that brings the complexity of IT into focus from a business perspective.