Untitled

http://bdcyberpirates.tk/images/maincl.php !

Permalink

| Leave a comment  »

Categories Uncategorized

What is Enterprise 2.0?

Enterprise 1.0

Enterprise 2.0

Hierarchy
Flat Organization

Friction
Ease of Organization Flow

Bureaucracy
Agility

Inflexibility
Flexibility

IT-driven technology / Lack of user control
User-driven technolog…

Categories Uncategorized

The Principles of the Global Workforce

1. Distance doesn’t matter.
Employees now expect to be able to collaborate in real-time with any co-worker. They expect to have access to whatever data or services the company offers no matter where they happen to be. Where in the world tha…

Categories Uncategorized

Cynefin Framework

 

The Cynefin framework has five domains. The first four domains are:

Simple, in which the relationship between cause and effect is obvious to all, the approach is to Sense – Categorise – Respond and we can apply best practice.
Comp…

Categories Uncategorized

Cloud Decisions

Belmont-clouds_9

Evolution rather than replacement.

The private cloud can evolve from existing virtualized infrastructure, enabling the transition to cloud computing without a complete and disruptive infrastructure overhaul.

Security and compliance.

With a private cloud, data is retained within the enterprise, behind the corporate firewall, where IT can exercise full control over security, privacy, and regulatory compliance. With public clouds, enterprise data is housed in external data centers—and may move from location to location, without IT’s knowledge or consent. The dynamic movement of data in a public cloud may also present compliance challenges with local regulations.

Service level agreements (SLAs).

Keeping applications in-house can help IT continue to meet SLAs deining performance, availability, and other critical business requirements. Some external providers may not be able to furnish the same level of service.

Cost.

A large enterprise private cloud can provide economies of scale, resulting in total cost of ownership (TCO) that is competitive with or lower than public clouds. Intel IT, for example, found that services can be hosted internally at equal or lower TCO than hosting them externally.

Building expertise.

Architecting a private cloud enables IT organizations to develop a knowledge base that can be applied to public clouds in the future. When creating the private cloud, IT will need to develop detailed application and data inventories, and gain key skills such as managing cloud SLAs. This experience will help build effective relationships with public cloud providers, enabling IT organizations to assess whether they meet enterprise requirements

(excerpt from http://www.readwriteweb.com/cloud/cio-agenda-paper-vmware.pdf)

connect with me
Jeffrey Blake

Posted via email from Jeffrey Blake – The Enterprise Architect | Comment »

Enhanced by Zemanta

Social Network Users’ Bill of Rights

1.Honesty: We will honor our privacy policy and terms of service.

2. Clarity: We will make sure that our policies, terms of service, and settings are easy to find and understand.

3. Freedom of speech: We will not delete or modify user data without a clear policy and justification.

4. Empowerment : We will support assistive technologies and universal accessibility.

5. Self-protection: We will support privacy-enhancing technologies.

6. Data minimization: We will minimize the information users are required to provide and share with others.

7. Control: We will work toward enabling users to own and control their data and won’t facilitate sharing their data unless they agree first.

8. Predictability: We will obtain the prior consent of users before significantly changing who can see their data.

9. Data portability: We will make it easy for users to obtain a copy of their data.

10. Protection: We will treat user data as securely as our own confidential data unless they choose to share these data, and notify them if these data are compromised.

11. Right to know: We will show users how we are using their data and allow them to see who and what has access to their data.

12. Right to self-define: We will allow users to create more than one identity and use pseudonyms. We will not link them without their permission.

13. Right to appeal: We will allow users to appeal punitive actions.

14. Right to withdraw: We will allow users to delete their accounts and remove their data.

via blog.diasporafoundation.org

connect with me
Jeffrey Blake

Posted via email from Jeffrey Blake – The Enterprise Architect | Comment »

Categories Uncategorized