8 years, 5 months ago

Are you sure that ‘good’ is what you want?

ArchiMate® is an open and independent graphical modeling language for enterprise architecture, but that’s only the start of the matter. It’s much more appropriate to see it as a stakeholder management tool. When used in conjunction with an EA framework like TOGAF™, ArchiMate takes on a new dimension and delivers an ability to communicate and collaborate with stakeholders through the creation of clear models, based on viewpoints that have a common foundation in both TOGAF and ArchiMate.
Continue reading

8 years, 5 months ago

New year, new certification

Until recently, virtually all IT certifications have been based on an individual’s recollection of a body of knowledge and their ability to pass a computer-based test. Perhaps a better method of evaluating competence to carry out a specific role is to examine the skills and experience that an individual has demonstrated in his/her work. Continue reading

8 years, 5 months ago

IT: The professionals

Business decision makers aren’t interested in the details, but they want to know important IT decisions being made in their business are in the hands of true professionals. Certification verifies the qualities and skills IT executives have with regards to the effective deployment, implementation and operation of IT solutions. Continue reading

8 years, 6 months ago

The Trusted Technology Forum: Best practices for securing the global technology supply chain

Supply chain risk needs focus to be able to address the concern. If everything is “a supply chain risk,” then we can’t focus our efforts and hone in on a reasonable, achievable, practical and implementable set of practices that can lead to better supply chain practices for all, and a higher degree of confidence among purchasers. Continue reading

8 years, 6 months ago

Security & architecture: Convergence, or never the twain shall meet?

Can the disciplines of architecture and information security do a better job of co-existence? What would that look like? Can we get to the point where security is truly “built in” versus “bolted on”? Continue reading

8 years, 6 months ago

Cybersecurity in a boundaryless world

The core dilemma in public cybersecurity: Balancing boundarylessness and data security. The solution isn’t easy, but long-term, it lies in not relying on the security of the pipes or the perimeter, but improving the trust and security of the data itself. Security needs to be associated with data and people; not the connections and routers that carry it. Continue reading