From the Editor: Book Review – An Executive Guide to the New Age of Corporate IT (Vol I)
In our ongoing series of book reviews for publications relevant…
Aggregated enterprise architecture wisdom
In our ongoing series of book reviews for publications relevant…
Poor decisions with poor outcomes are common when a business engages in ‘wishful thinking’. Agreeing to pursue a course of action because of what the decision maker wants to occur is not always wise. Ignoring drivers, constraints and capabilities when focused on a … Continue reading →
To manage a business effectively it is essential that decisions makers know Where the business is going? Why it is going there? How it will get there? How well it is travelling? What risks, constraints and external influences need to … Continue reading →
Today, Business Architecture is shaping and fostering enterprise transformation initiatives and continuous improvement throughout companies of all sizes. On Tuesday, March 19, The Open Group will host a tweet jam examining the topic of Business Architecture. … Continue reading →
In my last post I suggested that the planning of large transformation projects needs to focus more on the first step than on the end goal, because that first step, once taken, will be the “new now” – the reality with which the organization will have to work. I promised to try to explain how this might work in practice, so it here goes… Continue reading →
It’s not so long ago that we still had debates about whether complex projects should be delivered as a “big bang” or in phases. These days the big bang has pretty much been forgotten. Why is that? I think the main reason is the level of risk involved with running a long process and dropping it into the operational environment just like that. Continue reading →
In part 1 of a three-part series, The Open Group Vice President of Skills and Capabilities Len Fehskens discusses how our vocabulary affects the way we conceptualize Enterprise Architecture, Business Architecture and their relationship. Continue reading →
Technology today allows thieves to copy sensitive data, leaving the original in place and thus avoiding detection. Published in October 2012, the Jericho Forum® Data Protection white paper reviews the state of data protection today and where it should be heading to meet tomorrow’s business needs. Continue reading →
At every turn from agrarian to industrial to informative to creative, fundamental changes occurred in how business was done and in the principles of business management. These changes, although seemingly unrelated to a field like Enterprise Architectur…