Begin Every Project with a SWOT Analysis

Here’s an idea to help your projects go smoothly. Start each project off making sure that the team understands the business context it is operating in by  performing a SWOT analysis. I’ve been in a number of discussion recently that have made me think about ways to get projects off on a solid footing, understanding […]

Some BYOD Technology Recommendations

This is the sixteenth post in my series on BYOD. In my last post on the subject I discussed a range of technologies that can be used to solve issues raised by BYOD. Here I’d like to give my broad recommendations around which of those technologies are most likely to solve the kinds of problems […]

Flexibility, Agility and Open Standards

Flexibility and agility are terms used almost interchangeably these days as attributes of IT architectures designed to cope with rapidly changing business requirements. Did you ever wonder if they are actually the same? Don’t you have the feeling that these terms remain abstract and without a concrete link to the design of an IT architecture? … Continue reading

Take A Better Look At Cloud Risks

If you have ever had a debate about whether your organisation should use cloud computing  then a discussion of the risks of cloud computing will have been a significant part of it. In doing so, we often fall into a simple logical trap. Cloud computing is just one of the options that we have.  The […]

What Are You Doing To Get Off XP?

In case you haven’t heard Microsoft is ending support for Windows XP and Office 2003 in April of 2014. What this means is that Microsoft will no longer patch security vulnerabilities discovered in XP or Office 2003, and therefore there will be security holes discovered that can be exploited by hackers which will never be […]

An Overview of Mobility and BYOD Technology

This is the fifteenth post in my series on BYOD. I have mostly avoided talking about technology, as in many ways that is the least important, and the most straightforward aspect of dealing with BYOD. Most people automatically think of Mobile Device Management (MDM) when they think of mobile or BYOD technology, but that is far from […]

Privacy Matters for BYOD

This is my fourteenth post in my series on BYOD. This recent article on Infoworld about how the US Department of Veterans’ Affairs has put its BYOD plans on hold illustrates the point that you need to consider and cover off employee privacy when implementing BYOD. As I understand the article, they are putting their […]

Some Thoughts on Outsourcing

Link: http://dougnewdick.wordpress.com/2013/03/28/some-thoughts-on-outsourcing/

From Doug Newdick's Blog

I was discussing outsourcing with a friend the other day. I work in government IT, and outsourcing is used widely in government. He was discussing the tricky nature of being brought in as an independent vendor to the outsourcing vendor. What this brought up was something that is often overlooked in outsourcing deals, especially major ones. That is: any organisation that outsources a function (such as its IT) usually does so in the hope of saving money by shedding large amounts of staff. But, they usually don’t factor in that they will need additional staff with different skills to manage that outsourcer.

Read more

On Demand Broadcasts from Day One at The Open Group Conference in Newport Beach

Since not everyone could make the trip to The Open Group Conference in Newport Beach, we’ve put together a recap of day one’s plenary speakers. Stay tuned for more recaps coming soon! Continue reading

Big Data Security Tweet Jam

Please join us on Tuesday, January 22 at 9:00 a.m. PT/12:00 p.m. ET/5:00 p.m. GMT for a tweet jam, moderated by Dana Gardner (@Dana_Gardner), ZDNet – Briefings Direct, that will discuss and debate the issues around big data security. Key areas that will be addressed during the discussion include: data security, privacy, compliance, security ethics and, of course, Big Data. Continue reading