Enterprise Architecture’s Transition to Consumer Oriented Services

Unless you have been living in cave for the past five or so years, you may have noticed that technology is being democratized within your business.  Perhaps right under your feet!  The confluence of consumerization, cloud computing, ubiq…

Enterprise Architecture’s Transition to Consumer Oriented Services

Unless you have been living in cave for the past five or so years, you may have noticed that technology is being democratized within your business.  Perhaps right under your feet!  The confluence of consumerization, cloud computing, ubiquitous connectivity, and the needs of a modern dynamic business will (if not already) fundamentally change information technology’s role in…

Modernizing Enterprise Architecture: Address The Neurosis of IT

“TCP/IP and Ethernet will not be accepted as a valid network implementation as SNA and Token Ring are our preferred standards.” – circa 1993 by nameless corporate Information Systems expert.
I was shocked when I had heard this, and images …

Modernizing Enterprise Architecture: Address The Neurosis of IT

“TCP/IP and Ethernet will not be accepted as a valid network implementation as SNA and Token Ring are our preferred standards.” – circa 1993 by nameless corporate Information Systems expert.
I was shocked when I had heard this, and images …

Modernizing Enterprise Architecture: Address The Neurosis of IT

“TCP/IP and Ethernet will not be accepted as a valid network implementation as SNA and Token Ring are our preferred standards.” – circa 1993 by nameless corporate Information Systems expert. I was shocked when I had heard this, and images of ostriches with their heads in the sand immediately came into mind. I was new…

Employers ask for Facebook passwords but not social skills

Lately there has been a lot of buzz about employers asking potential employees for their Facebook passwords. I heard yet another story about this over the weekend. While I don’t feel employers should be asking for social media passwords, this post is more about the irony that employers want social passwords but are not asking […]

IT job postings ask for the wrong thing

My report “Job Postings – Hiring for IT’s Past” published today on Gartner.com. This Gartner for Technical Professionals (GTP) report is a wake-up call for IT organizations because it shows that most IT organizations are hiring for the wrong requirements. In late 2011 and early 2012 we sampled current job postings in six major job […]

Inversion of Control

According to Wikipedia, inversion of control (IoC) is an object-oriented programming practice whereby the object coupling is bound at run time by an “assembler” object and are typically not knowable at compile time using static analysis. The binding process is achieved through dependency injection. In practice, Inversion of Control is a style of software construction […]

Rethinking the Enterprise “Mess” Using a System Thinking Approach

I have long considered the discipline of “architecture” as a problem solving technique that brings together art, philosophy, engineering, physics, culture, technology, etc.  Producing a high quality architecture is to provide a platform for the enterprise to balance form, function, and elegance.   Or using today’s parlance: structure, behaviors, and desire.   I know the term “desire”…

Failures in Communication – Don’t Tell Me! Engage Me!

For frequent readers, you know that I tend to look at issues through a humanistic lens.  Many of my client inquiries start with a request for the best way to represent “x”, or the way to describe something so that people will do “y”.  Instead, I like to think about “What are you trying to […]