Goodbye Baked Ham

Zig Ziglar died today. The title may make instant sense to his followers or to those of you that have heard me tell his story about baked ham. It’s about his wife sawing the end off of a roast before baking because she thinks it creates a better roast. But when they call the originator […]

The post Goodbye Baked Ham appeared first on Mike Rollings.

The Nexus and IT Jobs – It’s Hip to be Square

Last week our “2013 Professional Effectiveness Planning Guide: Coming to Terms With the Nexus of Forces” was published on Gartner.com. It discusses the Nexus of Forces — social, mobile, cloud and information — and the profound implications for IT. The nexus forces combine to provide a platform and impetus for innovation, but many organizations are […]

The Nexus and IT Jobs – It’s Hip to be Square

Last week our “2013 Professional Effectiveness Planning Guide: Coming to Terms With the Nexus of Forces” was published on Gartner.com. It discusses the Nexus of Forces — social, mobile, cloud and information — and the profound implications for IT. The nexus forces combine to provide a platform and impetus for innovation, but many organizations are […]

The post The Nexus and IT Jobs – It’s Hip to be Square appeared first on Mike Rollings.

Enterprise Architecture’s Transition to Consumer Oriented Services

Unless you have been living in cave for the past five or so years, you may have noticed that technology is being democratized within your business.  Perhaps right under your feet!  The confluence of consumerization, cloud computing, ubiq…

Enterprise Architecture’s Transition to Consumer Oriented Services

Unless you have been living in cave for the past five or so years, you may have noticed that technology is being democratized within your business.  Perhaps right under your feet!  The confluence of consumerization, cloud computing, ubiquitous connectivity, and the needs of a modern dynamic business will (if not already) fundamentally change information technology’s role in…

Modernizing Enterprise Architecture: Address The Neurosis of IT

“TCP/IP and Ethernet will not be accepted as a valid network implementation as SNA and Token Ring are our preferred standards.” – circa 1993 by nameless corporate Information Systems expert.
I was shocked when I had heard this, and images …

Modernizing Enterprise Architecture: Address The Neurosis of IT

“TCP/IP and Ethernet will not be accepted as a valid network implementation as SNA and Token Ring are our preferred standards.” – circa 1993 by nameless corporate Information Systems expert.
I was shocked when I had heard this, and images …

Modernizing Enterprise Architecture: Address The Neurosis of IT

“TCP/IP and Ethernet will not be accepted as a valid network implementation as SNA and Token Ring are our preferred standards.” – circa 1993 by nameless corporate Information Systems expert. I was shocked when I had heard this, and images of ostriches with their heads in the sand immediately came into mind. I was new…

Employers ask for Facebook passwords but not social skills

Lately there has been a lot of buzz about employers asking potential employees for their Facebook passwords. I heard yet another story about this over the weekend. While I don’t feel employers should be asking for social media passwords, this post is more about the irony that employers want social passwords but are not asking […]

IT job postings ask for the wrong thing

My report “Job Postings – Hiring for IT’s Past” published today on Gartner.com. This Gartner for Technical Professionals (GTP) report is a wake-up call for IT organizations because it shows that most IT organizations are hiring for the wrong requirements. In late 2011 and early 2012 we sampled current job postings in six major job […]

Inversion of Control

According to Wikipedia, inversion of control (IoC) is an object-oriented programming practice whereby the object coupling is bound at run time by an “assembler” object and are typically not knowable at compile time using static analysis. The binding process is achieved through dependency injection. In practice, Inversion of Control is a style of software construction […]