Streamline Technical Debt Management with Ardoq’s New Smart Solution
The new out-of-the-box solution provides organizations with the tools and techniques to identify, quantify, prioritize, and address technical debt across their IT estate.
Aggregated enterprise architecture wisdom
The new out-of-the-box solution provides organizations with the tools and techniques to identify, quantify, prioritize, and address technical debt across their IT estate.
The new out-of-the-box solution provides organizations with the tools and techniques to identify, quantify, prioritize, and address technical debt across their IT estate.
(Editor’s Note: What follows is Part 3 of a 3-part article, July 1. The abstract for the 3-part series appeared here. The author, Lisa A. Pratico, was profiled here in the spring of 2023.) By Lisa A. Pratico […]
Enterprise architecture is key to successful IT and business transformation projects. Discover the five reasons transformations fail and how you can address them.
In his research, M.S. Krishnan, Accenture Professor of Computer Information Systems and University of Michigan professor of technology and operations, explores how digital technology and artificial intelligence are shaping modern business practices. Bu…
Banks and financial institutions are under more pressure than ever to transform themselves. However, like many other sectors, digital transformation in financial services is prone to failure.
Banks and financial institutions are under more pressure than ever to transform themselves. However, like many other sectors, digital transformation in financial services is prone to failure.
Written by:
Denny Wan, Reasonable Security
James Middleton, Nationwide Insurance
Melissa Melancon, Kyndryl
John Feezell, Kyndryl
John Linford, The Open Group
“Practice what you Preach”
Hindsight is a powerful thing. Cyber defenders often bear the brunt of the blame for “preventable” cyber incidents that are attributed to a failure to apply available patches in a timely manner. For example, Veracode found that 1 in 3 applications (38 percent) still use vulnerable versions of Log4j two years after the vulnerability was disclosed and patches were made available[1]. It is easy to allocate blame for the failure to patch, but it is not the full story.
By Andrea Magnorsky Knowledge, like most essential resources, is not spread in a useful way. How can teams collectively get better at having a more homogenous and cohesive understanding about the systems they work on? […]
As a market leader in enterprise architecture, our customers have been asking us what our position is on AI adoption and governance. Seth Lippincott explores the SAP LeanIX viewpoint on AI and our recommendations for leveraging AI tools.
Building a high-performance team takes significant effort, and it doesn’t occur until all members of the team are working together like a well-oiled machine. In this Advisor, we explore a key ingredient of high-performance teams: leaders who display so…
By Stephen Dougall I recently started writing a book on the topic of architecture views. As I progressed through the different views, I began to think about categorizing them, making it easier to understand where […]