Smartphone and Tablet Version of TOGAF 9
For those that are like me, I use my smartphone or tablet throughout the day. Often times it is much easier to go to those devices than the traditional laptop. Given that I am always on the hunt for mobile…
Aggregated enterprise architecture wisdom
For those that are like me, I use my smartphone or tablet throughout the day. Often times it is much easier to go to those devices than the traditional laptop. Given that I am always on the hunt for mobile…
Well this is timely – December 12 , 2012, my 200th blog post and my 50th birthday. I still can’t believe it because when I look in the mirror or at the mental image of myself, I feel like I am 35 years old with so much to learn. Yet everyday I go to work, […]
The post A Personal Thank You for My Half Century appeared first on Enterprise Architecture in Higher Education.
Last week I presented about a topic that focuses on improving enterprise architecture effectiveness through our soft skills. There is a great deal to cover in this area but I wanted to build a primer and get some your thoughts…
Reblogged from Australian Business Solutions: By Tony Fantulla. It can be very frustrating for a company owner or business manager when an organization has great staff, good products, a strong vision and clear direction, yet the company’s growth is impeded … Continue reading →![]()
Quite a few times on this blog I’ve talked about kurtosis-risk (‘fat-tail’ risk), and why it’s a crucially important issue for enterprise-architecture. But what exactly is it? What does it look like in real-world practice? Why is it such a…
It seems that Carl and I got this trend about right back in 2007. What would you add or change to make a 2013-2019 prediction? Probably more on, ‘Big Data’ and the ‘Internet-of-Things’ – anything else?
Externalization.pdf
Download this file
…
“What is reification?
This is when ugliness of reality is eschewed in favor of a beautiful model. The model, created by great credentialed brains, is a jewel, an object of adoration so lovely that flaws noted by outsiders are seen as gratuitous insult…
“
What is reification?
This is when ugliness of reality is eschewed in favor of a beautiful model. The model, created by great credentialed brains, is a jewel, an object of adoration so lovely that flaws noted by outsiders are seen as gratuitous insults. The model is such an intellectual achievement that reality, which comes free, is felt an intrusion; the third wheel in the torrid love affair between modeler and model.
”
– William M. Brigs
What do Kate Middleton and, Apple and the Ministry of Social Development have in common? Poor information security leading to tragedies. They also show that information security has as much to do with culture as it does with technology. Recently a pair of Australian radio hosts were able to obtain private information about the Duchess […]![]()
These days, organizations are rarely self-contained. The challenge here is how to manage the dependencies your operations have on factors that are outside your control. The Open Group’s Dependency Modeling (O-DM) standard specifies how to construct a dependency model to manage risk and build trust over organizational dependencies between enterprises – and between operational divisions within a large organization. Continue reading →![]()
Yippee! After so many years it’s finally available on the shelves (well at least the digital shelves). If anyone would come across a copy on a book shelf in a physical book store please comment a picture to this post and you’ll make me a very happy architect. Thanks a million to all of you […]![]()
I did a scan around the web to figure out what many of the leading thinkers were saying about IT project failure and the root causes. Numbers varied between 20% and 80% of projects failing to deliver on their business case. The root cause analysis that follows from these failure numbers spends a lot of time looking at the IT project, but most forget to look at the causes of failure that are outside the project’s control.
In the diagram below, the central blue box represents causes of IT project failure that are inside the control of the IT team. As you can see, there are many more causes of IT project failure that are OUTSIDE that blue box than inside it. Yet, countless articles have been written on the factors INSIDE the box. I think it is time we take a slightly wider lens to the problem!
The factors outside the project are as important, or more important, than the ones inside the box. I have worked on many projects over the years, and if I look back at the ones that ended up cancelled or scrapped, the reasons were not ones in the blue box. They were usually ones from the top box: where the project should not have begun in the way that it did. Let’s look at these six factors:
Each of these conditions has the potential to kill an IT project. I would suggest that MANY IF NOT MOST of the failures of IT projects can be traced to one or more of these conditions, but these conditions rarely get counted in the statistics for “Causes of IT Project Failure.” Why? Because, in most cases, projects that suffer from these conditions are either never funded, or are reworked so that the political problem is simply avoided. The project business case does not reflect the problem, so the criteria for failure (doesn’t meet the business case) is never met. Efforts are made to avoid (but not address) the problem before the business case is written!
This is the world of the Enterprise Architect. These are the kinds of “failure” that fill the eyes and ears of an Enterprise Architect. If an EA focuses on only these six causes, he or she will deliver real, tangible, and unique value to their enterprise without ever overlapping the roles and responsibilities of an IT architect, business analyst, or technologist.