Author

Brian Dooley

avatar

Brian J. Dooley is a Senior Consultant with Cutter Consortium's Data Analytics & Digital Technologies practice. He is an author, analyst, and journalist with more than 30 years' experience in analyzing and writing about IT trends. Read more ...

Oct 202015
 
The Gamification of Ordinary Life

At the annual Consumer Electronics Show (CES), attention turned once again to the Internet of Things (IoT) and personal devices. Wearables showed up in great profusion, focused upon watches, wristbands, and other personal sensors used to monitor activity rate, pulse, temperature, and whatever else can be determined from movement or simple surface sensors. For the home, measuring and control devices are emerging for temperature, humidity, intruder detection, and so forth — all attached, to personal networks, to the Web, and generally streaming data to external monitors. This all constitutes an escalation of device communications, which ultimately can lead to something like gamification of personal life and the home (Figure 1). Figure 1 — The gamification Read more

Jul 142015
 
The New Needs of Digital Business

Digital business requires change across a very wide range of areas. There is an increasing use of storage, vastly expanded networking requirements, and a rise in the virtualization of all equipment. Digital systems deployed on the network can be replicated, modeled, and situated anywhere, so we have seen virtual networks, virtual servers, virtual mobile solutions, and virtual workstations of all types. Virtualization creates a need for new management techniques that control, replicate, and abandon virtual components on an automatic basis and manage their various interactions. Information technology is moving outside the firm to the public cloud, either directly or connected through a hybrid cloud mechanism. All aspects of IT are becoming increasingly connected to all Read more

Jun 302015
 
The Data Lake as an Exploration Platform

The data lake is an attractive use case for enterprises seeking to capitalize on Hadoop’s big data processing capabilities. This is because it offers a platform for solving a major problem affecting most organizations: how to collect, store, and assimilate a range of data that exists in multiple, varying, and often incompatible formats strung out across the organization in different sources and file systems. In the data lake scenario, Hadoop serves as a repository for managing multiple kinds of data: structured, unstructured, and semistructured. But what do you do with all this data once you get it into Hadoop? After all, unless it is used to gain some sort of business value, the data lake Read more

Jun 162015
 
Agile Development Requires Agile Staffing

The impacts of the growing agility requirements within staffing cross a broad territory, currently limited only by the relatively small number of individuals involved. However, these impacts will continue and likely grow in importance as Agile principles become prevalent. Some potential issues and needs to look out for include: Revising existing job descriptions and establishing new specialties. Businesses should create new Agile jobs, such as product owner and ScrumMaster. These are not management jobs in the traditional sense, but they do require resources and responsibilities. Older project management positions should be altered or eliminated. Similarly, Agile development team members should develop collaboration and communications skills and may need training in the use of collaborative technologies, particularly Read more

Apr 212015
 
The Importance of Cross-Training

Cross-training reduces reliance on individual experts and extends a firm’s capabilities without hiring externally. A single specialist can become a bottleneck in a business process simply because he or she is the only person with a necessary skill. This is evident in areas such as software development where the idea of multi-skilling has become a component of Agile development. The problem that cross-training solves is the natural creation of islands of expertise and its consequences. While some people certainly need to be experts, cross-training problems occur at a lower level. Overall, it is important to recognize that isolated skills and resultant bottlenecks develop as a process over time. Consider an individual familiar with a particular Read more

Feb 242015
 
The Evolving Science of Computational Creativity

Innovation has become accepted as central to competitiveness in today’s world, both in new product development and in enhancement of internal processes. Companies struggle with innovation, and there have been numerous attempts to regularize and program it. But the development of truly breakthrough ideas is difficult, and recognizing them when they do arrive can be harder still. We have processes available for vetting ideas and passing them through a series of increasingly selective gateways until they reach the point of usefulness or are discarded altogether. But we do not have good processes for stitching together new ideas and reaching that eureka moment that says a critical new idea has been found. Some of the ways Read more

Nov 182014
 

It is becoming clear that the prevailing piecemeal approach to security is no longer sufficient to thwart increasingly sophisticated attacks. Gaps in coverage provide possible entry points, blended attacks in several sectors can mask the actual threat, and sophisticated attacks involving multiple targets and approaches can find their way around many current defenses. Interest is growing in unified threat management (UTM) for small to medium-sized businesses, which centralizes all network intrusion response in a single device, and next-generation firewalls (NGFs), which defend against most of the same things but are aimed at the enterprise. Although some currently define these as separate product areas, major vendors are now providing this form of protection as a continuum. Read more