Oct 292014
 
From Information Risk Management to BI for Software Organizations to Agile Transitions, We’ve Got You Covered.

We’ve been rounding up Dennises lately: Dennis Adams and Dennis Hogarth have joined our team of expert consultants. But along with the Dennises, we welcome Nancy Williams, Murray Cantor and Don MacIntyre. Dennis Adams is a long time Cutter contributor. He’s frequently presented the academic viewpoint for Cutter Benchmark Review. (If you’re not familiar with CBR, it partners academics and practitioners who co-write a survey, analyze the data, and then write opinion pieces — influenced by their academic/practitioner perspective — that are based on the findings. Looking at an issue or technology from both an academic and practical perspective gives CBR readers the 360 view they won’t otherwise see.) Now Dennis will add his expertise Read more

Oct 222014
 

Every once in a while, you run into an individual or an organization with an acutely mechanistic view of software development processes. “Mechanistic,” in this context, means that processes are like machines: you wind them up and let them go. As long as they continue to operate, good things will result. This misconception echoes a similar view of political systems that is alternately harmless and dangerous. In “The Place Of The Independent In Politics,” James Russell Lowell warned that too many Americans had lapsed into a view of the Constitution that it was a “machine that would go if itself.” “I admire the splendid complacency of my countrymen,” Lowell said, “and find something exhilarating and Read more

Oct 162014
 

It took home improvement retailing giant Home Depot about a week before it finally confirmed it had suffered a data breach. Home Depot first reported the possibility of a breach on 2 September 2014, but did not actually confirm the hacking until 8 September. During that time, the company made somewhat vague statements that it was still carrying out an investigation to determine whether or not its systems had actually been compromised. Based on the company’s recent press release confirming the breach (see “The Home Depot Provides Update on Breach Investigation“), it appears that Home Depot’s internal IT security team was unaware that its payment data systems had been compromised. Instead, it looks as if Read more

Oct 082014
 

From the beginning of data processing in the 1950s, an "us/them" dynamic has existed between business and IT organizations. Since then, attempts by CIOs and business executives to cross the cultural barriers have met with varying degrees of success. Organizations intent on building trust and partnership between business and IT face these challenges: IT’s culture and processes. The IT organization’s relationship with the business is IT-centric rather than business centric. Business accountability failure. When the IT function is IT centric, business management does not understand its role or responsibilities in the partnership. Both the business and IT sides are responsible for applying IT effectively throughout the organization. CIOs are not providing the leadership. The CIO Read more

Security Is Job One

 Posted by on Oct 7, 2014  No Responses »
Oct 072014
 

There are very few more pressing issues in management today than cyber security. Notice that I didn’t say IT management; I said management. When the hacking of a major US retailer (Target) leads to the loss of billions of dollars in stock value and sales and the removal of not only the CSO, but the CIO and ultimately the CEO as well, stockholders, investors, and customers take notice. Organizations worldwide depend increasingly on information and communications technology to operate and manage 24/7/365, and wireless devices, BYOD, social media, and the like all combine to make the jobs of those responsible for cyber security exponentially more difficult. Like the Dutch boy and the dike, security people worldwide have Read more

Sep 232014
 

In a recent post, I talked about the value of playing a game about Agile portfolio management. The game showed how, over time, stable Agile teams are more productive than ad hoc teams of even the highest performers. As a result, Agile turns on its head the way many people look at portfolio management: rather than feeding teams to projects, portfolio management should feed projects to teams. This example shows one of the many virtues of serious games, their ability to help us make sense of important principles about the operation of systems. Our brains struggle with systems thinking, so anything that can help us move beyond our cognitive limitations is a good thing. Some Read more

Sep 232014
 

As the Internet of Things (IoT) becomes a reality, the volume of data that will be generated by the multitude of connected devices, machines, and processes — in the consumer, business, and industrial worlds — is expected to be massive. In short, the more devices and machines that get connected, the more data that is going to be generated. Achieving some kind of business value from this massive data reservoir will require the use of big data storage and analysis technologies that can scale to meet the constantly increasing demands placed on organizations. These include: NoSQL file systems NoSQL databases High-performance relational analytic and in-memory database appliances Hybrid relational databases with embedded MapReduce Streaming analytics Read more