At the annual Consumer Electronics Show (CES), attention turned once again to the Internet of Things (IoT) and personal devices. Wearables showed up in great profusion, focused upon watches, wristbands, and other personal sensors used to monitor activity rate, pulse, temperature, and whatever else can be determined from movement or simple surface sensors. For the home, measuring and control devices are emerging for temperature, humidity, intruder detection, and so forth — all attached, to personal networks, to the Web, and generally streaming data to external monitors. This all constitutes an escalation of device communications, which ultimately can lead to something like gamification of personal life and the home (Figure 1). Figure 1 — The gamification Read more
Posts Tagged 'cutter edge'
“Commodity” is a bad word among technologists. It implies standardized, unchanging, noninnovative, boring, and cheap. Commodities are misunderstood. This post seeks to dispel some of the myths around the commoditization of IT services (i.e., the cloud). 1. Infrastructure as a Service (IaaS) Is Not a Commodity Like Oil Yes, according to the technical definition of “commodity,” IaaS is not one. But then nor is oil, or gas, or coal, or pork bellies. None of these so-called commodities is perfectly fungible (i.e., so close to identical that a buyer is indifferent as to what is delivered), and being fungible is a prerequisite for any true commodity. When we refer to oil as a commodity, for instance, Read more
Several of today’s technology developments affect the market for mobile technology and the ways end-user organizations implement collaboration solutions. These include the rise of cloud-based platforms, the mobile collaboration mechanisms increasingly built into enterprise applications, and the integration of mobile capabilities with enterprise social networks. On-Premise vs. Cloud Solutions Enterprise mobile collaboration solutions are available as software for deployment on premise as well as in the form of cloud-based platforms from a number of providers, including Cisco, IBM, Microsoft (Yammer), SAP, Avaya, Box, Aastra, NEC, ShoreTel, Alcatel-Lucent, and AT&T. Like every other category of enterprise solutions, the cloud is having a profound effect on how organizations implement mobile technology in general. Over the next 12-18 Read more
Describing the end state of a successful Scrum rollout can be very exciting for beginning teams. It can also seem a little daunting, particularly after that first sprint, in which the team could feel some of its potential but wasn’t yet able to reach it. I find this can be especially true for teams adopting Scrum in a larger environment that’s not yet an ideal environment for Scrum. Perhaps the whole team cannot dedicate itself full time to the Scrum project yet, or the product owner is still transitioning out of previous product management responsibilities to other parts of the organization. As much as we would like our beginning Scrum teams to have every advantage, Read more
In November 2012, the US Air Force finally decided to cancel its Expeditionary Combat Support System (ECSS) modernization project after spending US $1 billion on it. ECSS was intended to replace more than 240 outdated Air Force logistics computer systems, some over 40 years old, with a single, integrated system. The Air Force deemed the effort critical to the successful modernization of its antiquated and operationally costly logistics infrastructure. However, in April 2012 the Air Force’s comptroller told the US Senate Armed Services Committee, “We’re now approaching seven years since funds were first expended on this system…. I’m personally appalled at the limited capabilities that project has produced relative to that amount of investment.” The Air Read more
Former Yankee baseball player Yogi Berra, known for his insightful malapropisms, once said, “In theory there is no difference between theory and practice. In practice there is.” This would be an apt description of the current state of enterprise risk management (ERM). In theory, ERM is useful in addressing the question, “What is the best use of corporate resources to create or protect the most value for the enterprise?” Yet in practice — except for a few exceptions like that of the successful avionics firm Rockwell Collins — it has fallen woefully short of meeting this objective. Over the past decade-plus, organizations have found ERM extremely difficult and costly to implement, with many early ERM adopters Read more
Contrary to popular belief, the term “information architecture” is not synonymous with designing and structuring websites or developing an Internet-based information base. The phrase was first introduced in 1975 by Richard Saul Wurman, who is probably best known for founding TED Conferences and TEDTalks. When he introduced this concept, Wurman was thinking of information in a broad sense. He was one of the first to recognize that modern technologies were likely to produce “a stream of bytes that leaves us inundated with data but starved for the tools & patterns that give them meaning. In reality there has not been an information explosion, but rather an explosion of noninformation, or data that simply doesn’t inform” (Information Read more