Rewarding Impatience with User Self-Service

Rewarding Impatience with User Self-Service

There seems to be a direct correlation between how successful business professionals are and their level of impatience. While I am not familiar with any studies on this particular subject, it is simple logic that the most productive employees are those who most frequently demand rapid response to service requests. From my past experience managing and providing IT administrative support, I can attest that these individuals are usually the most irritating—constantly requesting access to new applications, data, and other business resources with expectations of an immediate response. Begrudgingly, I must acknowledge that these are the folks who are also most ...

Read More

Business Process Management in the Real World — Why It’s Important to Govern Both Automated and Manual Processes

Business Process Management in the Real World — Why It’s Important to Govern Both Automated and Manual Processes

In a perfect world, all business processes would be automated and all work tasks would be accomplished with the click of a button. This idyllic work experience seems to be the realization of Plato’s utopia…or, if you prefer, the world of the Jetsons. Regrettably, however, we clearly do not live in a perfect world. Put simply, while any repeatable process can be automated, not every process is repeatable, so automation is not a practical solution in all cases. This is particularly a problem for enterprises since business productivity is almost entirely dependent on the rapid and accurate performance of business ...

Read More

Vectra Provides Pervasive Visibility & Analysis to Detect Cyber Attacks

Vectra Provides Pervasive Visibility & Analysis to Detect Cyber Attacks

Though cyber attacks have been around for years, in 2014 there was an explosion in the volume of attacks and a marked increase in the losses and damages they inflicted. In 2015, this does not seem to be lightening up. In February, Anthem health care insurers were compromised, putting 80 million current and former customers and employees at risk, followed in March by Primera Blue Cross, which added another 11 million records of the same. The full extent of these breaches may not be determined for months to over a year. Along with cyber attacks, cyber-hack insurance policy issuance is also climbing. ...

Read More

HP-Systems-in-Cloud-300x190

Competition for who owns the data center and which vendors will dominate the cloud services space is heating up. Over the last several days, major enterprise technology vendors such as Dell, EMC, HP, IBM and Oracle have all made announcements relative to what many consider to be groundbreaking progress in rolling out a new generation...

Read More »



posted by Tracy Corbo   | April 17, 2012 | 0 Comments

key-lock_300x190

One of the items on the research agenda for this year is IPv6. In almost every survey we launch, we have a question about IPv6 to keep a pulse on what is happening in and around the topic. To date while the topic is acknowledged and recognized as something that needs to be addressed, we...

Read More »



posted by Shawn Rogers   | April 16, 2012 | 0 Comments

innershadow_300x190

For years our data management universe has been centered around the enterprise data warehouse (EDW). The EDW has served us well and created a foundation for todays sophisticated analytics. A paradigm shift driven by a maturing user community, new technology, economics and valuable data types is moving us towards a hybrid data ecosystem that strives to match the workload and...

Read More »



Thoma_logo

Even people outside of the technology sector recognize the Cisco brand. Cisco has a very strong global presence that transcends the technology sector. However as one dives deeper into the network technology sector, especially into the networking infrastructure segment the names of these technology vendors may not transcend much beyond the target user group within...

Read More »



posted by Torsten Volk   | April 11, 2012 | 0 Comments

money-burger-300x190

I was sitting in a plane recently, pulling out my iPad to enjoy one of my colleague’s excellent publications. After clicking the Dropbox icon, I noticed that I forgot to bookmark the actual document, so it did not replicate to the iPad. This rather annoying experience made me think about how far we have come...

Read More »



Puzzle_sphere

Does your integration strategy match the speed of your business? Many people would assume that it must but I can assure you in most companies IT struggles to deliver data and applications at the speeds necessary. For years this was the acceptable model, ask for a report and sit back for a month or so...

Read More »



Waughs-Holy-Grail1-300x226

Despite conventional wisdom that assumes an enterprise needs to give ample consideration to how its workers and processes support the overall mission prior to successfully implementing complex solutions, personal devices and social media are radically changing work behaviors and technology adoption – for better or worse. Smartphones and tablets coupled with the rise in the...

Read More »



posted by    | April 4, 2012 | 0 Comments

The-evolution-of-enterprise-architecture-3-300x225

Recently, I was invited to give a talk at Troux Directions on the evolution of enterprise architecture (gulp). I think it went pretty well, judging from comments and some of the tweets. The centerpiece slide was this two-dimensional view: (click on the graphic for a better view) EA is not evolving in just one dimension....

Read More »



posted by    | April 2, 2012 | 0 Comments

blueprints

Attended the Troux Worldwide event last week as an invited speaker. It was a fantastic event, over 300 attendees from all over the world, and the discussions were consistently deep and thoughtful. It felt very much like a homecoming – while I have been working in the trenches of IT portfolio management, ITSM, ITAM, and related...

Read More »



posted by Torsten Volk   | March 28, 2012 | 0 Comments

Pulse

Every March, IBM invites customers and analysts to its annual Pulse user conference. This year, Pulse was all about the more efficient delivery of IT services, a concept that is usually referred to as “cloud”. Since cloud has developed into a term that, due to its overuse, is often frowned upon, to say the least,...

Read More »



Page 17 of 37« First...10«1516171819»2030...Last »