January 18, 2013

Business architecture takes the fore in application portfolio analysis
Experts say that a shift to business-focused application portfolio management is currently under way. As part of that shift, business architecture is taking the forefront in application portfolio analysis. Such business architecture techniques as activity and business process models are used to align the strategic objectives and tactical demands of the enterprise.


Building and Sustaining a Continuous Improvement Program
Regardless of technique or methodology, many companies have not identified specific strategies to accomplish their Continuous Improvement goals. In this article from the Shared Services & Outsourcing Network, learn the six steps to success for Continuous Improvement


4 Tests to determine if you are following Agile development
The answer to the following questions is no longer an outright no: Can agile process scale to a large team size?; Can distributed project team claim to be using agile development?; Can off-shored projects work on agile mode?; and Can agile development co-exist with CMMi? Obviously, to be able to answer “yes” to these question we would need to come up with a process which is different from what you would have followed for a ”small”, “co-located” and “cross-functional” team.


C++ Templates: Not a General Case of Generics
Templates have been part of C++ since its creation. The first C++ compilers performed a translation into plain old C code before starting compilation. Consequently, so did C++ generic logic. Today, C++ compilers skip C in their way to object code, but generic logic is still resolved before compilation.


The Business Analyst Role in Agile Software Development
As companies transition to Agile and Scrum to manage their software development projects, how does this affect the work of business analysts? Nancy Nee, VP Global Product Strategy at ESI International, shares her opinion on the role of business analysts in Agile software development projects and how this approach impacts the requirement gathering activity. She also provides some input on how to handle conflict between stakeholders.


SSDs vs. hard drives vs. hybrids: Which storage tech is right for you?
In times past, choosing the best PC storage option required merely selecting the highest-capacity hard drive one could afford. If only life were still so simple! The fairly recent rise of solid-state drives and hybrid drives (which mix standard hard drives with solid-state memory) have significantly altered the storage landscape, creating a cornucopia of confusing options for the everyday consumer.


2013 Challenges for Developers, Part II: Demand for Multiple Language Skills
By this time last year, the term "polyglot programmer" had entered the IT lexicon, and there was plenty of talk about the strategic advantage of learning to use a wider variety of programming languages, frameworks, databases, interface technologies and other development tools. Last year's strategic advantage may be evolving into this year's survival strategy.


Cloud Computing Users Are Losing Data, Symantec Finds
Cloud computing is a ticket to losing data for two in five companies, a new study finds. "It's really kind of astounding," said Dave Elliott, a cloud marketing manager at storage and security company Symantec (SYMC). The company polled more than 3,200 organizations to gauge hidden costs of the cloud and ways to mitigate problems. "Forty-three percent of respondents have lost data in the cloud and have had to recover from backups," Elliott said.


Global tech giants unite to recruit professionals who can Make IT in Ireland
A number of major tech companies with a base in Ireland have come together to promote Ireland’s booming technology sector and the career opportunities therein through a new website and social media campaign. Despite the country’s economic woes, the tech sector has seen unprecedented growth in recent years, employing 74,000 people directly and some 200,000 people indirectly. This has brought with it increased demand for professionals with skills in tech, business and languages


Cloud security key to BYOD, (ISC)2 study shows
Businesses welcome bring your own device (BYOD) policies for the operational cost savings and user experience, according to the (ISC)2 2013 Global Information Security Workforce Study. At the same time, the study – conducted on behalf of the (ISC)2 Foundation by the analyst firm Frost & Sullivan – shows that information security managers admit companies must do more to understand the security of the technologies behind the trend, particularly cloud-based systems and applications.



Quote for the day:

"It is a simple thing to make things complex, but a complex thing to make things simple" -- Albert Einsteen

No comments:

Post a Comment