November 09, 2014

How Your Clients Can Use COBIT and BiSL to Manage Their Information
Most of BiSL’s guidance addresses the first point, whereas COBIT is stronger in the second area. Many COBIT practices apply to business information management and contribute to providing assurance that business information management processes are executed effectively. Business information managers who want to use COBIT key practices, to assure themselves and stakeholders that the information systems (in the broadest sense of the word) are under control, can use BiSL to help them decide how to implement the key practices. BiSL does not provide specific guidance as to how to comply with the key practices, but gives an extensive description of the content of the processes.

Agile and SaaS – Lessons for Value Realization
SaaS and Agile combine to enable more nimble project governance. Business leaders are able to steer the project in two-week increments to gain maximum benefit by focusing resources on features that yield immediate value, while deferring “nice-to-have” features for future deployments. As well, business leaders gain the confidence to manage the project in this way, knowing that the Agile approach means that Release 1 will indeed be the first of many value-adding deployments in a multi-release program.

TGF: Impact of the Internet of Things Version 1.0
The latest wave of developments takes interworking still further by incorporating objects of all sorts into the network of IT services, information, organizations and people. This is the Internet of Things (IoT) that provides the potential for e-devices to be commonly built into infrastructure such as roads, vehicles, localities (e.g. smart cities), homes, livestock and even people (e.g. for measuring bodily functions). Many organizations, including governments, are realizing that there are financial, social and other benefits that are emerging though the use of networks of e-devices for the collection of data (e.g. the monitoring of people and their environment for health purposes) or raising alerts (e.g. when river levels rise).

5 Steps to Actionable Key Performance Indicators
A KPI (Key Performance Indicator) should immediately inform the reader how the business is performing which in turn should suggest what actions need to be taken. And if we are measuring the effectiveness of a website, the KPIs need to inform us how the site is doing in driving our business objectives. But most don’t. Too many organizations create Top-10 lists: Top-10 pages, downloads, videos, keywords, referrers, etc. Is it important to know which documents were downloaded the most, or what keywords drove the most traffic to your site?

List of sample KPIs in 5 perspectives of BSC
Here is a general list of key performance indicators which are divided into categories. This list should not be viewed as a must have set of indicators, but it is based on the experiences of many companies and researches related to scorecards. ... t is often reasonable to evaluate not only the efficiency of some production processes and operations at a given moment, but also assess the potential of these indicators, and the opportunities to improve them in order to increase production output and broaden production line.

Agile Enterprise Architecture Increases IT Relevance
Five years ago, Cisco started on an enterprise architecture journey to unify business strategy with IT investments. Today, all of our planning and decision-making is based on an agile, well-defined architecture-based framework.We make it real by ensuring that everything we do in IT is based on business architecture. We understand what our clients are doing and what they need, and then translate that into technology architecture and roadmaps that deliver capabilities to meet their needs. ... Enterprise architecture is a springboard for cultivating consistent communication and transparency between IT and the business. It’s a mechanism for helping our users across Cisco derive strong business value from IT.

Architecturally Significant Requirements
As you progress in your career you will learn that architectural requirements are hard to determine, primarily because they need to be gathered so early in the lifecycle before anything is really known. We know that architects should start early in project lifecycles based on when an architect engages in a project, with the end goal being integration into the innovation and project funding lifecycle itself. Hopefully, your organization has learned that getting an architect engaged before the project kickoff will not only save you money but is at the root of incremental innovation. Either way at some point the solution architect will be faced with a business case and business architecture

KeyStone Security and Architecture Review
This presentation will cover architectural and procedural security concepts within KeyStone, specifically Trusts or Delgations, AMQP Security with KeyStone and integration with a Corporate LDAP for single source of truth. Given the distributed nature of OpenStack KeyStone plays a major role in binding all of the Projects together but not much is mentioned about how to do this with KeyStone or what the pitfalls and dangers of hooking up a centralized Security System to the rest of the cloud will be. Not only do you have to be wary of the services that connect to KeyStone but you also have to be cautious of the kinds of input and data you give to KeyStone from external sources.

Testing the Internet of Things: The Human Experience
“Human Experience” testing has the following components of human interaction with the device. We should test all things physical, including sizes, shapes and genders of the users. We should also include sensory reactions including sight, sound, and touch. Orientation or the interaction with human movement is an incredible crucial part of the test. We must plan for testing in various geographical locations, different weather conditions and contexts. Finally we must consider value and most thoroughly test in terms of the users’ perceptions, mindsets, biases and emotions when interacting with the device.

Agency TheoryAgency theory assumes that the interests of owners and managers are inherently in conflict and that defensive activities are necessary by owners to protect these interests. Stewardship theory points out that these assumptions aren't always true. A series of theoretical propositions concerning the stewardship model were made by Davis, Schoorman and Donaldson. Their ideas, in conjunction with ideas on best practices in IT governance from Weill and Ross  provide an explanation for variance in the effectiveness of a varietv of governance models. Application of the stewardship model results in several novel approaches to IT governance and technology management, especially with regard to post implementation value delivery

Quote for the day:

"If the rate of change on the outside exceeds the rate of change on the inside, the end is near." -- Jack Welch

No comments:

Post a Comment