...the more central coordination is required. It isn’t just priorities. Agile’s usual dynamic, iterative figuring out how things should work also has a ripple effect in initiative and program-scale change....…
Gartner has finally achieved perfection. Not content to rest on its laurels, it has supplemented its thoroughly meaningless Total Cost of Ownership (TCO) calculation for personal computers with a perfectly...…
...week’s column differentiating policies and procedures I neglected to credit IS Survivalist Harry Kriz for the suggestion. Thanks, Harry. Sadly, I can’t give attribution to the friend and colleague who...…
...its “production prototype” is up and running again; and a department that gets different answers to the same question depending on which database it queries never knows the right answer....…
...a problem, someone must be at fault. The not-holding-people-accountable explanation is, as a result, doubly satisfying, since it lets us blame one person for the problem itself and a second...…
...data breach, which was due to Shadow IT. It wasn’t? Sorry. Bad memory. In case you’re unfamiliar with the term, “Shadow IT” is Professional IT’s term for unsanctioned do-it-yourself IT...…
...relationship sufficient. You have to have the right kind of relationship — one you’ve designed. But how do you do that? Last week I introduced a technique for starting the...…
.../ Decide / Act) is an example. Some outputs of its Act sub-function are inputs to its Observe sub-function, and in fact each sub-function’s outputs include inputs to the next...…
...distinction between OS and application. That’s my solution. Even if you don’t like it, at least it’s different from the same old stuff. If, on the other hand, you do...…
...is how you can make sure you get early warnings about problems while they’re still solvable. Don’t rely solely on your chain of command. Develop direct relationships with your experts,...…