...the architectural landscape exponentially. Rather than carve out a defendable territory, Microsoft has demonstrated a compulsion to announce a strategy for each and every new buzzword that comes along. It...…
...happen to manage. Let’s compare how we approach company real space and cyberspace. In real space, we pay attention to color schemes, cubicle height, ergonomics, file storage, and some of...…
...enterprise-level complement to the team-based storytelling in the newsletter. Bob’s last word: As a leader, if you do present something the company has done to make your commitment to culture...…
...keep every piece of information you collect about each component in your architecture current, too. You collect information about each component of your technical architecture. Some of it is constant....…
...use of personal computers and computing was four decades ago. At the time, each personal computer required a separate capital proposal, complete with a financial Return on Investment (ROI) analysis....…
...designs that facilitate spreading the computing load over multiple communicating computers. Client/server applications are easier to distribute, of course, than software monoliths, but it’s certainly as possible (although not yet...…
...Integration. The overall message: providing these exceptional service offerings adds an edge to a company’s customer retention efforts, and since your most likely next sale comes from the customer who...…
...Yankee Group brought one to my attention: Version control. Imagine your company uses a web-services application, and the provider of a key component changes its behavior. The new component runs...…
...a dozen other small ways, the Holiday Companies had made a big difference in the community. Which is why Erickson told the story to a meeting of his top store...…
...of compliance This is actually a grammatical redundancy, but don’t worry about it. It’s like this: Information security is either driven by a business policy that establishes the company’s risk...…