...would otherwise be. Information security should be, that is, a collection of deliberately chosen trade-offs between risk and cost on one side and effectiveness on the other. It’s how information...…
...successful in providing technology leadership: Awareness: If you don’t know it exists you can’t recommend it. Relationships. If they don’t know and trust you, they won’t be open to your...…
...ever-receding and shrinking Vista, there’s an opening in the marketplace through which you could drive a large truck, if you happened to own one and had any interest in, for...…
...biggest challenge is figuring out how to spend your work day, because your organization will pretty much run itself without needing much of your time and attention. With the wrong...…
...Every member has to understand the difference between the council they’re invited to join and what’s expected of them in convening it. And they have to commit to it. So...…
...useful. With the mainframe in the middle you’d divide work into three categories: Data preparation, where people and feeder systems massage data into processable formats; The Work, which is what...…
...competitors so we’ll be the ones to win your business. That’s “win” as in “choose us instead of anyone else you might be considering within the domain of what we...…
...— how IT should price its services and charge its internal customers. Chargebacks. For ITaaS to work your service catalog will have to be a catalog: It will need prices....…
...going to be different. Tiresome as it sounds, it’s the old Vision*]}*-and-Mission thing — the bumper sticker summary. It’s a redefinition of IT’s brand: An easily-remembered touchstone for everything you’re...…
...to Ireland. (If you’re interested, read How the Irish Saved Civilization by Thomas Cahill. It’s a wonderful read, and you’ll gain important insights into Western history.) IT and marketing departments...…