In many organizations a mythical creature lays deep down in the catacombs, otherwise known as the server rooms. This dark monster has an obsessive-compulsive disorder. Normally these creatures are in search of gold. However, this kind doesn’t fancy gold, this one hoards applications!
Although Application Portfolio Management (APM) isn’t the newest kid on the block, it has had a tremendous growth in popularity lately. Due to the economic crisis and market pressures in general, IT managers and architects are constantly pushed by their CxO’s to reduce inefficiencies, improve agility of the enterprise and cut costs. The complexity of these tasks leads to an increasing need for tools and structures to help them handle their application landscape. Read more
After a recent presentation on “Security is not an IT problem”, which investigated the lacking relations between policies and measures within many organizations, we decided to have a World Cafe to discuss surrounding topics further. We separated the discussion into four topics, and had a debate on each one. In my previous blog in this series, I wrote about the 7 worst practices in Information Security. In this blog, I will present the outcomes of the discussion on Information Security in the Boardroom. Feel free to share your thoughts with us in the comments section below.
One of our core values at BiZZdesign is sharing knowledge and best practices. That’s why we regularly organize and contribute to online and offline seminars, conferences, and round tables. After a presentation entitled “Security is not an IT problem”, which illustrated the often lacking connection between policies and measures within organizations, we decided to have a World Cafe to discuss a number of topics surrounding this. The last blog post in the series tackled the question of how to communicate about information security. In this blog post, I will present the outcome of a debate on what really works to build information security awareness? Feel free to share your thoughts in the comment section below.
With the release of Enterprise Studio, the BiZZdesign tools have become a lot more powerful in automating and scheduling tasks. For a long time now, the BiZZdesign products have had the ability to run analyses and to automate repetitive tasks. This is done by using our own scripting language, which is specifically adapted to a working with (architecture) models. Read more
There seems to be a lot of hype recently among CxO’s around ‘Going to the cloud’. Since its potential is so widely acknowledged and advertised and its opportunities seem endless, digitization of the organization is the New Normal. But what exactly does this digitization involve? And, more importantly, can we exploit all its potential? Read more
Earlier this month, I wrote the first blog post in a series based on a World Cafe discussion we had around the lacking relations between policies and measures in many organizations. The discussion took place in the form of 4 debate rounds. In the previous blog post, I presented Information Security as a necessity of life. There is no doubt that Information Security is a very important topic for most organizations, but during the debate, many participants were uncertain as to whether, and how to communicate to the rest of the company about it. In this blog post, I will present the conclusions of this discussion.
Everybody is familiar with the SMART abbreviation. It stand for Specific, Measurable, Acceptable, Realistic and Time bounded. But this blog is not about that kind of SMART. In this blog I will discuss how to apply another type of SMART within the context of Enterprise portfolio management.
One of our core values at BiZZdesign is sharing knowledge and best practices. We regularly organize and contribute to online and offline seminars, conferences, and round tables. After a recent presentation entitled “Security is not an IT problem”, which illustrated the often lacking connection between policies and measures within organizations, we decided to have a World Cafe. In this blog post, I will present the findings of one of the debates we had, based around the importance of Information Security. Feel free to check out my last post in this series: From Security Architecture to a Secure Architecture.
Sharing knowledge and good practices is one of our core values at BiZZdesign. We regularly organize and contribute to online and offline seminars, conferences and round table sessions. After one such presentation entitled “Security is not an IT problem”, we organized a World Café to discuss the related topics like security architecture, security controls, and security systems. Please share your good and worst practices by reacting to this blog.
Do you recognize the continuous balancing of urgent vs. important matters? I am often confronted with urgent matters that need to be resolved quickly such as an escalation within a project, deadlines and engaging in interactions through meetings, e-mails, phone calls and a dozen other channels. On the other hand, I am also often confronted with important matters that are not urgent such as developing my professional skills and working on relationships. Sound familiar? I bet it does. It is perfectly normal to prioritize between urgent and important matters and everybody does it. Organizations face many similar challenges of which one is ambidexterity.
If we look at current IT-trends it is clear that everybody has heard of Big Data. Although there are some known successes (for example US retailer Target which through its extensive data could predict pregnancy faster than the person involved) many companies spend millions (or even billions) of dollars hoarding big data, without using it properly. Read more
Our ongoing series of blogs about Agile methods offers an in-depth discussion of the method and its impact on an organization. In this blog, we focus on collaboration in agile teams.
Most people think of Scrum when they talk about collaboration within Agile. Scrum has definitely been a major contributing factor that has led to more effective collaboration. Note that we refer to it as just a contributing factor; Scrum has a strong emphasis on the pragmatic aspects, and less on human factors. In this blog, we aim to highlight the connection between both factors within Agile. Read more
Enterprise Portfolio Management (EPM) is the discipline that supports this allocation of investments to various asset categories of the organization, such as capabilities, applications, or infrastructure. EPM helps to create a healthy set of projects and programs that realize strategic goals.
Enterprise Portfolio Management (EPM) is the discipline that supports the allocation of investments to various asset categories of the organization, such as capabilities, applications, or infrastructure, EPM helps to create a healthy set projects and programs that realizes strategic goals. Read more
Capital allocation, i.e., deciding on investments, is probably the most important responsibility of the top management of any organization. This is no easy matter. Warren Buffett, chairman and CEO of Berkshire Hathaway and probably the most successful investor of the 20th century, described this in his 1987 letter to shareholders: Read more
Imagine you are asked to define business requirements and constraints for a set of business rules as part of the design of a solution. What approach would you use?
As outlined in another blog, architecture-based enterprise portfolio management plays a crucial role in an integrated business transformation approach. Portfolio management is responsible for allocating investments to various asset categories and for creating a healthy project and program portfolio mix that realizes the organizational goals. There should be a balance in, for example, the types of projects (development, research, etc.) and long-term and short-term projects.