IT is experiencing a massive change with the growth of subscription services which can be easily purchased by anyone with a credit card. This creates major challenges for the management of these services including: How do you know what services people are using? How do you know what is redundant or incorrectly sized? Are we…
A whole industry has been built on IT transformation with companies taking aging IT estates and migrating onto hardware which is easier to maintain and run or moving from one suite of software to another. Now with cloud migration and digital transformation this industry has been supercharged. It sounds simple, but companies which do this…
Get 90 Days Free Access to Assess and Tune ‘Work Anywhere’ Capabilities Widespread working from home raises a lot of issues. At the very least, organizations will need to consider their technology stacks, technology provision, culture, and working practices. However, many organizations have found that the present crisis has thrust them into something of an…
How to Improve Your Employee Experience During Remote Work With employees having sometimes just hours of warning, there was little time to plan for widespread working from home. Improvisation was the order of the day. However, improvisation has its limits. Widespread and ongoing working from home raises a lot of challenges and at the very…
In nearly all organizations, there is usually an opportunity for rationalizing software assets to drive savings. There will undoubtedly be opportunities to eliminate unused or underutilized software and remove unnecessary duplication and overlap. Why buy new software licenses if what is required is lying unused elsewhere in the organizations’ IT estate? But in fact, the…
Specialist high-end software is expensive—and yet, your organization’s skilled specialists often can’t work without it. Look closely in many organizations and high-value applications like Computer-Aided Design software, niche engineering applications, high-end data science tools such as SPSS or SAS, and finance and accounting tools aren’t difficult to discover. But how intensively are they being used?…
So, it’s the day of your new website rollout, you’ve got great content and everybody who has reviewed it is hyped. This is the game changer that you’ve been looking for. Then somebody asks the question “How do we know if it’s successful?” Everyone looks at each other realizing that there’s no way of knowing…
Two major sporting events took place last weekend – Super Bowl LIII (Patriots vs. Rams) and the 6 Nations Rugby (specifically Ireland vs. England). Several thoughts came to mind when watching them, but for me as a CEO, the most important was that if you have the right strategy, complete focus to deliver, and the…
The IT world lives in a constant state of change, a battle of wills between the people running IT and their internal customers. The latest battleground is Shadow IT in which anybody with just a credit card can purchase a new service, completely bypassing the IT department, procurement and all the carefully set up processes…
We are all very familiar with software agents. Many enterprise software tools have their own need for one that is generally unique to their application. These agents are useful as they tend to act on the environment and run without continuous supervision, while transmitting data or performing some function essential to the system it resides…
Data is everywhere. Data is used to back up assumptions presented as facts. We look to data to create information that we base business, personal and community decisions on. Not only are the absolutes of the numbers important, but how they were obtained, how they are analyzed, and what assumptions are made are critical to…
IT security is a complex and very broad topic that requires multiple elements of an organization working well together. At the systems level you must consider business, information, data and solution architectures. Next there are all the process designs that overlay these systems. Therefore just being able to collect, patch and provide device vulnerability data…