Last year was clearly the year of Sarbanes-Oxley within IT. This year, Sarbanes-Oxley has moved from most important on the IT agenda to the biggest pain for IT professionals, moving the attention from creativity to bureaucracy.
The future of your business depends on the security of its IT Assets. This overview will help you identify the FISH (facilities, information, software, hardware) in your organization and help you understand how best to protect those assets in case of natural disasters or pernicious intrusion.
Do C-level executives make arbitrary decisions to kill PMOs? Alarming as this idea may seem, many organizations nowadays are building up a track record in terminating the services of their PMOs right after kicking the tires.
The principles and practices of Scrumban can go beyond helping teams improve performance. Here are four levels that Scrumban can be employed, from teams and departments to programs and portfolios. This understanding can be a starting point for its adoption across the entire organization.
Remote team members are potentially at more risk for technology traps and security breaches. For a group that operates in a variety of locations and with greater opportunities for intrusion, an IT infrastructure needs to have a firm policy in how to deal with the changing security landscape.
Security foundations for a project should be strongly laid in the initiation phase, preferably when the project charter is created and signed to document all possible risks, threat vectors and security loopholes, and should include conceivable remediation measures. Internal, external and technology-related risk are examined in alignment with project management processes.
Do PMOs have value? Arguably, yes. At least...sometimes. According to the results of recent research, the presence of a PMO was often a contributor to the attainment of organizational value. What was of particular concern, however, was the actual role of the PMO within the organization. Two broad types emerged within the research; find out what they are inside...
This author is appalled. If so many tools out there can help organizations adopt a sense-and-respond mechanism that effectively helps them reach profit goals, why are so few companies investing in the capabilities that are available?
Surrogate keys are the way to go more than 90 percent of the time in data warehouses. However, that 10 percent of the time may kill you, especially if you are dealing with a heavily utilized attribute that is the natural primary key of a dimension which is very large.
"Human beings, who are almost unique in having the ability to learn from the experience of others, are also remarkable for their apparent disinclination to do so."