IT management

Email Alerts

Register now to receive ComputerWeekly.com IT-related news, guides and more, delivered to your inbox.
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
  • IT Project Management: Guide to estimating timescales and resources.

    This book extract explains how to estimate the timescales and effort required for IT projects.

  • Another CIO leaves Royal Bank of Scotland

    Scott Marcar, CIO of Royal Bank of Scotland’s Markets division, quit this week, according to sources

  • How to be influential online

    Communicating persuasively may be a tricky art to perfect, but when it’s done properly, the pay-off can be huge, which is why marketing campaigns continue to siphon off huge amounts of corporate money every year. If you want your message to reach and influence your target audience there is one golden rule you must follow: tailor your communication style to the medium you’re using.

  • The Cloud Risk Framework

    Companies that are considering moving to a cloud computing model need effective metrics and analytics to help guide their decisions. This cloud framework is designed to help assess the financial risks of moving to the cloud. This paper is aimed at private or public entities with more than 500 employees, and considers risk from their perspective

  • The DNA of the CIO

    The DNA of the CIO provides fresh insight into what it is to be a Chief Information Officer (CIO) today. For many years, CIOs have been talking about becoming a true partner to the business and the executive management team. ut, as Ernsy & Young's report, The DNA of the CIO highlights, relatively few have broken out of their comfort zones to actually become one.

  • The next wave of digitisation: setting your direction, building your capabilities

    Technology, internet and telecommunications industries are undergoing a fundamental change towards near-complete digitisation, with redefinition of existing business models and value creation systems. This Booz & Company study estimates that by as early as 2015, IT and communications will account for 30-40% of companies' investment budgets, and the ongoing digitisation of every industry will affect global economic value by between $12trn and $15trn in 2020, including market share shifts, cost improve­ments, price decreases and new value pools.

  • The Open Group Service Integration Maturity Model (OSIMM) Version 2

    Service Oriented Architecture (SOA) is an architectural style that supports service orientation. A service is a business task with an externalized service description that often represents a contract between a provider and a consumer. As organizations adopt SOA and the use of services as the fundamental structuring element of their architecture, they increasingly encounter the need to assess where they are in their migration path and how best to achieve the expected benefit derived from integrating and investing in greater levels of SOA maturity.

  • TOGAF® and SABSA® Integration

    This paper from the Open Group, documents an approach to enhance the TOGAF enterprise architecture methodology with the SABSA security architecture approach to create one holistic architecture methodology.

  • Citrix SaaS revenue rises 12% while overall revenue grows 7% YoY

    Citrix has reported a 7% revenue increase in its second quarter of fiscal year 2014 . But it reported double-digit revenue growth in SaaS

  • CIO interview: Rorie Devine, CTO, Hailo

    A technology overhaul is taking place behind the scenes at cab-hailing smartphone app Hailo as the company extends its international reach

  • VIEW MORE ON : Strategy
  • Technology value matrix: Human Resources solutions

    Most small and medium businesses (SMBs) and all large enterprises employ human resources (HR) functionality to manage their employees. Even though many vendors offer HR solutions, these solutions may require integration with other HR software or with enterprise resource planning (ERP) to cover the functionality companies need. Some vendors differentiate themselves from their competitors by providing HR solutions built on new technologies, often times delivered in the cloud, and which can also be accessed on mobile devices.

  • The Open Group: Cloud buyers’ requirements questionnaire

    This White Paper describes a questionnaire that will help you identify your requirements for Cloud computing in a structured way, so that you can more easily reach the best solution. It contains questions about your enterprise – not about the products and services that you might be considering. It is put forward for discussion, with the intention that this discussion, and validation in the field, will result in a practical tool for use by enterprises.

  • Open Information Security Management Maturity Model (O-ISM3)

    Organizations in different business sectors and countries have different business requirements and risk tolerances. The O-ISM3 framework helps information Security Managers to evaluate their own operating environment and to plan their security management processes so they are consistent with and cost-effective for their organization’s business objectives.

  • The Open Group Architecture Framework (TOGAF™ 9) and the US DoD

    This White Paper provides a comparative analysis of the two frameworks that describes where DoDAF products can be employed throughout the TOGAF ADM phases to develop a visual, integrated model of an architecture. The intended audience is the DoD architect who can benefit from a formal methodology to guide architecture efforts and result in a quality architecture description in a DoD-compliant format, and the TOGAF architect who can benefit by a formal set of defined models to capture output for each of the ADM phases. This document provides the architect with a map of the specific DoDAF 2.0 model that should be produced or consumed in a specific phase of TOGAF 9 with enough context to understand the fundamental concepts of both DoDAF and TOGAF.

  • Governance in IT and Architecture - TOGAF

    The primary audiences for this Paper are business and IT managers who are responsible for the performance of operations. However, enterprise architects also play a key role in supporting IT governance, including architecture governance. Governance is defined as giving direction to activities. In this Paper, the authors focus on governance of the IT domain and its alignment to business. Governance is viewed as a mechanism that influences the internal logic and decision-making of organizations. The internal logic is defined as a compromise between practically conflicting parameters. The mechanism that has to deal with these conflicting parameters consists of decision domains, governance structure, social processes between individuals and groups, and controls to ensure the proper functioning of IT governance. In the context of IT governance, enterprise architecture can be considered as a means for coordination of decision-making related to IT and business. Furthermore, it is recognized that enterprise architecture in its own right also needs to be governed.

  • IT Specialist Certification (ITSC) accreditation requirements

    The Open Group IT Specialist Certification Program (the Program) is designed to validate the existence of those qualities and skills in a professional that enable the effective development, implementation, and operation of IT solutions. The Program is skills and experience-based and goes beyond validating the mastery of any specific knowledge base. The Program includes a framework for accreditation of third parties to establish IT Specialist certification programs affiliated to The Open Group. The framework of accreditation and certification is specifically intended to standardize the process and criteria for IT Specialist professional certification and establish a foundation for the required skills and experience necessary to achieve such a distinction. The Program has been designed to be flexible and extensible so that the framework may be adopted by any industry, country, or organization.

  • Business Secretary calls for TSB’s funding to be doubled

    Business Secretary Vince Cable has urged the government to double the Technology Strategy Board’s (TSB) funding

  • System for seven-day bank account switching underused

    The IT system that underpins government’s regulation of seven-day bank account switching is being underused

  • CWwomen: Marketing to women – Pretty Little Head

    In this video from Computer Weekly’s Women in IT event, Jane Cunningham talks about marketing to women, the current skills crisis in the technology industry, and recruiting skills for a more diverse based into enterprises.

  • NAO criticises GDS IT savings method

    The National Audit Office (NAO) has criticised the Government Digital Service over its approach to calculating public IT savings

  • VIEW MORE ON : Governance
  • IT Project Management: Guide to estimating timescales and resources.

    This book extract explains how to estimate the timescales and effort required for IT projects.

  • How to be influential online

    Communicating persuasively may be a tricky art to perfect, but when it’s done properly, the pay-off can be huge, which is why marketing campaigns continue to siphon off huge amounts of corporate money every year. If you want your message to reach and influence your target audience there is one golden rule you must follow: tailor your communication style to the medium you’re using.

  • How to embed innovation in the corporate culture

    Innovation often features high on CIOs’ agendas because it is recognized as being an important means by which information systems and technology can contribute positively to the evolution and performance of the business. However, in practice the execution often falls short of the ambition. Reasons for this range from the mundane, such as there being insufficient time or capacity to devote to it, to the more fundamental, such as organizational or cultural barriers, or insufficiently defined processes and governance for capturing ideas and seeing them through to fruition.

  • How to improve your communication with your boss

    Effective communication between boss and subordinate is essential. If you and your boss are not communicating effectively, you will be wasting a lot of time attempting to deliver what you ‘think’ your boss wants, inevitably to find our assumptions are fundamentally flawed.

  • Stories That Move Mountains: Improve your presentation skills

    Anyone who has a business role to play in influencing others, needs to make their presentation stand out from the crowd and this extract from Stories That Move Mountains, published by Wiley, promises to help the reader do just that. Authored by three enterprise experts at Microsoft, Stories That Move Mountains, explains to readers how to use a process called CAST (Content, Audience, Story and Tell) to create effective stories and visualisations - known as ‘Story Mapping’ – and deliver persuasive presentations.

  • The DNA of the CIO

    The DNA of the CIO provides fresh insight into what it is to be a Chief Information Officer (CIO) today. For many years, CIOs have been talking about becoming a true partner to the business and the executive management team. ut, as Ernsy & Young's report, The DNA of the CIO highlights, relatively few have broken out of their comfort zones to actually become one.

  • The Mindset of the Chief Information Officer

    This study evaluates the leadership role that Chief Information Officers performs in helping their organisations achieve their commercial goals. It examines the skills and behaviours that contribute to their success and considers the relationships the CIO has with the CEO, the executive team and other influential stakeholders. This study, which draws on interviews with leading CIOs, provides senior IT executives with insights to help them reflect on their leadership roles and to consider areas for their own professional development.

  • CIO interview: Rorie Devine, CTO, Hailo

    A technology overhaul is taking place behind the scenes at cab-hailing smartphone app Hailo as the company extends its international reach

  • The Open Group: Cloud buyers’ requirements questionnaire

    This White Paper describes a questionnaire that will help you identify your requirements for Cloud computing in a structured way, so that you can more easily reach the best solution. It contains questions about your enterprise – not about the products and services that you might be considering. It is put forward for discussion, with the intention that this discussion, and validation in the field, will result in a practical tool for use by enterprises.

  • Open Information Security Management Maturity Model (O-ISM3)

    Organizations in different business sectors and countries have different business requirements and risk tolerances. The O-ISM3 framework helps information Security Managers to evaluate their own operating environment and to plan their security management processes so they are consistent with and cost-effective for their organization’s business objectives.

  • VIEW MORE ON : IT leadership & CW500
  • IT Project Management: Guide to estimating timescales and resources.

    This book extract explains how to estimate the timescales and effort required for IT projects.

  • Another CIO leaves Royal Bank of Scotland

    Scott Marcar, CIO of Royal Bank of Scotland’s Markets division, quit this week, according to sources

  • Stories That Move Mountains: Improve your presentation skills

    Anyone who has a business role to play in influencing others, needs to make their presentation stand out from the crowd and this extract from Stories That Move Mountains, published by Wiley, promises to help the reader do just that. Authored by three enterprise experts at Microsoft, Stories That Move Mountains, explains to readers how to use a process called CAST (Content, Audience, Story and Tell) to create effective stories and visualisations - known as ‘Story Mapping’ – and deliver persuasive presentations.

  • TfL wastes millions on telecoms, says IIPAG watchdog

    Watchdog IIPAG criticises Transport for London (TfL) for its inefficient and fragmented telecoms contracts

  • Isles of Scilly tap into seabed fibre cables to get superfast broadband

    Superfast Cornwall initiative resorts to novel method to bring fibre broadband to offshore islands

  • The Open Group: Cloud buyers’ requirements questionnaire

    This White Paper describes a questionnaire that will help you identify your requirements for Cloud computing in a structured way, so that you can more easily reach the best solution. It contains questions about your enterprise – not about the products and services that you might be considering. It is put forward for discussion, with the intention that this discussion, and validation in the field, will result in a practical tool for use by enterprises.

  • Open Information Security Management Maturity Model (O-ISM3)

    Organizations in different business sectors and countries have different business requirements and risk tolerances. The O-ISM3 framework helps information Security Managers to evaluate their own operating environment and to plan their security management processes so they are consistent with and cost-effective for their organization’s business objectives.

  • The Open Group Architecture Framework (TOGAF™ 9) and the US DoD

    This White Paper provides a comparative analysis of the two frameworks that describes where DoDAF products can be employed throughout the TOGAF ADM phases to develop a visual, integrated model of an architecture. The intended audience is the DoD architect who can benefit from a formal methodology to guide architecture efforts and result in a quality architecture description in a DoD-compliant format, and the TOGAF architect who can benefit by a formal set of defined models to capture output for each of the ADM phases. This document provides the architect with a map of the specific DoDAF 2.0 model that should be produced or consumed in a specific phase of TOGAF 9 with enough context to understand the fundamental concepts of both DoDAF and TOGAF.

  • Governance in IT and Architecture - TOGAF

    The primary audiences for this Paper are business and IT managers who are responsible for the performance of operations. However, enterprise architects also play a key role in supporting IT governance, including architecture governance. Governance is defined as giving direction to activities. In this Paper, the authors focus on governance of the IT domain and its alignment to business. Governance is viewed as a mechanism that influences the internal logic and decision-making of organizations. The internal logic is defined as a compromise between practically conflicting parameters. The mechanism that has to deal with these conflicting parameters consists of decision domains, governance structure, social processes between individuals and groups, and controls to ensure the proper functioning of IT governance. In the context of IT governance, enterprise architecture can be considered as a means for coordination of decision-making related to IT and business. Furthermore, it is recognized that enterprise architecture in its own right also needs to be governed.

  • IT Specialist Certification (ITSC) accreditation requirements

    The Open Group IT Specialist Certification Program (the Program) is designed to validate the existence of those qualities and skills in a professional that enable the effective development, implementation, and operation of IT solutions. The Program is skills and experience-based and goes beyond validating the mastery of any specific knowledge base. The Program includes a framework for accreditation of third parties to establish IT Specialist certification programs affiliated to The Open Group. The framework of accreditation and certification is specifically intended to standardize the process and criteria for IT Specialist professional certification and establish a foundation for the required skills and experience necessary to achieve such a distinction. The Program has been designed to be flexible and extensible so that the framework may be adopted by any industry, country, or organization.

  • VIEW MORE ON : Project management
  • G-Cloud supplier blames lack of stability for poor government spend

    G-Cloud supplier Databarracks calls for more stability and continuity, warning that lack of guidance and clarity is putting off local government

  • How to improve your communication with your boss

    Effective communication between boss and subordinate is essential. If you and your boss are not communicating effectively, you will be wasting a lot of time attempting to deliver what you ‘think’ your boss wants, inevitably to find our assumptions are fundamentally flawed.

  • Stories That Move Mountains: Improve your presentation skills

    Anyone who has a business role to play in influencing others, needs to make their presentation stand out from the crowd and this extract from Stories That Move Mountains, published by Wiley, promises to help the reader do just that. Authored by three enterprise experts at Microsoft, Stories That Move Mountains, explains to readers how to use a process called CAST (Content, Audience, Story and Tell) to create effective stories and visualisations - known as ‘Story Mapping’ – and deliver persuasive presentations.

  • The Open Group: Cloud buyers’ requirements questionnaire

    This White Paper describes a questionnaire that will help you identify your requirements for Cloud computing in a structured way, so that you can more easily reach the best solution. It contains questions about your enterprise – not about the products and services that you might be considering. It is put forward for discussion, with the intention that this discussion, and validation in the field, will result in a practical tool for use by enterprises.

  • Open Information Security Management Maturity Model (O-ISM3)

    Organizations in different business sectors and countries have different business requirements and risk tolerances. The O-ISM3 framework helps information Security Managers to evaluate their own operating environment and to plan their security management processes so they are consistent with and cost-effective for their organization’s business objectives.

  • The Open Group Architecture Framework (TOGAF™ 9) and the US DoD

    This White Paper provides a comparative analysis of the two frameworks that describes where DoDAF products can be employed throughout the TOGAF ADM phases to develop a visual, integrated model of an architecture. The intended audience is the DoD architect who can benefit from a formal methodology to guide architecture efforts and result in a quality architecture description in a DoD-compliant format, and the TOGAF architect who can benefit by a formal set of defined models to capture output for each of the ADM phases. This document provides the architect with a map of the specific DoDAF 2.0 model that should be produced or consumed in a specific phase of TOGAF 9 with enough context to understand the fundamental concepts of both DoDAF and TOGAF.

  • Governance in IT and Architecture - TOGAF

    The primary audiences for this Paper are business and IT managers who are responsible for the performance of operations. However, enterprise architects also play a key role in supporting IT governance, including architecture governance. Governance is defined as giving direction to activities. In this Paper, the authors focus on governance of the IT domain and its alignment to business. Governance is viewed as a mechanism that influences the internal logic and decision-making of organizations. The internal logic is defined as a compromise between practically conflicting parameters. The mechanism that has to deal with these conflicting parameters consists of decision domains, governance structure, social processes between individuals and groups, and controls to ensure the proper functioning of IT governance. In the context of IT governance, enterprise architecture can be considered as a means for coordination of decision-making related to IT and business. Furthermore, it is recognized that enterprise architecture in its own right also needs to be governed.

  • IT Specialist Certification (ITSC) accreditation requirements

    The Open Group IT Specialist Certification Program (the Program) is designed to validate the existence of those qualities and skills in a professional that enable the effective development, implementation, and operation of IT solutions. The Program is skills and experience-based and goes beyond validating the mastery of any specific knowledge base. The Program includes a framework for accreditation of third parties to establish IT Specialist certification programs affiliated to The Open Group. The framework of accreditation and certification is specifically intended to standardize the process and criteria for IT Specialist professional certification and establish a foundation for the required skills and experience necessary to achieve such a distinction. The Program has been designed to be flexible and extensible so that the framework may be adopted by any industry, country, or organization.

  • Supporting requirements management in TOGAF

    Requirements management is an important activity in the process of designing and managing enterprise architectures. Requirements from various stakeholders form the basis for any change to an organization and its architecture. The quality of these requirements, the extent to which they are realized, and the ease with which they can be changed, determine the quality of any enterprise architecture. Nonetheless, many enterprise architecture modeling techniques focus on what the enterprise should do by representing “as-is” and “to-be” architectures in terms of informational, behavioral, and structural models at the different architectural layers (e.g., business, application, and technical infrastructure). Little or no attention is paid to represent (explicitly) the reasons; i.e., the why, behind the to-be architectures in terms of motivations, rationale, goals, and requirements.

  • UK government confirms ODF as standard document format, rejecting Microsoft proposals

    The government has confirmed plans to standardise document formats and has resisted Microsoft lobbying by rejecting its preferred standard

  • VIEW MORE ON : Supplier management
  • CW Buyer’s Guide: Virtual desktops in the enterprise

    In this Computer Weekly buyer’s guide to virtual desktops, we investigate the latency and bandwidth issues that arise with thin client access, take a look at cloud economics in the datacentre, review Citrix’s XenDesktop 5 desktop virtualisation application, and see how virtualisation and business process optimisation work at the Co-operative

  • The Banking Industry Architecture Network and TOGAF

    Financial institutions are facing significant changes of the environment in which they operate. For example, the financial crisis, changing customer behavior, increased risk awareness, focus on cost reduction, and the entrance of new financial players in the market-place have structurally changed the financial industry. Not only the operations, but also the supporting IT required a challenging transformational change. Given the close inter-dependency of operations and IT in financial institutions, a carefully planned and guided integrated approach to change is required. Enterprise architecture is key to enabling such change initiatives.

  • The next wave of digitisation: setting your direction, building your capabilities

    Technology, internet and telecommunications industries are undergoing a fundamental change towards near-complete digitisation, with redefinition of existing business models and value creation systems. This Booz & Company study estimates that by as early as 2015, IT and communications will account for 30-40% of companies' investment budgets, and the ongoing digitisation of every industry will affect global economic value by between $12trn and $15trn in 2020, including market share shifts, cost improve­ments, price decreases and new value pools.

  • The Open Group Service Integration Maturity Model (OSIMM) Version 2

    Service Oriented Architecture (SOA) is an architectural style that supports service orientation. A service is a business task with an externalized service description that often represents a contract between a provider and a consumer. As organizations adopt SOA and the use of services as the fundamental structuring element of their architecture, they increasingly encounter the need to assess where they are in their migration path and how best to achieve the expected benefit derived from integrating and investing in greater levels of SOA maturity.

  • Gartner: Businesses set to standardise supply chain systems

    Businesses are expected to standardise on integrated supply chain systems to improve the visibility of their business processes

  • TOGAF® and SABSA® Integration

    This paper from the Open Group, documents an approach to enhance the TOGAF enterprise architecture methodology with the SABSA security architecture approach to create one holistic architecture methodology.

  • Citrix SaaS revenue rises 12% while overall revenue grows 7% YoY

    Citrix has reported a 7% revenue increase in its second quarter of fiscal year 2014 . But it reported double-digit revenue growth in SaaS

  • London’s Orchard and Fig join Docker

    San Francisco firm Docker has acquired London-based Orchard Labs and its orchestration tool Fig

  • The Open Group: Cloud buyers’ requirements questionnaire

    This White Paper describes a questionnaire that will help you identify your requirements for Cloud computing in a structured way, so that you can more easily reach the best solution. It contains questions about your enterprise – not about the products and services that you might be considering. It is put forward for discussion, with the intention that this discussion, and validation in the field, will result in a practical tool for use by enterprises.

  • Open Information Security Management Maturity Model (O-ISM3)

    Organizations in different business sectors and countries have different business requirements and risk tolerances. The O-ISM3 framework helps information Security Managers to evaluate their own operating environment and to plan their security management processes so they are consistent with and cost-effective for their organization’s business objectives.

  • VIEW MORE ON : IT architecture
  • Business Continuity Management Systems

    This downloadable extract focuses on the practical elements of business continuity management and considers them from a management system perspective: Where should the emphasis be when it comes to fitting your Business Continuity Management (BCM) arrangements into a management system? The chapter uses six phases of the BCM lifecycle as a focal point and offer top tips for you to consider when developing your Business Continuity Management System (BCMS).

  • How to be influential online

    Communicating persuasively may be a tricky art to perfect, but when it’s done properly, the pay-off can be huge, which is why marketing campaigns continue to siphon off huge amounts of corporate money every year. If you want your message to reach and influence your target audience there is one golden rule you must follow: tailor your communication style to the medium you’re using.

  • How to embed innovation in the corporate culture

    Innovation often features high on CIOs’ agendas because it is recognized as being an important means by which information systems and technology can contribute positively to the evolution and performance of the business. However, in practice the execution often falls short of the ambition. Reasons for this range from the mundane, such as there being insufficient time or capacity to devote to it, to the more fundamental, such as organizational or cultural barriers, or insufficiently defined processes and governance for capturing ideas and seeing them through to fruition.

  • Stories That Move Mountains: Improve your presentation skills

    Anyone who has a business role to play in influencing others, needs to make their presentation stand out from the crowd and this extract from Stories That Move Mountains, published by Wiley, promises to help the reader do just that. Authored by three enterprise experts at Microsoft, Stories That Move Mountains, explains to readers how to use a process called CAST (Content, Audience, Story and Tell) to create effective stories and visualisations - known as ‘Story Mapping’ – and deliver persuasive presentations.

  • The Mindset of the Chief Information Officer

    This study evaluates the leadership role that Chief Information Officers performs in helping their organisations achieve their commercial goals. It examines the skills and behaviours that contribute to their success and considers the relationships the CIO has with the CEO, the executive team and other influential stakeholders. This study, which draws on interviews with leading CIOs, provides senior IT executives with insights to help them reflect on their leadership roles and to consider areas for their own professional development.

  • The next wave of digitisation: setting your direction, building your capabilities

    Technology, internet and telecommunications industries are undergoing a fundamental change towards near-complete digitisation, with redefinition of existing business models and value creation systems. This Booz & Company study estimates that by as early as 2015, IT and communications will account for 30-40% of companies' investment budgets, and the ongoing digitisation of every industry will affect global economic value by between $12trn and $15trn in 2020, including market share shifts, cost improve­ments, price decreases and new value pools.

  • The Open Group Service Integration Maturity Model (OSIMM) Version 2

    Service Oriented Architecture (SOA) is an architectural style that supports service orientation. A service is a business task with an externalized service description that often represents a contract between a provider and a consumer. As organizations adopt SOA and the use of services as the fundamental structuring element of their architecture, they increasingly encounter the need to assess where they are in their migration path and how best to achieve the expected benefit derived from integrating and investing in greater levels of SOA maturity.

  • The Open Group: Cloud buyers’ decision tree

    This White Paper describes a Decision Tree that could be used to help you discover where Cloud opportunities and solutions might fit in your organization. It is put forward for discussion, with the intention that this discussion, and validation in the field, will result in a practical tool for use by enterprises. Your business situation is either a problem or an opportunity for which you are seeking a solution that includes IT enablement. This Tree presupposes that the current and/or future state of the IT resources for your business situation does and/or will not meet requirements. If you are a Cloud seller, then use this Decision Tree in reverse to determine for which business situations your proposed offering would be a good fit.

  • Isles of Scilly tap into seabed fibre cables to get superfast broadband

    Superfast Cornwall initiative resorts to novel method to bring fibre broadband to offshore islands

  • The Open Group: Cloud buyers’ requirements questionnaire

    This White Paper describes a questionnaire that will help you identify your requirements for Cloud computing in a structured way, so that you can more easily reach the best solution. It contains questions about your enterprise – not about the products and services that you might be considering. It is put forward for discussion, with the intention that this discussion, and validation in the field, will result in a practical tool for use by enterprises.

  • VIEW MORE ON : Innovation
  • Search firms meet EU regulators over right to be forgotten

    Google, Microsoft and Yahoo have met EU data protection authorities to discuss the implications of the right to be forgotten ruling

  • The Open Group: Cloud buyers’ requirements questionnaire

    This White Paper describes a questionnaire that will help you identify your requirements for Cloud computing in a structured way, so that you can more easily reach the best solution. It contains questions about your enterprise – not about the products and services that you might be considering. It is put forward for discussion, with the intention that this discussion, and validation in the field, will result in a practical tool for use by enterprises.

  • Open Information Security Management Maturity Model (O-ISM3)

    Organizations in different business sectors and countries have different business requirements and risk tolerances. The O-ISM3 framework helps information Security Managers to evaluate their own operating environment and to plan their security management processes so they are consistent with and cost-effective for their organization’s business objectives.

  • The Open Group Architecture Framework (TOGAF™ 9) and the US DoD

    This White Paper provides a comparative analysis of the two frameworks that describes where DoDAF products can be employed throughout the TOGAF ADM phases to develop a visual, integrated model of an architecture. The intended audience is the DoD architect who can benefit from a formal methodology to guide architecture efforts and result in a quality architecture description in a DoD-compliant format, and the TOGAF architect who can benefit by a formal set of defined models to capture output for each of the ADM phases. This document provides the architect with a map of the specific DoDAF 2.0 model that should be produced or consumed in a specific phase of TOGAF 9 with enough context to understand the fundamental concepts of both DoDAF and TOGAF.

  • Governance in IT and Architecture - TOGAF

    The primary audiences for this Paper are business and IT managers who are responsible for the performance of operations. However, enterprise architects also play a key role in supporting IT governance, including architecture governance. Governance is defined as giving direction to activities. In this Paper, the authors focus on governance of the IT domain and its alignment to business. Governance is viewed as a mechanism that influences the internal logic and decision-making of organizations. The internal logic is defined as a compromise between practically conflicting parameters. The mechanism that has to deal with these conflicting parameters consists of decision domains, governance structure, social processes between individuals and groups, and controls to ensure the proper functioning of IT governance. In the context of IT governance, enterprise architecture can be considered as a means for coordination of decision-making related to IT and business. Furthermore, it is recognized that enterprise architecture in its own right also needs to be governed.

  • IT Specialist Certification (ITSC) accreditation requirements

    The Open Group IT Specialist Certification Program (the Program) is designed to validate the existence of those qualities and skills in a professional that enable the effective development, implementation, and operation of IT solutions. The Program is skills and experience-based and goes beyond validating the mastery of any specific knowledge base. The Program includes a framework for accreditation of third parties to establish IT Specialist certification programs affiliated to The Open Group. The framework of accreditation and certification is specifically intended to standardize the process and criteria for IT Specialist professional certification and establish a foundation for the required skills and experience necessary to achieve such a distinction. The Program has been designed to be flexible and extensible so that the framework may be adopted by any industry, country, or organization.

  • Supporting requirements management in TOGAF

    Requirements management is an important activity in the process of designing and managing enterprise architectures. Requirements from various stakeholders form the basis for any change to an organization and its architecture. The quality of these requirements, the extent to which they are realized, and the ease with which they can be changed, determine the quality of any enterprise architecture. Nonetheless, many enterprise architecture modeling techniques focus on what the enterprise should do by representing “as-is” and “to-be” architectures in terms of informational, behavioral, and structural models at the different architectural layers (e.g., business, application, and technical infrastructure). Little or no attention is paid to represent (explicitly) the reasons; i.e., the why, behind the to-be architectures in terms of motivations, rationale, goals, and requirements.

  • Co-location services and datacentres feel the CCA heat

    A climate change agreement (CCA) for datacentres has come into force. How will its energy-efficiency rewards shape the industry?

  • EU funds project to boost European cloud computing market

    Cloudcatalyst project will assess cloud market in Europe, identify barriers to cloud adoption and provide tools to boost its growth

  • Privacy key to UK business opportunity, says KPMG

    Finding the right balance between privacy and business insight could help UK firms take the lead in innovative online services, says KPMG

  • VIEW MORE ON : Legislation
  • IT Project Management: Guide to estimating timescales and resources.

    This book extract explains how to estimate the timescales and effort required for IT projects.

  • Business Continuity Management Systems

    This downloadable extract focuses on the practical elements of business continuity management and considers them from a management system perspective: Where should the emphasis be when it comes to fitting your Business Continuity Management (BCM) arrangements into a management system? The chapter uses six phases of the BCM lifecycle as a focal point and offer top tips for you to consider when developing your Business Continuity Management System (BCMS).

  • Guide: Maximizing the Value of Cloud for Small-Medium Enterprises

    Cloud computing models are promising significant cost, scalability, and agility benefits, but is there a business case for small business owners to move from traditional IT provisioning to a cloud-based solution? And, if so, how can small business owners adopt the cloud? This guide is designed to help small business owners navigate through cloud services and identify those that will best help them to meet their needs.

  • CW Buyer’s Guide: Virtual desktops in the enterprise

    In this Computer Weekly buyer’s guide to virtual desktops, we investigate the latency and bandwidth issues that arise with thin client access, take a look at cloud economics in the datacentre, review Citrix’s XenDesktop 5 desktop virtualisation application, and see how virtualisation and business process optimisation work at the Co-operative

  • How to be influential online

    Communicating persuasively may be a tricky art to perfect, but when it’s done properly, the pay-off can be huge, which is why marketing campaigns continue to siphon off huge amounts of corporate money every year. If you want your message to reach and influence your target audience there is one golden rule you must follow: tailor your communication style to the medium you’re using.

  • How to embed innovation in the corporate culture

    Innovation often features high on CIOs’ agendas because it is recognized as being an important means by which information systems and technology can contribute positively to the evolution and performance of the business. However, in practice the execution often falls short of the ambition. Reasons for this range from the mundane, such as there being insufficient time or capacity to devote to it, to the more fundamental, such as organizational or cultural barriers, or insufficiently defined processes and governance for capturing ideas and seeing them through to fruition.

  • How to improve your communication with your boss

    Effective communication between boss and subordinate is essential. If you and your boss are not communicating effectively, you will be wasting a lot of time attempting to deliver what you ‘think’ your boss wants, inevitably to find our assumptions are fundamentally flawed.

  • Stories That Move Mountains: Improve your presentation skills

    Anyone who has a business role to play in influencing others, needs to make their presentation stand out from the crowd and this extract from Stories That Move Mountains, published by Wiley, promises to help the reader do just that. Authored by three enterprise experts at Microsoft, Stories That Move Mountains, explains to readers how to use a process called CAST (Content, Audience, Story and Tell) to create effective stories and visualisations - known as ‘Story Mapping’ – and deliver persuasive presentations.

  • The Banking Industry Architecture Network and TOGAF

    Financial institutions are facing significant changes of the environment in which they operate. For example, the financial crisis, changing customer behavior, increased risk awareness, focus on cost reduction, and the entrance of new financial players in the market-place have structurally changed the financial industry. Not only the operations, but also the supporting IT required a challenging transformational change. Given the close inter-dependency of operations and IT in financial institutions, a carefully planned and guided integrated approach to change is required. Enterprise architecture is key to enabling such change initiatives.

  • The DNA of the CIO

    The DNA of the CIO provides fresh insight into what it is to be a Chief Information Officer (CIO) today. For many years, CIOs have been talking about becoming a true partner to the business and the executive management team. ut, as Ernsy & Young's report, The DNA of the CIO highlights, relatively few have broken out of their comfort zones to actually become one.

  • VIEW MORE ON : Business issues
  • Practical Data Migration: PDMv2

    In this chapter from the second edition of his book, Morris outlines PDMv2 and show how it overcomes common data migration problems by using a set of integrated modules that cover the whole scope of a data migration from project start-up to legacy decommissioning and beyond. The chapter also gives a brief overview of the types of software technology available to support data migration.

  • Technology value matrix: Human Resources solutions

    Most small and medium businesses (SMBs) and all large enterprises employ human resources (HR) functionality to manage their employees. Even though many vendors offer HR solutions, these solutions may require integration with other HR software or with enterprise resource planning (ERP) to cover the functionality companies need. Some vendors differentiate themselves from their competitors by providing HR solutions built on new technologies, often times delivered in the cloud, and which can also be accessed on mobile devices.

  • The Open Group Service Integration Maturity Model (OSIMM) Version 2

    Service Oriented Architecture (SOA) is an architectural style that supports service orientation. A service is a business task with an externalized service description that often represents a contract between a provider and a consumer. As organizations adopt SOA and the use of services as the fundamental structuring element of their architecture, they increasingly encounter the need to assess where they are in their migration path and how best to achieve the expected benefit derived from integrating and investing in greater levels of SOA maturity.

  • TOGAF® and SABSA® Integration

    This paper from the Open Group, documents an approach to enhance the TOGAF enterprise architecture methodology with the SABSA security architecture approach to create one holistic architecture methodology.

  • The Open Group: Cloud buyers’ decision tree

    This White Paper describes a Decision Tree that could be used to help you discover where Cloud opportunities and solutions might fit in your organization. It is put forward for discussion, with the intention that this discussion, and validation in the field, will result in a practical tool for use by enterprises. Your business situation is either a problem or an opportunity for which you are seeking a solution that includes IT enablement. This Tree presupposes that the current and/or future state of the IT resources for your business situation does and/or will not meet requirements. If you are a Cloud seller, then use this Decision Tree in reverse to determine for which business situations your proposed offering would be a good fit.

  • Yorkshire councils upgrade networks for Tour de France

    IP telephony and Wi-Fi upgrades help North Yorkshire and Leeds City Councils meet the demands of the Tour de France

  • The Open Group: Cloud buyers’ requirements questionnaire

    This White Paper describes a questionnaire that will help you identify your requirements for Cloud computing in a structured way, so that you can more easily reach the best solution. It contains questions about your enterprise – not about the products and services that you might be considering. It is put forward for discussion, with the intention that this discussion, and validation in the field, will result in a practical tool for use by enterprises.

  • Open Information Security Management Maturity Model (O-ISM3)

    Organizations in different business sectors and countries have different business requirements and risk tolerances. The O-ISM3 framework helps information Security Managers to evaluate their own operating environment and to plan their security management processes so they are consistent with and cost-effective for their organization’s business objectives.

  • The Open Group Architecture Framework (TOGAF™ 9) and the US DoD

    This White Paper provides a comparative analysis of the two frameworks that describes where DoDAF products can be employed throughout the TOGAF ADM phases to develop a visual, integrated model of an architecture. The intended audience is the DoD architect who can benefit from a formal methodology to guide architecture efforts and result in a quality architecture description in a DoD-compliant format, and the TOGAF architect who can benefit by a formal set of defined models to capture output for each of the ADM phases. This document provides the architect with a map of the specific DoDAF 2.0 model that should be produced or consumed in a specific phase of TOGAF 9 with enough context to understand the fundamental concepts of both DoDAF and TOGAF.

  • Governance in IT and Architecture - TOGAF

    The primary audiences for this Paper are business and IT managers who are responsible for the performance of operations. However, enterprise architects also play a key role in supporting IT governance, including architecture governance. Governance is defined as giving direction to activities. In this Paper, the authors focus on governance of the IT domain and its alignment to business. Governance is viewed as a mechanism that influences the internal logic and decision-making of organizations. The internal logic is defined as a compromise between practically conflicting parameters. The mechanism that has to deal with these conflicting parameters consists of decision domains, governance structure, social processes between individuals and groups, and controls to ensure the proper functioning of IT governance. In the context of IT governance, enterprise architecture can be considered as a means for coordination of decision-making related to IT and business. Furthermore, it is recognized that enterprise architecture in its own right also needs to be governed.

  • VIEW MORE ON : Operations & support
  • Business Continuity Management Systems

    This downloadable extract focuses on the practical elements of business continuity management and considers them from a management system perspective: Where should the emphasis be when it comes to fitting your Business Continuity Management (BCM) arrangements into a management system? The chapter uses six phases of the BCM lifecycle as a focal point and offer top tips for you to consider when developing your Business Continuity Management System (BCMS).

  • CW Buyers Guide: Green IT

    With IT such a large energy drain for many organisations, firms that cut IT power consumption will reap big benefits. Going green means that computer room air conditioners and chillers are no longer required in the datacentre, potentially slashing energy costs by up to 50% and dramatically lowering the facility’s carbon footprint.

  • Stories That Move Mountains: Improve your presentation skills

    Anyone who has a business role to play in influencing others, needs to make their presentation stand out from the crowd and this extract from Stories That Move Mountains, published by Wiley, promises to help the reader do just that. Authored by three enterprise experts at Microsoft, Stories That Move Mountains, explains to readers how to use a process called CAST (Content, Audience, Story and Tell) to create effective stories and visualisations - known as ‘Story Mapping’ – and deliver persuasive presentations.

  • TfL wastes millions on telecoms, says IIPAG watchdog

    Watchdog IIPAG criticises Transport for London (TfL) for its inefficient and fragmented telecoms contracts

  • The next wave of digitisation: setting your direction, building your capabilities

    Technology, internet and telecommunications industries are undergoing a fundamental change towards near-complete digitisation, with redefinition of existing business models and value creation systems. This Booz & Company study estimates that by as early as 2015, IT and communications will account for 30-40% of companies' investment budgets, and the ongoing digitisation of every industry will affect global economic value by between $12trn and $15trn in 2020, including market share shifts, cost improve­ments, price decreases and new value pools.

  • Gartner: Businesses set to standardise supply chain systems

    Businesses are expected to standardise on integrated supply chain systems to improve the visibility of their business processes

  • The Open Group: Cloud buyers’ decision tree

    This White Paper describes a Decision Tree that could be used to help you discover where Cloud opportunities and solutions might fit in your organization. It is put forward for discussion, with the intention that this discussion, and validation in the field, will result in a practical tool for use by enterprises. Your business situation is either a problem or an opportunity for which you are seeking a solution that includes IT enablement. This Tree presupposes that the current and/or future state of the IT resources for your business situation does and/or will not meet requirements. If you are a Cloud seller, then use this Decision Tree in reverse to determine for which business situations your proposed offering would be a good fit.

  • The Open Group: Cloud buyers’ requirements questionnaire

    This White Paper describes a questionnaire that will help you identify your requirements for Cloud computing in a structured way, so that you can more easily reach the best solution. It contains questions about your enterprise – not about the products and services that you might be considering. It is put forward for discussion, with the intention that this discussion, and validation in the field, will result in a practical tool for use by enterprises.

  • Open Information Security Management Maturity Model (O-ISM3)

    Organizations in different business sectors and countries have different business requirements and risk tolerances. The O-ISM3 framework helps information Security Managers to evaluate their own operating environment and to plan their security management processes so they are consistent with and cost-effective for their organization’s business objectives.

  • The Open Group Architecture Framework (TOGAF™ 9) and the US DoD

    This White Paper provides a comparative analysis of the two frameworks that describes where DoDAF products can be employed throughout the TOGAF ADM phases to develop a visual, integrated model of an architecture. The intended audience is the DoD architect who can benefit from a formal methodology to guide architecture efforts and result in a quality architecture description in a DoD-compliant format, and the TOGAF architect who can benefit by a formal set of defined models to capture output for each of the ADM phases. This document provides the architect with a map of the specific DoDAF 2.0 model that should be produced or consumed in a specific phase of TOGAF 9 with enough context to understand the fundamental concepts of both DoDAF and TOGAF.

  • VIEW MORE ON : IT efficiency