Worst Methods for Enterprise Architecture
On the opposite side of the spectrum, Burton outlined her baker’s dozen of “worst” enterprise architecture practices. The EA methods that Burton said muddied efforts and missed overall business returns are as follows:
1. No link to business strategic planning and budget process.
2. Confusing “IT Architecture” with “Enterprise Architecture.”
3. Lack of governance.
4. Too much standardization.
5. Focusing on the art/language of EA rather than the outcomes.
6. Strictly adhering to architectural frameworks.
7. An “Ivory Tower” approach by IT and EA team members.
8. Lack of communication and feedback.
9. Limiting the teams to IT resources.
10. Missing performance measures.
11. Picking a tool before understanding business needs.
12. Focusing on the current state first and primarily.
13. Thinking that implementation equals completion.
7 Surefire Ways to Increase Your Klout Score
Are you below your target Klout score? Schaefer reveals seven simple ways to climb up the ranks:
- 1. Build a network. The key to increasing a Klout score is similar to finding success on the social web in general: Build a targeted, engaged network of people who would be legitimately interested in you and your content.
- 2. Create meaningful content. Adopt a strategy to create or aggregate meaningful content that your network loves to share with others. Provide links!
- 3. Engage. Actively engage with others in a helpful and authentic way. Ask questions, answer questions and create a dialogue with your followers.
- 4. Don’t scheme. Any gaming behaviors that fall outside the basic strategies will eventually catch up to you. For example, specifically targeting conversations with high Klout influencers will probably be more annoying than successful. If you keep focused on your network strategy and your content strategy, you’ll succeed.
- 5. Interact with everyone. Don’t be afraid to interact with Klout users with lower scores – it won’t hurt your own score. In fact, it helps build their score and in turn makes you more of an influencer.
- 6. Publish. Remember, you don’t have to make a movie or be elected to office to have power now. All you need to do is publish. Access to free publishing tools such as blogs, video and Twitter have provided users with an opportunity to have a real voice, so take advantage of these many platforms.
- 7. Keep at it. Don’t be discouraged by your score. It’s more important to just enjoy your social media experience and let the chips fall where they may.
The Principles of the Global Workforce
1. Distance doesn’t matter.
Employees now expect to be able to collaborate in real-time with any co-worker. They expect to have access to whatever data or services the company offers no matter where they happen to be. Where in the world that co-worker actually works is irrelevant. They may be working from home, different offices, at airports, manufacturing facilities, or even on a ship somewhere. Knowledge workers need the flexibility to work wherever they must in order to best complete their jobs. That may mean on-site, at a customer’s office, or even from the quiet of their own home. IT must be an enabler for the way business needs to operate. Waiting 20 minutes for a file to be sent between workers – even if they are across the world from each other – is no longer acceptable for the employee or for the customer project that they are working on.
2. Business never stops.
With a globalized workforce – and a rapidly globalizing customer base – businesses cannot afford their operations to be stopped for even a few minutes. Responsiveness to disaster or failure – often characterized by recovery point objective (RPO) and recovery time objective (RTO) – must go far beyond responding to common problems like a failed SAN or a downed fiber connection. Issues like hurricanes or a flu pandemic might force workers to operate from home for an unspecified period of time. Compromised data centers may require enterprise to rapidly switch operations to secondary locations with no loss in information.
3. Applications and data must be available everywhere but all in one place.
With organizations working harder to protect their valuable data and sensitive customer information, many IT organizations are engaging in IT consolidation projects. Consolidating data makes it easier to track, protect, and restore. Beginning with remote tape backup and progressing to more complicated projects like file servers, document management applications, PLM systems, and Web applications, CIOs are demanding that data be brought back from remote offices. At the same time, businesses recognize that the data and applications were “out there” for a reason – that’s where they needed to be accessed. So while consolidation is an important strategy for data protection and cost control, it can negatively impact business operations unless LAN-like performance can be maintained everywhere.
4. Knowledge must be harnessed – and data must be managed.
Consolidation goes a long way to eliminating the islands of storage and data that evolve over time. But with organizations being required to react quickly in the face of
change, or move in order to take advantage of an opportunity, flexibility in moving data and applications is essential. CIOs must be able to quickly move massive amounts of data, and potentially set up application infrastructure in remote locations overnight. New offices and merged/acquired businesses must quickly be absorbed into the fabric of the existing organization by providing them immediate access to new systems and data.
5. There are no second-class enterprise citizens.
The days of the “important” people working at corporate HQ are rapidly fading. Employees everywhere are now empowered to make important decisions. Whether it is designing or manufacturing a product, working with a customer, or working on a localized version of an advertising campaign, work happens everywhere. And the work of the distributed employee isn’t less important than anyone else’s work. Just as importantly, these workers need to interact with their colleagues, applications and data everywhere. CIOs and IT managers may no longer prioritize workers based on their geographic location. Every member of the enterprise needs to have access to the same applications, at the same level of application performance.
from “The CIO’s new guide to design of global IT infrastructure”
The Cynefin framework has five domains. The first four domains are:
- Simple, in which the relationship between cause and effect is obvious to all, the approach is to Sense - Categorise - Respond and we can apply best practice.
- Complicated, in which the relationship between cause and effect requires analysis or some other form of investigation and/or the application of expert knowledge, the approach is to Sense - Analyze - Respond and we can apply good practice.
- Complex, in which the relationship between cause and effect can only be perceived in retrospect, but not in advance, the approach is to Probe - Sense - Respond and we can sense emergent practice.
- Chaotic, in which there is no relationship between cause and effect at systems level, the approach is to Act - Sense - Respond and we can discover novel practice.
The fifth domain is Disorder, which is the state of not knowing what type of causality exists, in which state people will revert to their own comfort zone in making a decision. In full use, the Cynefin framework has sub-domains, and the boundary between simple and chaotic is seen as a catastrophic one: complacency leads to failure.
Adjyle Online Marketing and Promotion
• Evolution rather than replacement.
The private cloud can evolve from existing virtualized infrastructure, enabling the transition to cloud computing without a complete and disruptive infrastructure overhaul.
• Security and compliance.
With a private cloud, data is retained within the enterprise, behind the corporate firewall, where IT can exercise full control over security, privacy, and regulatory compliance. With public clouds, enterprise data is housed in external data centers—and may move from location to location, without IT’s knowledge or consent. The dynamic movement of data in a public cloud may also present compliance challenges with local regulations.
• Service level agreements (SLAs).
Keeping applications in-house can help IT continue to meet SLAs deining performance, availability, and other critical business requirements. Some external providers may not be able to furnish the same level of service.
A large enterprise private cloud can provide economies of scale, resulting in total cost of ownership (TCO) that is competitive with or lower than public clouds. Intel IT, for example, found that services can be hosted internally at equal or lower TCO than hosting them externally.
• Building expertise.
Architecting a private cloud enables IT organizations to develop a knowledge base that can be applied to public clouds in the future. When creating the private cloud, IT will need to develop detailed application and data inventories, and gain key skills such as managing cloud SLAs. This experience will help build effective relationships with public cloud providers, enabling IT organizations to assess whether they meet enterprise requirementsconnect with me
7 Primary Business Drivers for Social Media
Social Network Users’ Bill of Rights
2. Clarity: We will make sure that our policies, terms of service, and settings are easy to find and understand.
3. Freedom of speech: We will not delete or modify user data without a clear policy and justification.
4. Empowerment : We will support assistive technologies and universal accessibility.
5. Self-protection: We will support privacy-enhancing technologies.
6. Data minimization: We will minimize the information users are required to provide and share with others.
7. Control: We will work toward enabling users to own and control their data and won’t facilitate sharing their data unless they agree first.
8. Predictability: We will obtain the prior consent of users before significantly changing who can see their data.
9. Data portability: We will make it easy for users to obtain a copy of their data.
10. Protection: We will treat user data as securely as our own confidential data unless they choose to share these data, and notify them if these data are compromised.
11. Right to know: We will show users how we are using their data and allow them to see who and what has access to their data.
12. Right to self-define: We will allow users to create more than one identity and use pseudonyms. We will not link them without their permission.
13. Right to appeal: We will allow users to appeal punitive actions.
14. Right to withdraw: We will allow users to delete their accounts and remove their data.
The 5 Laws of Engagement
Law 1: We seek comfort in relationships: Surround us with community, which we’ve seen success with like Facebook, Twitter and 4chan. Most interestingly is PostSecret, an ongoing community art project where people mail in their secrets anonymously on one side of a homemade postcard.
Law 2: We all have something to say. So give us tools to express ourselves. Tools include comments, notes, and all the fun things Facebook has given us with Timeline, etc.
Law 3: We need to feel important. Use rewards to make us feel special. How do you make people feel special? One way is through exclusivity like Gilt Group. One way is through badges on Foursquare.
Law 4: We are hypnotized by beauty. Give us something beautiful to look out. Flipboard puts the image first. Instagram is a series of beautiful images within a community.
Law 5: We are captivated by the unknown. So target our curiosity. Foursquare does this with points! Pinterest does with page after page of constant intrigue.
Anne Boe’s Keys to Successful Networking
- Clarify your career goals.
- Develop long-term win-win relationships.
- Nurture your network daily.
- Be actively involved in your community.
- Meet as many people as you can.
- Take your business cards everywhere.
- Make friends, even when you don’t need them.
- Act like a host, not a guest.
- Become an interested person.
- Develop your listening skills.
- Trust your intuition.
- Take people risks.
- Master the art of small talk.
- Work smarter, not harder.
- Value yourself and your life.
- Take action daily towards your goals.
- Become your own energy manager.
- Learn to ask for what you want.
- Give thanks for what you have.
- Acknowledge your skills and talents.
- Say “Thank you. “
- Become an inverse paranoid - decide the world is conspiring for you.
- Determine your priorities - protect your energy.
- Learn to want what you have.
- Know that there are more side doors in the world than there are front doors.
[Source: Anne Boe]