Cyber Security Predictions for 2017

2016 was a big year in the annals of Cyber Security, and 2017 promises to eclipse it.

Wednesday, October 31, 2012

What is a Digital Customer Experience?

Digital Customer Experience is a term that I've heard discussed often over the past three years or so. It's different than how we used to think of User Experience or web Portals because in its name there is an implicit implication of multiple converged customer channels. What has happened over the past three years is that Mobile and Social Media have both become mainstream from an IT perspective and have done so more or less simultaneously. Thus,...

Tuesday, October 30, 2012

The Intelligent Healthcare Manifesto

The United States is poised for a revolutionary change in how Healthcare is perceived, how it is managed and how it serves us; both as patients and as a society. For many, the only solution to better Healthcare lies entirely in massive amounts of new spending – however a reexamination of the processes underlying Healthcare suggests that money and technology alone can be wasted if not properly orchestrated. The true potential for the next generation...

How to Create Enterprise Learning Environments

Much of the learning that people do during their lifetimes occurs in the context of informal, job-related discovery or mentoring situations. What we learn on the job determines how well we do in our careers regardless of what prior formal education we may have received. Yet, the workplace is notorious in its lack of support for this informal learning environment. The enterprise sits atop of a wealth of unstructured data and informal processes, so...

Monday, October 29, 2012

The Trouble with "Big Data"

How can there be trouble with one of the two biggest trends in IT you ask? Well, perhaps from a hype and marketing perspective there isn't any trouble yet. But from an expectations perspective, the trouble began nearly two years ago and has only gotten worse. And it starts in a name, it sounds simple, but is it? Can you define "Big Data" and if so would your define match an industry standard expectation? What is Big Data, anyway? Well, this...

Friday, October 26, 2012

Cyber Security & Threat Management

Threat Management is still a relatively new concept; there is no industry standard definition for it. In fact, the few people who are talking about it right now tend to view it from at least two very different perspectives – one a product focused approach to unifying perimeter security tools and two, a practice-focused management paradigm. As it evolves, Threat Management will eventually encompass both of those perspectives and will likely become...

Thursday, October 25, 2012

PLM and the PMO

Program Lifecycle Management is the recognition that specialization is not the only or even the best answer towards managing complexity. Often times, an excessive focus on specializing specific areas of expertise merely adds to the level of complexity and confusion that typical PMOs face every day. The truth is that many if not most of the people who support PMOs need to be generalists to fully grasp the breadth of topics that they are expected to...

Wednesday, October 24, 2012

Introducing Program Lifecycle Management

Lifecycle Management is more than a buzzword, it is the central organizing principle of all Information Technology (IT) effort. Understanding how to differentiate or coordinate Lifecycle Processes is perhaps the key challenge in IT today. Program Lifecycle Management (PLM) represents a deliberate attempt to reconcile and combine multiple Lifecycle Management tasks within a single, unified approach.  The Problem So why is PLM important, why...

Data Driven Cyber Security

Data without meaning has no value. Data that is interpreted too late to respond to a situation has only forensic value. For too many years, computer network security and information assurance practices have focused solely on forensic capabilities. Semantics is the science of applying meaning – to symbols, to language, to data and to events. If meaning can be mastered, it can then be portrayed effectively in analytical displays. The combination of...

Tuesday, October 23, 2012

Communities of Innovation

In a previous post we mentioned a concept that we refer to as "Communities of Innovation." We'd like to explore that a little further today. We think this concept is important because it helps determine where or whether Innovation will occur - in other words without the locations that Innovation tends to incubate - it may not occur at all. These communities are not a new concept per se, there have been communities of Innovation in most cultures across...

What is Cyber Strategy?

Security has always been driven by Strategy, Operations and Tactics – Cyber Security is no different.  Cyber Security encompasses “Cyberspace” not only from a traditional security management approach, but includes the emerging role of Cyber operations as well. Given the evolving nature of Cyber Security, the ability to address Cyber Strategy is the most logical place to begin providing comprehensive solutions. A comprehensive approach to Cyber...

The Cyber Security Challenge

Over the next several weeks we're going to introduce a number of concepts relating to Cyber Security. We'll begin today by explaining some of the things wrong with how security is often viewed today... Network defense and management for the past two decades has focused primarily upon reactionary responses to security breaches or “exploits.” Determining whether an attack has occurred is a forensic rather than a proactive activity. Continuation...

Monday, October 22, 2012

Capability-Based SOA

Two of the most complex problems facing all SOA implementation projects tend to be: The determination of what to do with existing capabilities. The determination of how to define the specific nature of new or transformed capabilities. Existing capabilities are usually systems but of course can include services or other code that could be readily included within some type of SOA development effort. We tend to refer to this as legacy capability,...

Capability-Driven Acquisition

The term ‘Acquisition’ is almost a bit misleading. The primary image that comes to mind when one first hears the term is that acquisition represents the purchase of some tangible set of goods or services. Once upon a time, that may have been true, but today things aren’t so clear cut. Acquisition goes well beyond procurement, and in the federal realm it has become an incredibly complex set of rules regulations and practices. Federal acquisition answers...

Friday, October 19, 2012

Capability-Based Enterprise Architecture

Normal 0 false false false EN-US X-NONE X-NONE MicrosoftInternetExplorer4 ...