Skip to main content

Posts

Showing posts from February, 2012

Enterprise technology's juxtaposition, complementarity and application

The ability to see within an enterprise with operations requiring various technologies in information, communication, operational, security and compliance, or two or more of these, finds stakeholders, or the need to adjust techniques and make, some ingenious ways to be more effective in their responsibilities and deliverables or production. Enterprise technology is not an area and language to be used where there are only some specializations involved but which still within the confines of information technology. IT may have been serving utility operations or energy generation for sometime already and yet stakeholders cannot see how to work hand-in-hand to increase their own efficiency, and the output for which customers are very dependent. There are efforts but they remain completely separate and the result is the bigger realizations and concerns about costs rather than creation of value from the start, not just when profits began to come in. If IT is not clearly use in such environmen

Problems can be everywhere

So many trending mechanisms as well as initiatives can supposedly help IT efforts to function effectively and securely. Yet the figure is unprecedented and more costly for victims of incidents. Whether or not this is caused by an internal misuse, intentionally and not, or directed attack from outsider. Why can't organization replicate the effectiveness of others in its application and use of IT? It probably is their understanding of the language. It causes a different, most of the time inferior adaptation of the technology. Imagine the two things simply apparent to many practitioners, both in business and technology, about ICT. Non-stop technological advances. International standards document is relatively low priced. What matters here are their continuous improvement. Still failures continue to manifest and records are especially made by big organizations. Our belief is that it is in the efficacy of the decision makers and managers to deal with crucial matters in IT—especially if