Skip to main content

Posts

Showing posts from 2018

Enterprise technology's juxtaposition, complementarity and application

The ability to see within an enterprise with operations requiring various technologies in information, communication, operational, security and compliance, or two or more of these, finds stakeholders, or the need to adjust techniques and make, some ingenious ways to be more effective in their responsibilities and deliverables or production. Enterprise technology is not an area and language to be used where there are only some specializations involved but which still within the confines of information technology. IT may have been serving utility operations or energy generation for sometime already and yet stakeholders cannot see how to work hand-in-hand to increase their own efficiency, and the output for which customers are very dependent. There are efforts but they remain completely separate and the result is the bigger realizations and concerns about costs rather than creation of value from the start, not just when profits began to come in. If IT is not clearly use in such environmen

IT practitioners as decision-makers

While the IT practitioner is charged to the job, still the most responsible decision-maker is the organization’s senior management or business owner. It ensures a direction and/or strategy for the whole enterprise, its business objectives including but not limited to relevant activities. Meaning, the entire organization have set both, the job and strategy, correctly and diligently. In our kind of work, the professional experience we have since been accumulating, we know firsthand that some decisions are left for the IT practitioners to make.  When they do, IT practitioners need to counterbalance and be upfront what they have in their resources. What they create will have an impact to their organizations’ well-being. Worst, drastic to financials or bottom line. Their failure will be their companies’, too, and they don't want that to happen. Do they?  As an aspiring IT practitioner, you already need to see what impact your surroundings are causing to your apprehensions or output and

The defensive & offensive IT program

Looking for IT consulting service with a better-way attitude to do things? Or training program to learn the potent approaches for, and apply, IT based on your needs? Or both, but first, want to experience real world firsthand abilities?   Do you need to address the business and regulations’ thrusts and demands with IT? IT practitioners, entrepreneurs, senior management, teachers, professionals and willing individuals interested? Sure, let's get to it. Everyone is welcome to take our DOIT program. For 2 decades, with a no slack off industry testing and improvement, we’ve proven it to be beneficial regardless of organizational size and applicability. Consider into account the relationships of working and learning. These are two different realities. Hence, their complementarity must be managed and improved accordingly. After training, a commitment and proper guidance might be necessary while taking the necessary steps to achieve the mark of a productive output. Our kind of IT consulti

Truth on international broadband internet, "subscribers' bandwidth" and transit

There are differences in our understanding of internet connection. Depending on who is talking or conveying it. Even internet service providers (ISP) and telecommunications people may miss the crux of the internet simply because they intentionally do it or not aware at all. They are focused on making a sell. So is in general, it applies, to technology vendors. Broadband is seen as high-speed internet connection which uses physical and wireless mediums. These are copper, fiber cable and wireless, 4G/5G (mobile and dedicated devices available) and satellite. It may matter which medium is subscribed to but not really as it will, at the end, be dependent on the bandwidth and “speed” being provided for us by our telco. That’s one truth, can easily be digested for and by our regular, non-tech savvy subscribers or end-users. When we talk to telco sales and customer service people, we don’t hear from them this. What they tell us is the bandwidth and never mention, not a bit, about the minimum

IT risks not managed, maybe violated further

It is, when you do have one or more of the following-- IT policies and procedures doesn't reflect real processes, efforts are workarounds and communications ill-defined or strict without the best of reasons. No access verification and monitoring. Shares and lends credentials, computers and gadgets to each other. Browsing unconsciously, and wandering in, the Web. Opened emails that came from unknown individuals or sender very often without questions. Too much of a trusting person online. Uses the same flashdrive, borrowed or owned, for home computer and office computer. Update platforms and software irregularly. Very proud or dislike to cooperate with colleagues and friends or confident lone wolf. IT people enjoys computer games, doesn’t talk to business people. Risk not attended by IT and/or security people themselves. Mad and disruptive personalities and no respect for rules and regulations. Dismissive of, or no regard to, security protocols. Inattentive to security events. Expens

We measure IT and our work

With so many areas to measure in IT we cannot emphasize enough how important it is do so even when no one seem to be interested about it. Even in program and project management which is most likely where measurement is a heavy part of the whole exercise, it is only to make sure time, materials and budget are all in the same place for a very specific purpose, and not entirely the enterprise. The measurement ends when the project ends. If only program and project management mechanisms are always applied every time an IT or any area in it is being dealt with. May be there will not be any problem with measurement and stakeholders need not to worry about surprises. Remember project management, like other practices within IT, is not a panacea. If we are lax and miss something, project fails and so resources burns. Seven years ago, we articulated about why measuring IT was a problem and it still is true up to this time. In fact, IT problems without much departure from the old ones seem to kee

Worthy of IT practice

People might be in 100% agreement, at least those who are attentive IT practitioners, that about 95% can talk business systems, IT and contiguous facilities but not necessarily capable of executing whatever approximations there are.  Hard to find are the 5% who can talk and write—context doesn’t deviate when they do—and can execute them properly as well. This makes expensive with everything IT. The complete opposite of IT’s worth the time and investment.  Why let it continue if we can correct it? Besides, in their report in Computing Curricula Series, the Association for Computing Machinery (ACM) and Institute of Electrical and Electronics Engineers (IEEE) says specifically from its Information Technology Curricula 2017 about, The Academic Myth ,  the exact statements are reproduced here: Students who graduate from a university program assume that the baccalaureate degree is a sufficient qualification to attain a position. This understanding may be true in some fields, but belief in th