Main
Log in

Applications

The launch of Windows Phone 7 has surprised the worldwide IT industry in two ways: firstly that Microsoft launched a quality product – one that had to face up to the expectations set by iPhone and Android. These are not phones, not tools of information and communication. They are extensions of personal identity, designed objects that are adored.

Conclusion: Neither written languages nor formal programming languages are capable of representing organisational knowledge in a human-friendly format. Even though Semantic Web technologies attempt to offer assistance in this area, their scope of applicability is limited to the role of establishing crude links between elements of knowledge in the public domain. Making organisational knowledge tangible and easily accessible requires new techniques, and dedicated technologies.

It all really started with the hype and the launch around Apple’s iPad earlier this year. Until then, tablet devices were perceived as a fringe phenomenon, of little interest to the mainstream consumer or business user. I have had an eye on the tablet space since the first release of the Amazon Kindle in 2007, and always wondered when devices with a tablet form factor would finally take off. To some degree the introduction and promotion of netbooks in the last two years had confused the market, but the range of tablet devices that are now available is reassuring. Still, the dust is far from settled, and there is a whole pipeline of tablet devices that have yet to hit the shelves. So, apart from the geek-factor, what value can a business user get out of a tablet?

Conclusion: Large-scale Enterprise Data Warehouse implementations and operations often lead to multi-million dollar items in annual IT budgets. It is paramount that investments of this magnitude are put to good use, and are translated into tangible value for the organisation. Complexity of the underlying information structures can become a major issue, especially once complexity impacts the ability to formulate data warehouse queries in a timely manner. With a bit of foresight, or even retrospectively, it is possible to equip data warehouse designs with simple orientation and navigation aids that significantly reduce the time that users need to locate relevant information.

My dog is cloud computing and I think you should invest in him. For a start, he’s a total mongrel and everyone has a different opinion about what he actually is. No one will ever be able to clearly define him because they all look at him and see what they want. In that respect he’s exactly like cloud computing. Some people see him as infrastructure, others as a platform for applications and others see something between. One thing is certain though, no matter what you think my dog is, he’s fuzzy.

Conclusion: Electronic documents and records management solutions (EDRMS) from yesteryear are failing to provide the flexibility and collaborative experiences that today’s organisations require. In most organisations, less than 10% of content has been placed in existing EDRMSs. However, investing in a new EDRMS will not result in greater satisfaction levels if new principles are not first adopted.

Conclusion:Last year Richard Soley, Ivar Jacobson, and Bertrand Meyer called for action to re-found software engineering on principles and practices that are backed by robust scientific theories. Achieving big gains in software quality and productivity by introducing off-the-shelf methodologies has proved to be elusive. The evidence suggests that looking for much smaller (and scientifically validated) building blocks that can be composed into an organisation-specific methodology is much more likely to deliver results than the quest for the ultimate methodology. Alignment between business and IT requires constant vigilance of staying on the narrow ridge that separates over-simplification of an organisation’s activities from spurious complexity in software implementations.

Conclusion:When it comes to evaluating software products to address a particular business need, the first activity after determining a list of candidate products often consists of sourcing product selection criteria from independent subject matter experts. But qualified product selection is only possible if extensive information about the specific organisational context is taken into consideration, otherwise boilerplate product selection criteria only have the effect of a security blanket.

Software development was still a very esoteric discipline in the days when Lisp was born. In the meantime the software industry went through a whole series of major paradigm shifts:

  • From structured programming (Pascal and related languages)

  • To relational databases (the SQL standard and implementations from IBM, Oracle and others)

  • To Computer Aided Software Engineering (a very large range of competing tools)

  • To object-oriented languages (such as Smalltalk, C++ and Java)

  • To components (such as the CORBA standard and Java Enterprise Edition)

  • To web based applications (HTML, XML, JavaScript, and other scripting languages)

Conclusion: Interviewing CXOs during consulting assignments over the past eighteen months has revealed significant dissatisfaction about their ERPs. Many contend their ERP investment has significantly eroded since originally implemented, and, given the need to maintain a reasonable degree of release currency, their ERPs are now providing negative returns on capital invested.

In the News

The three cyber security challenges Australian businesses can't ignore - AFR - 6 May 2018

Australian businesses currently face a cyber security triple threat that has nothing to do with warding off hackers. Rather there are three new regulatory forces impacting specific points of the...
Read More...

OAIC report reveals 63 data breach notifications in first six weeks of NDB scheme - AFR - 11 April 2018

More than 60 data breaches have been reported in the first six weeks of the country's new Notifiable Data Breach (NDB) scheme, with healthcare providers making up almost a quarter of the mandatory...
Read More...

New data breach notification scheme will be a barometer for business maturity - AFR -12 March 2018

Do not mistake cyber security for being merely a technical discussion about IT problems to be fixed. Cyber security is now, and always has been, purely a response to risk. The risks have changed...
Read More...

The Future of Work: The Role of People - Adobe - 31 Jan 2018

The Future of Work: The Role of People Foreword by Joseph Sweeney, IBRS Advisor For the past 30 years, organisations have applied technology to people to make the workplace more productive. But...
Read More...

Businesses unprepared for new data breach notification laws - AFR - 29th January 2018

Thousands of Australian small businesses remain woefully unprepared for the introduction of new laws that will require them to publicly disclose if their customers' data is breached by hackers or...
Read More...

Subscribe to IBRS Updates

Invalid Input
Invalid Input
Please enter a valid email address
Please enter your mobile phone number
Invalid Input

Get in-context advice from our experts about your most pressing issues or areas of interest

Make an Inquiry

Sitemap

Already a subscriber?

Login to read your premium content.

        Forgot your password?
Recently Viewed Articles