Log in


The launch of Windows Phone 7 has surprised the worldwide IT industry in two ways: firstly that Microsoft launched a quality product – one that had to face up to the expectations set by iPhone and Android. These are not phones, not tools of information and communication. They are extensions of personal identity, designed objects that are adored.

Conclusion: Neither written languages nor formal programming languages are capable of representing organisational knowledge in a human-friendly format. Even though Semantic Web technologies attempt to offer assistance in this area, their scope of applicability is limited to the role of establishing crude links between elements of knowledge in the public domain. Making organisational knowledge tangible and easily accessible requires new techniques, and dedicated technologies.

It all really started with the hype and the launch around Apple’s iPad earlier this year. Until then, tablet devices were perceived as a fringe phenomenon, of little interest to the mainstream consumer or business user. I have had an eye on the tablet space since the first release of the Amazon Kindle in 2007, and always wondered when devices with a tablet form factor would finally take off. To some degree the introduction and promotion of netbooks in the last two years had confused the market, but the range of tablet devices that are now available is reassuring. Still, the dust is far from settled, and there is a whole pipeline of tablet devices that have yet to hit the shelves. So, apart from the geek-factor, what value can a business user get out of a tablet?

Conclusion: Large-scale Enterprise Data Warehouse implementations and operations often lead to multi-million dollar items in annual IT budgets. It is paramount that investments of this magnitude are put to good use, and are translated into tangible value for the organisation. Complexity of the underlying information structures can become a major issue, especially once complexity impacts the ability to formulate data warehouse queries in a timely manner. With a bit of foresight, or even retrospectively, it is possible to equip data warehouse designs with simple orientation and navigation aids that significantly reduce the time that users need to locate relevant information.

My dog is cloud computing and I think you should invest in him. For a start, he’s a total mongrel and everyone has a different opinion about what he actually is. No one will ever be able to clearly define him because they all look at him and see what they want. In that respect he’s exactly like cloud computing. Some people see him as infrastructure, others as a platform for applications and others see something between. One thing is certain though, no matter what you think my dog is, he’s fuzzy.

Conclusion: Electronic documents and records management solutions (EDRMS) from yesteryear are failing to provide the flexibility and collaborative experiences that today’s organisations require. In most organisations, less than 10% of content has been placed in existing EDRMSs. However, investing in a new EDRMS will not result in greater satisfaction levels if new principles are not first adopted.

Conclusion:Last year Richard Soley, Ivar Jacobson, and Bertrand Meyer called for action to re-found software engineering on principles and practices that are backed by robust scientific theories. Achieving big gains in software quality and productivity by introducing off-the-shelf methodologies has proved to be elusive. The evidence suggests that looking for much smaller (and scientifically validated) building blocks that can be composed into an organisation-specific methodology is much more likely to deliver results than the quest for the ultimate methodology. Alignment between business and IT requires constant vigilance of staying on the narrow ridge that separates over-simplification of an organisation’s activities from spurious complexity in software implementations.

Conclusion:When it comes to evaluating software products to address a particular business need, the first activity after determining a list of candidate products often consists of sourcing product selection criteria from independent subject matter experts. But qualified product selection is only possible if extensive information about the specific organisational context is taken into consideration, otherwise boilerplate product selection criteria only have the effect of a security blanket.

Software development was still a very esoteric discipline in the days when Lisp was born. In the meantime the software industry went through a whole series of major paradigm shifts:

  • From structured programming (Pascal and related languages)

  • To relational databases (the SQL standard and implementations from IBM, Oracle and others)

  • To Computer Aided Software Engineering (a very large range of competing tools)

  • To object-oriented languages (such as Smalltalk, C++ and Java)

  • To components (such as the CORBA standard and Java Enterprise Edition)

  • To web based applications (HTML, XML, JavaScript, and other scripting languages)

Conclusion: Interviewing CXOs during consulting assignments over the past eighteen months has revealed significant dissatisfaction about their ERPs. Many contend their ERP investment has significantly eroded since originally implemented, and, given the need to maintain a reasonable degree of release currency, their ERPs are now providing negative returns on capital invested.

In the News

New data breach notification scheme will be a barometer for business maturity - AFR -12 March 2018

Do not mistake cyber security for being merely a technical discussion about IT problems to be fixed. Cyber security is now, and always has been, purely a response to risk. The risks have changed...

The Future of Work: The Role of People - Adobe - 31 Jan 2018

The Future of Work: The Role of People Foreword by Joseph Sweeney, IBRS Advisor For the past 30 years, organisations have applied technology to people to make the workplace more productive. But...

Businesses unprepared for new data breach notification laws - AFR - 29th January 2018

Thousands of Australian small businesses remain woefully unprepared for the introduction of new laws that will require them to publicly disclose if their customers' data is breached by hackers or...

Intel chip meltdown flaw shows new vulnerability - AFR - Jan 5th 2018

Cyber security experts have warned the long-term implications of chip vulnerabilities nicknamed Spectre and Meltdown discovered by researchers this week are still unknown, despite it appearing that...

Business experience should help parents keep kids safe online - AFR - 28th Nov 2017

The adults in the lives of young people need to know more about security and safety in an online world and they could be learning this at work The Office of the eSafety Commissioner deals with some...

Subscribe to IBRS Updates

Invalid Input
Invalid Input
Please enter a valid email address
Please enter your mobile phone number
Invalid Input

Get in-context advice from our experts about your most pressing issues or areas of interest

Make an Inquiry


Already a subscriber?

Login to read your premium content.

Recently Viewed Articles
Related Articles