Related Content
The Weakest Link in Your Chain There is a saying that a chain is only as strong as its weakest link. DevOps helps establish a pipeline to automate application and systems software deployments. DevOps also has an amazing way of very quickly discovering exactly which link in the deployment chain needs to be fixed or replaced. |
||
Moving from Information Technology to Business Technology New technologies such as big data, the Internet of Things, and enhanced mobile capabilities call for new processes. Today, IT departments must have a deeper understanding of the businesses they serve, the professions they automate, and how technology is best employed—from a business perspective. |
||
Aligning IT with the Business: The Age-Old Debate The topic of IT–business alignment is a subject that has been discussed, debated, theorized, and proceduralized for decades. Why is it still a topic at all? Well, mainly because of differing beliefs about IT’s job function. How do you define the relationship between IT and the overall organization? |
||
When IT Falters, So Does the Company Manual procedures are rarely used today. On the upside, computerization has dramatically increased employee productivity and reduced the cost of automation. On the downside, a company cannot run without it. This means that IT operations are crucial to company success—not just a necessary evil. |
||
Analyzing the Value of a Test Tool Approach Many test managers want to assess the value of their test tool approach. There is a way to do it that does not require writing code—only the ability to read it a little. Matt Heusser helps you figure out if what your team is doing is working, what you could drop, and what might be worth picking up. |
||
No IT Training Budget? Think YouTube and MOOCs If training budgets don’t exist, there is a wealth of free and informative instructional material available on YouTube and through massive open online courses (MOOCs), free vendor web seminars, white papers, and other related sources. You can still construct a well-orchestrated training curriculum. |
||
Keeping One Step Ahead of Cloud Hackers Cloud systems are tempting targets for hackers because a single successful breach can steal information from multiple companies. To keep one step ahead of hackers, you need to understand what you can protect, where you might lose visibility, and where you need to apply extra security assurance. |
||
The Many New Forces Driving Who Becomes Your Next CIO This is a fascinating time to observe the role of CIO due to the many important forces simultaneously driving CIO selection criteria in different directions. The combination of data security and new IT trends may lead to the hiring of CIOs with a tech background first and business knowledge second. |