Evaluate performance using a graph database and FPGAs Every organization thinks that online response times should be faster and batch elapsed times should be shorter. Performance expectations, no matter how unrealistic or even ridiculous, exert a lot of pressure on IT management to work miracles. Graph databases and Field Programmable Gate Arrays (FPGA) can dramatically…
The best practice is to plan for as many failure scenarios as conceivable In our 24/7/365 world, computing infrastructure outages can kill a CIO’s reputation and career prospects swiftly and dramatically. Outages have attained an extremely high profile in most organizations because they visibly and quickly: Cost revenue. Undermine customer service. Cause work to grind…
How to increase reporting and querying functionality available to all end-users All custom software and software packages come with reporting functionality. That functionality is almost always sufficient to launch the application successfully. Soon after launching, the world changes because successful applications grow in terms of: The number of concurrent, active end-users. The total number of…
We are at the beginning of many exciting artificial intelligence/machine learning advances Are we at an inflection point on the road to developing more innovative artificial intelligence/machine learning (AI/ML) techniques, such as large language models (LLM) and related software? All the hype around ChatGPT and the subsequent announcements of similar products and massive investments by…
Organizations that move earlier, faster, and more decisively will outperform their peers Thoughtful executives will prioritize planning for fully reopening their organizations now that the COVID-19 pandemic is subsiding. The emerging business environment is not like the past. The differences go well beyond customer and staff expectations for personal safety in places of business. Successful…
Malicious emails can lead to data breaches and ransomware attacks Malicious emails are a significant cybersecurity risk for many organizations. Email remains an important communication method for most organizations even though personal communication is migrating more to text, Facebook Messenger, LinkedIn Message, WhatsApp and various Asian apps. However, organizations continue to receive malicious emails that…
Unless you’re a high-profile celebrity or a golfing buddy of someone like Jeff Bezos, your risk of an attack is very low The Apple FaceTime software defect triggered a much bigger question about the widespread invasion of privacy enabled by iPhones. Many wanted to know if their conversations were being recorded and relayed by various…
These information technologies may be boring but can provide significant business benefits What are some information technologies that a value-focused Chief Information Offiver (CIO) should keep talking about even though they’re not generating much buzz? In search of the latest and greatest technology developments or the latest over-valued technology of a pre-IPO (Initial Public Offering)…
Digital transformation initiatives can decrease the pressure from demanding customers and more capable competitors Digital transformation invites organizations to go beyond routine use of the web, email, smartphone apps and the in-place portfolio of IT systems. Currently, even while actively using these information technologies, many organizations still: Rely heavily on various paper-based, manual processes. Function…
When is it appropriate and when will it be counter-productive? Many organizations have reaped significant or huge benefits from offshoring parts of their IT function. This offshoring success creates the question of when offshoring is appropriate and when it will be disappointing or even counter-productive. IT functions suitable for offshoring Successful IT offshoring examples include:…