Deploying IT Competency Frameworks – Identifying, Assessing, Acquiring and Maintaining Skills

I introduced the following seven-step process in my previous blog. In this blog I’ll provide an introduction to steps four through seven. A combination of three blogs will provide you with an holistic overview of the process for deploying IT competency frameworks and some of the key activities that are necessary for them to be successful and provide maximum value and benefit to your organization.

Read more

Protecting Data at Rest

Imagine if you had a way to make all of the valuable possessions in your home become worthless (or of little value) if they left the perimeter of your home? There would be no incentive for a thief to steal from you. Why bother with the risk, time and effort to burglarize your home if there is no meaningful payoff? Now imagine if you could do the same with your data in your data center, or in a cloud environment such as cloud storage or cloud servers. If any data or piece of information left the cloud perimeter it would be rendered useless.

Read more

An End to Business Analysts Everywhere

We tend to think of the terms “business analyst” and “business systems analyst” as different — yet similar — job titles, the former less technical than the later. Let us stop and think about that for a moment. First, hyphen business and systems to create a new word business-systems then re-add analyst. This new term creates a completely new area of our profession to discover. Let us explore this further.

Read more