IT Strategy & Implementation

Home/IT Strategy & Implementation

How to create IT innovation

By |2019-08-27T16:40:18-06:00March 7th, 2017|@enable_change, IT Strategy & Implementation, Leader Change Capability, Leadership and Management|

Exclusive research from the CIO Executive Council shines a light on how IT leaders are defining and driving IT innovation. Register now to download the free report.This research article has some interesting insights into the thinking and beliefs around defining and driving IT innovation. The principles they discuss are relevant, not just for IT, but for any organization trying to develop a culture of innovation. As mentioned in the article, “Innovation is change”. To be successful, leaders have to be change agents and develop a culture of trust, transparency and flexibility. Read the full article at:

Artificial Intelligence and The Future of Work: An Illusion

By |2017-02-15T23:21:17-07:00February 13th, 2017|@enable_change, IT Strategy & Implementation, Organizational Change Capacity|

Interesting guest post by Stuart Phythian World traveller, writing & researching on #futureofwork impact of #digitaltrends#tech #AI & #100yearlife This year has seen, what appears to be, an unusually high level of soothsaying predictions on technological ‘Revolutions’, and how theRead the full article at: This is not a post that can be skimmed quickly to pick up a few main points. This one requires a full cup of coffee and some noodling time. Based on Phythian’s premises and observations, whatever conclusions you draw will not be superficial. Phythian suggests that we are experiencing a somewhat frenetic buzz about the effects of technological revolutions and the changing work place: Artificial Intelligence replacing “50% of our jobs, “emerging new business models…such as Uber and Airbnb” replacing old ones, and Millenials impacting the working landscape. While he acknowledges these concerns “may or may not be true,” he believes the frenzy “overlooks some major demographic changes occurring, both globally and in our backyards.” The post goes on to identify some of these major demographic changes and discuss their impact the future of work and our own competitiveness:“There were approximately 200,000 UK Graduates in 2016 entering the job market, whilst there were 7.7 million Chinese graduates alone, more than seven times that of 15 years earlier!”“The population of pensioners is increasing as we see the baby boomers begin to retire, putting pressure on those supporting them, either physically or fiscally. Currently, every pensioner across Europe is supported by four of working age. It’s forecast this will reduce by 2060 to one pensioner for every two of working age.”“Two-thirds of baby-boomers are now expected to live past 80 years old…It’s conceivable that a majority of children born today could live to see 100 years…This has the potential to turn-around the traditional education, work & raising a family, then retirement at 60+ into considering a working life punctuated by sabbaticals and mid-career breaks.”“Lifelong learning will be a necessity, especially in computing and related fields.”He sums up his thoughts by saying, “We are right to be aware of new technological advancements. The challenges to bear upon us are far greater, by a rapidly ageing population, increasing global competition and the life we live from cradle to grave, as we expect to live for much longer.” Maybe this one will take two cups of coffee. Contact us and we can help you sort through the technology and work place changes that currently are impacting or have the potential to impact you and your business.

The 7 Most Sensational Breaches Of 2016

By |2017-03-05T20:07:22-07:00January 31st, 2017|@enable_change, Cyber Security, IT Strategy & Implementation|

The biggest hacks, data exposures, and thefts that left companies and government entities reeling.Read the full article at: A list of security breaches? Why not? People like lists. It happens every year, at the end or the beginning. Some are lists of things to do for the next year. Some are lists about the previous year -- like the 2016 best or worst songs, novels or movies. There’s a list of the world’s richest people, the most expensive universities, the cheapest cars and even a list of the largest government technology contracts. Bucket lists, most wanted lists, wish lists, Santa lists. And the list goes on. So, here is a list of the most sensational security breaches for 2016. From emails to bank accounts. From the IRS to Yahoo. From Illinois and Arizona Boards of Election to the San Francisco Municipal Transportation Agency. Data exposed, money stolen, CEO’s fired, people harmed, and, possibly, presidential elections lost. Breaches happen all over the world to all types of businesses, agencies and individuals. No one is immune. Nothing is off limits. We must be diligent and make it our responsibility to actively safeguard our personal and business data. The weakest link in a cyber security network might be the human one. Contact us and we can help you understand the risks and help you make cyber security choices that are the right ones for you and your business.

Are Users Careless or Simply Human?

By |2017-05-23T10:53:08-06:00October 18th, 2016|Cyber Security, IT Strategy & Implementation, Organizational Change Capacity|

The concept of “psychology of security” is often a foreign concept to  IT professionals, yet they all acknowledge that users are the biggest challenge. When hackers are unsuccessful at exploiting technical vulnerabilities, they turn their attention towards users. They scan for responses to psychological triggers and cognitive patterns that can [...]

Go to Top