Since IT projects are particularly prone to ignoring risk and escalation of commitment, reviewing some of the research on how we make decisions will benefit any IT manager or PM.
Succeeding at Software Projects
Software projects are almost always late and underdone. Most executives take it for granted nowadays that developers will turn in something other than what was requested for more than was announced. They even admit that this is one of the biggest reasons that they outsource, because the contracts with outsourcers force the organization to develop software in a rational way. …
Teesside Confidentiality Model as presented at SACMAT
this year. Regretfully, I didn’t attend but I have been pouring through the proceedings. As I promised months ago, this post highlights some of the more interesting points for those of us doing access control technologies for software systems.
Latest issue of COMPUTER actually useful
Wouldn’t you know it? The last issue that I have coming to me before I was going to end my IEEE Computer Society membership and it had to be interesting. I’ve been reading Computer for several years now and I’ve gotten to the point where I just pass it on to some other IT schmuck without actually opening it. I …
IT Workers Strategize Differently About Problems
Role playing (and no, we are not talking about a gaming session of Warhamster) has been shown to greatly increase forecasting accuracy, yet it has a pretty bad reputation with the academy. Probably because it does not have a theoretical or mathematical background to it, but more of a three-year old feel
SQL phreaking
Phreaking. Phreaking. Phreaking.
Yes, Virginia: IT Doesn’t Matter
It’s not a question of whether to spend or not spend.
It’s about what really matters.
It’s the people, people.
I’ve never agreed with anyone who says that “People are our greatest resource” because: 1) if you have to remind us it probably isn’t true and 2) I resent being the equivalent of a printer.
Role Based Access Control (RBAC) vs. Access Control Lists (ACLs)
Executive Summary From a security perspective, RBAC always provides superior security to ACLs. However, there are places where the cost of using RBAC would be too high. These include: the security of Windows file systems, Oracle/Sybase/SQL Server DBA and employee-specific functions such as where an employee manages his or her own 401(k). Developers should use RBAC in almost all cases. …
“CRM applications . . . yield mostly poor results.”
Again and again we see that customers want trust and trust comes from a relationship with an individual, which then accrues to the corporation.
Do You Know the Brokers In Your Company’s Knowledge Marketplace?
Information brokers can successfully circumvent a knowledge hoarding culture by finding non-hoarders and in my experience, usually do.