Medium a955e8e5 cb84 4552 8391 ae10b9fcd7e0

Good news, bad news in new open source software report

The popularity of open source continues to rise exponentially. Demand for JavaScript, for example, is huge. However, popularity does not infer less vulnerability. The percentage of vulnerable Java components downloaded has increased substantially over the past four years. The rise in overall open source-related breaches should be seen against the background of the massive growth in the use of open source components.  It appears that some open source component users are oblivious to all advice and warnings. 

Medium 3ae548d9 93d5 48da 8c04 496d03503033

Five Reasons to Move to a Decentralized Collaboration Model

Your enterprise must take to ensure security, governance, and compliance over the content and communications that take place through your enterprise collaboration tools. The good news is that this work takes place at one level, and what comes from that work can become a set of standard policies to govern team-level collaboration sites. It’s essential to create corporate policies and training for teams that may be opening their collaboration sites to external parties.

Medium 2a9c602c 3250 4461 920e 9595ef8b615d

Defining DevOps: How Do You Know When You Have Achieved DevOps?

How do you know when you have achieved DevOps? and you are likely to get different answers. A practical answer to how do you know when you have DevOps depends on having a definition. While defining DevOps itself has been elusive, an enterprise definition is needed for alignment and progress measurement. Considering that DevOps needs continuous flow to accomplish business goals, it can be said you have DevOps when you have implemented continuous flow for at least one model application.

Medium fabc28db 2951 4f72 b974 35e3acdb381c

Companies Must Learn To Edit Their Business Models

Leadership teams tend to have innate biases for certain asset types, and that these preferences drove business model. Like a good driver, a leader needs to know when to speed up to catch the competition, when to shift investment into the right kinds of capital, and when to refuel with new skills, mental models and board members. Just as the human genome offers the prospect of personalized medicine, the value genome offers the prospect of tailored capital editing—refocusing companies on high-value, scalable assets.

Medium f107bcba 0bb5 4f56 9138 fc84c282ebb9

Five Key Considerations When Implementing Any Product Team

When creating the product team, ensure you listen to feedback from the individuals likely to be impacted, don't just do a paper exercise of moving people into new organisational structures. The teams on the ground know what skills and resources they need in their product teams, they know the issues they face and will have good ideas on how to address them, the key aim is to maximise the flow of valuable work into the team. 

Medium b94aa51d f2d3 483d acc4 365148ed9ac8

Nine Pillars of Continuous Security Best Practices

While DevOps offers immense value for software deployment, the adherence to best practices is essential to reduce risk and assure security. Each organization is different and has different security postures.  This blog enumerates best practices for security across nine pillars of DevOps: Leadership, Collaborative Culture, Design for DevOps, Continuous Integration, Continuous Testing, Continuous Monitoring, Elastic Infrastructure, Continuous Delivery/Deployment and Continuous Security. Examples of best practices for each pillar are listed. These practices can be used to assess an organization’s maturity within the journey to Continuous Security, often referred to as DevSecOps.

Medium f58a0557 269d 4eda a893 3e9808539bc2

Multi-Model Databases: Are They a Fit for Your Enterprise?

Multi-model databases (MMDB) have rapidly gained importance in the market. However, is MMDB the right choice for your project or enterprise? While there are plenty of advantages, multi-model is not the ultimate solution for every situation. It is not a way to force developers to use a variety of data models, nor can one layered or native multi-model database integrate every data model efficiently. It’s more about enabling developers to leverage the advantages of different models for different aspects of their applications.

Medium 1062646a 9aab 4c39 906f 9b4aa538cd4c

Spring Cleaning 101: Polishing Up Your DevOps Processes

As the frequency of execution increases, dev teams find themselves between a rock and a hard place. While the growing demand for faster turnarounds isn’t poised to slow down anytime soon, teams struggle to integrate a set of tools into an efficient pipeline to get the job done within the time allotted. With demand on the rise, how can teams work together to fast-track their release cycles? With spring cleaning season upon us, dev teams across industries should take time this season to tune up agile processes and continue the work of advancing their shift toward DevOps.

Medium 29c3411c 8a9b 4a23 b0fd 796096c7ea6e

Leading Business Transformation From the Top

New agile digital disruptors have realised the importance of centring their business objectives on value and technology, making it vital for traditional incumbents to follow suit. If waterfall organisations ignore this challenge, their ability to innovate, and react quickly to market changes and new customer demands is threatened. To change and succeed, the active involvement from the C-suite is essential to instil a cultural shift, placing value and people - employees and customers - at the centre of any transformation.

Medium 9c35f50c 6168 4dc7 a99e f3b1afc4df76

Twenty-Seven-Factor Assessments Lead to Success With DevOps

Complexity can plague the success of DevOps within an organization. Complexity cannot be avoided, as DevOps is complex and will likely continue to be. However, the key to avoiding failure through your DevOps journey is to engage the complexity by using DevOps tenets to implement DevOps. Do not try to boil the ocean. Instead, at each leg in the journey, take inventory of where you are in terms of current goals, state, and best practices. Fine-tune your direction and build your solution using proven continuous delivery methods.

Medium 02cb90b1 c738 4152 a8e7 c4c342ff6675

The Essential Toolbox for DevOps Analytics

Since DevOps involves a collection of team members from all parts of the software delivery lifecycle (SDLC) process, the central platform needs to meet the needs of all team members. As you work to build your next test analysis toolbox, consider the five features to efficiently evaluate the data, act upon it and deliver iterations and features with confidence. Let’s explore these five essential tools that enable DevOps teams to quickly and efficiently analyze data, triage issues and act upon failures with the best possible insights.

Medium e1dad083 c9b5 4ff1 9ce6 3c8aebccb2e0

Storage strategies

Today’s IT landscape is dominated by cloud, edge computing, IoT, AI and other disruptive technologies, and the datacentre remains at the heart of the organisation. Its role is key to delivering IT services and providing storage and networking to an increasing number of networked devices, users, and business processes. The explosions of data, as well as businesses embracing digital transformation, are all factors that play a part in not only storage strategies, but also the evolution of the datacentre. 

Medium 8024aa4a d148 45e0 8b4e b80311861c1c

Understanding Cloud Data Services

As the technology gets easier to deploy, and the Cloud Vendor data services mature, it becomes much easier to build data-centric applications and provide data and tools to the enterprise.  This article is aimed at helping big data systems leaders moving from on-premise or native IaaS (compute, storage, and networking) deployments understand the current Cloud Vendor offerings. Those readers new to big data, or Cloud Vendor services, will get a high-level understanding of big data system architecture, components, and offerings.

Medium 10689d73 b140 4124 bc61 67d6d39f5153

An Introduction to Big Data: Distributed Data Processing

Introduction to Big Data provides a broad introduction to the exploration and management of large datasets being generated and used in the modern world. A solid understanding of the basic concepts, policies, and mechanisms for big data exploration and data mining is crucial if you want to build end-to-end data science projects. Many datasets are too large to fit on a single machine. Unstructured data may not be easy to insert into a database. Distributed file systems store data across a large number of servers.

Medium eb1c0f19 5d7b 4bb0 b361 38a8d342bceb

Impact 101:Five Steps to Scale Your Work

Everyone that talks about scaling should understand that they are referring to the ability of their work – whether a system, a tool or some other innovation – to cope and perform under an increased or expanded workload. Something that scales well will be able to maintain, or even increase, its performance or efficiency when tested by larger operational demands. How do I increase the impact of my work? There are typically five steps needed to scale one’s work.

Medium 05936ef8 9c3a 44d1 a682 82893eed16a0

Clearing the confusion around digital process transformation

The plethora of automation tools available out there can be extremely confusing for organisations wanting to embark on a digital transformation process. Two-thirds of global service organisations were engaged in digital transformation, with 16% claiming to have already completed the process. it is important for organisations to take a holistic view of what they are hoping to achieve, before deciding on which automation approach to take. This is not always easy, as enterprise architects have to choose from a confusing range of process automation options as a foundation for the transformation journey.

Medium ef40f7d3 6a0f 4981 b7c8 6a70944db8ea

Three Tips for IT Asset Management (ITAM) Discovery

IT discovery is the foundation to your IT asset management (ITAM) solution. If discovery is unreliable, then all of the asset information you are trying collect will not be reliable. Don’t let IT asset discovery become a stumbling block to your ITAM solution. Be sure to have clear objectives and a clear vision of the reports that will be needed to support those objectives. Set your discovery tools to discover and monitor assets relevant to your objectives. Most important, don’t overwhelm your IT employees with unnecessary discovery information, especially during the early phases of the project.

Medium b2f6d294 a457 475f 920c 86fd63cc1361

How Big Data is Changing the Insurance Industry

Going forward, access to data and the ability to derive new risk-related insights from it will be a key factor for competitiveness in the insurance industry. New approaches to encourage prudent behavior can be envisaged through Big Data, thus new technologies allow the role of insurance to evolve from pure risk protection towards risk prediction and prevention. Using Big Data analytics, insurance can offer personalized policies, precisely assess risks, prevent fraudulent activities, and increase the efficiency of internal processes. Let’s take a closer look at several Big Data solutions for insurance.

Medium 6abde565 8aa7 4931 9b8c 547bbf9b4663

A Short History Of Big Data

The term Big Data has been around 2005, when it was launched by O’Reilly Media in 2005.  However, the usage of Big Data and the need to understand all available data has been around much longer. While it looks like Big Data is around for a long time already, in fact Big Data is as far as the internet was in 1993. The large Big Data revolution is still ahead of us so a lot will change in the coming years. Let the Big Data era begin!

Medium 98c203a8 9fb0 4d8f 8f4f f72b4879b215

The future of system architecture

The old way of doing system architecture will not disappear entirely, but it is already past time we started thinking about how to improve the efficiency of our system architecture practices so they better support today’s rapidly evolving business climate. The next major effect of networks on the evolution of system architecture was the desire to integrate systems. It did not take long to realize that entering the same data into different systems was time-consuming and error-prone, so we began to try and integrate systems so they could share data. 

Medium 63999f0b ee54 4b68 aebb 69e5a00d8d7a

Learning to harness complexity

Increased access to vast amounts of information, social media, and ubiquitous computing makes it seem as if the complexity of our world is increasing faster than we can comprehend it. But technology is not driving complexity; it is only making complexity more visible. Trying to eliminate complexity is an impossible task, and traditional approaches to enterprise architecture have proven ineffective in dealing with it. By thinking about enterprise architecture in a new way, we can make that complexity work for us, and harness emergent behaviors to help achieve an organization’s goals.

Medium 23b3d094 b374 4ef7 b5c3 760c8a97fb8f

Seven steps to revenue-driven IT

IT as a whole has really moved from the things that help the business do day-to-day jobs, to becoming the engine that actually drives the organization. Often, new products and services can’t be launched without IT, and it’s also becoming the point that IT is the product or service being launched. Nearly two-thirds of CIOs say that driving revenue through the creation of new products and services is among their responsibilities today. CIOs offer seven steps to shifting to revenue-driven IT.

Medium 0593f5b6 0162 494b 9ba2 e7696ff1210a

Cloud-Native Environments: A Challenge for Traditional Cyber Security Practices

In recent years, the development of massive computing and storing capacities in the hand of a few internet juggernauts led to the rise of the cloud economy. Companies of all sizes have been moving their mission-critical servers and operations to the data centers. On the face of it, the development of Infrastructure as a Service (IaaS) should be good news for the state of cybersecurity. In this context, it is easy to believe that moving to the cloud could mean solving many of your cybersecurity issues.

Medium 979fadae aa44 4222 8af8 1ac53e2d809c

Rise of the Chief Data Officer (CDO) and the Impact to ITSM

Many organizations are realizing the value of their data so they are beginning to treat their data as a company asset; hence, the rise of the Chief Data Officer (CDO). Data provided from IT service management reports and metrics will be vital information for the CDO as he/she defines strategy for new technology, process, policy, security, and IT architecture. ITSM managers should expect the CDO role to have a direct impact on how IT service management will be implemented, delivered, measured, and most importantly, integrated with other IT solutions within the organization.

The Harvard Innovation Lab

Made in Boston @

The Harvard Innovation Lab