Home
Business Guide
 
simplicable technology guide   »  it governance   »  it yes men

The Unstoppable Army Of IT Yes Men

        posted by , December 02, 2012

Ask anyone in IT: the business is the customer — and the customer is always right!

There is something wrong with this model — customers have few responsibilities. They submit their orders and pay their bills ... beyond that you can't expect much from a customer.

Just Face It — Your Business is Lazy

Ask yourself a few questions about your business:

1. Does the business publish goals and strategy and clearly communicate direction to IT?
2. Do executives understand the impact of their IT decisions?
3. Do business stakeholders provide diligent requirements?
4. Does the business provide feedback to published IT strategy and roadmaps?

The Problem

Organizations often view business as revenue and IT as cost. Business focus is on quarterly revenue. In other words, business is given few incentives to collaborate with IT.

The Solution

Organizations struggling with a lack of business-IT alignment often tweak the organizational chart. Few have taken the big jump: a completely integrated IT and business organization. This is an opportunity.



Related Articles



Enterprise Architecture
How to architect an organization.




Continuous Controls Monitoring for Transactions (CCM-T) is a governance, risk and compliance technology. There are 4 typical functions of a CCM system.

Current state blueprints capture business, data and implementation architecture at the conceptual, logical and physical levels.

Scoring the EA team on influence.

Take a few minutes to learn about the Zachman Framework — a framework for Enterprise Architecture.


Recently on Simplicable


8 Enterprise Architecture Risks

posted by Anna Mar
Enterprise Architecture (EA) is supposed to help manage IT risks — but is it possible that EA itself introduces new risks?

Security Through Obscurity

posted by Anna Mar
Security through obscurity is generally considered a bad idea ...

Zombie Armies of The Digital Frontier

posted by Anna Mar
An quick explanation of botnets.

IT Security Guide

posted by John Spacey
A guide to information security including cheat sheets, best practices and checklists.

about     contact     sitemap     privacy     terms of service     copyright