This site uses cookies to improve your experience. To help us insure we adhere to various privacy regulations, please select your country/region of residence. If you do not select a country, we will assume you are from the United States. Select your Cookie Settings or view our Privacy Policy and Terms of Use.
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Used for the proper function of the website
Used for monitoring website traffic and interactions
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Strictly Necessary: Used for the proper function of the website
Performance/Analytics: Used for monitoring website traffic and interactions
Much of what has been learned is catalogued by the MACH Alliance, a global consortium of nearly 100 technology vendors that promotes “open and best-in-breed enterprise technology ecosystems,” with an emphasis on microservices and APIs. We are now bringing this approach to the more monolithic enterprise systems.”
As I mention in my blog, enterprises integrating external services require: - Identity and access management for each provider - Data compliance, legal and regulatory audit access across each provider - Security compliance systems - Provisioning, including capacity forecasting - Performance (e.g. Enterprise Efficiency. Cloud Computing.
[Continuation of my commented reading of Andy Mulholland's book: "Mashup Corporations. Chapter 7 is about the "typical†barriers to implementing SOA throughout an organization. The authors added this chapter in the 2nd edition following a suggestion by Avrami Tzur (VP of SOA at HP). The End of Business as Usualâ€].
from previous post about my commented reading of Andy Mulholland's book: "Mashup Corporations. When I state that my writings on this blog were about SOA all along, I mean that SOA is probably the best value-adding, customer-facing, tangible web-based implementation (that I know) of a knowledge leveraging strategy.
[Continuation of my commented reading of Andy Mulholland's book: "Mashup Corporations. In my defence, it is probably the most important chapter of the book judging from the powerful messages it conveys. Service-Enabling your Enterprise Applications. Chapter 5 describes 5 rules for successful SOA implementation.
Leading technology publications frequently name David among the top 10 enterprise technologists in the world. He is a true thought leader in the industry, and an expert in complex distributed systems, including cloud computing, data integration, service oriented architecture (SOA), and big data systems.
Tom Stewart in his book “ The Wealth of Knowledge ” (2001) demonstrates how the building and leveraging of organizational knowledge assets can be at the heart of value generation. TCS KM maturity model Enterprise 2.0 THE VIRTUOUS PROCESS OF HUMAN CAPITAL FORMATION. not a game anymore Strategy ROI or no ROI for KM?
link] Reem Saied gives a good short analysis of Freidmans book. TCS KM maturity model Enterprise 2.0 Note: To get a really good sense of this flattening of the World, I advise you to read "The World Is Flat: A Brief History of the Twenty-first Century" by Thomas Friedman (2005). not a game anymore Strategy ROI or no ROI for KM?
I strongly recommend Dennis’ book but in a few words, “the essence Systems Thinking is that the complexity of the real world can best be tamed by seeing things in the round, as a whole. […] Taking a broad view, however, is not at the expense of missing the detail […]. TCS KM maturity model Enterprise 2.0
In fact, even without specific knowledge-sharing tools, it is still possible (but time-consuming) to find a colleague with appropriate knowledge using “standard” tools such as organizational charts, corporate intranets and address books, and projects documentation. TCS KM maturity model Enterprise 2.0
I need to do an updated version of this soon, but it still cover the basics, as does my 2003 book The Future of Knowledge. TCS KM maturity model Enterprise 2.0 You may be interested in the white paper in the library on my website called A Value Network Approach ([link] I provides a quick overview of the thinking behind the method.
How do you do this in an Enterprise 1.0 Yes, this is the way forward and this is what Enterprise 2.0 So I am suggesting that Enterprise 2.0 = Web 2.0 + a cultural change. Here is a basic but hugely rewarding problem to resolve: "Finding and contacting the right person (or group) within an organization to help with a problemâ€.
TCS KM maturity model Enterprise 2.0 Euro org are failing to effectively manage their IC I suppose I must thank you all Knowledge Management in IT Service Mngt BA Heathrow T5 training fiasco History of maths and knowledge sharing Latest trends for Intranet development A great workplace Are consulting firms partly to blame.
I wish if I can invite you to my Business Knowledge & Research Portal that covers my research, management theories, articles, brand directory, dictionary, industry news and most customized search engines like – Article Search, Video Search, Book Search, News Search etc. TCS KM maturity model Enterprise 2.0
While reading recently the very interesting scientific book “ The Next Fifty Years – Science in The First Half of the Twenty-First Century ”, a collection of 25 new essays by leading scientists edited by J. This nicely leads us to the third extract of this book I believe relevant to the leveraging of Knowledge.
We organize all of the trending information in your field so you don't have to. Join 83,000+ users and stay up to date on the latest articles your peers are reading.
You know about us, now we want to get to know you!
Let's personalize your content
Let's get even more personalized
We recognize your account from another site in our network, please click 'Send Email' below to continue with verifying your account and setting a password.
Let's personalize your content