Remove Architecture Remove Change Management Remove Leadership Remove Off-The-Shelf
article thumbnail

AI adoption accelerates as enterprise PoCs show productivity gains

CIO

To keep up, Redmond formed a steering committee to identify opportunities based on business objectives, and whittled a long list of prospective projects down to about a dozen that range from inventory and supply chain management to sales forecasting. “We We don’t want to just go off to the next shiny object,” she says. “We

article thumbnail

Examining Mr Price Group’s search to modernize

CIO

She admits it’s often about finding symmetry between what the business wants, and what she and her team need to do to provide business architecture that’s sustainable, secure, and flexible now and into the future. “If, It’s the basic, non-sexy ‘just has to happen’ kind of stuff,” she says.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

Expat CIOs: IT leaders broaden horizons with global experiences

CIO

With lots of Indians here and not much of a time difference, change management is less, too.” The challenges of managing IT in a foreign land Adjusting to a new environment, motivating team members, and earning trust are challenges all expat CIOs confront.

article thumbnail

Book review: Accelerate

Henrik Warne

The change fail rate is the percentage of times a change to the system (such as a deploy or a configuration change) fails. The change fail rate is the percentage of times a change to the system (such as a deploy or a configuration change) fails. Software Delivery Performance. Improvement Drivers.

article thumbnail

How to Talk to Your Boss About Zero Trust

Tenable

A recent Executive Order from the Biden Administration put zero trust architecture in the spotlight. If your executive leadership hasn't yet come around asking about your plans for zero trust, we assure you it's only a matter of time. In most organizations, it can be implemented using existing off-the-shelf cybersecurity products.