Commentary

Will Web 3.0 shatter axioms behind your current business model? What are the implications of Web 3.0 for marketing, supply chain management, IT infrastructure and information security? Aged-old assumptions underlying many business models no longer hold true as Web 3.0. Technology changes how we communicate...

Ever wonder if the network cabling within your commercial building is substandard or the network connectivity coming into your building is obsolete? Commercial buildings have lost value in the current economy. What most appraisers as well as owners don't even measure is the technology within...

Fair use analysis is about as complex as determining whether an older work is protected by copyright. There are hundreds of cases that analyze and apply the fair use factors, including an analysis of the purpose and character of the use, the nature of the...

Earlier this year I proposed that the good ol' predictable days of "aligning IT with the business" have come and gone, and that such an approach has become counterproductive and career-threatening. Since then, a series of factors--from the withering global economy to the relentless demands...

Whether looking for an investor, a joint venture or joint development partner, a strategic hire, or your next CEO, a warm introduction is almost always better than a cold call or solicitation. But the quality and effectiveness of warm introductions vary considerably. In...

The Federal Communications Commission, on September 21, proposed rules that would prevent Internet service providers (“ISPs”) from treating different sources and types of data differently; more to the point, the rules would prevent your ISP from charging a premium for watching content generated by third...

The Federal Communications Commission, on September 21, proposed rules that would prevent Internet service providers (“ISPs”) from treating different sources and types of data differently. These rules would enforce “Network Neutrality.” More to the point, the proposed rules entrench the way that...

IT requirements definition approaches, tools and techniques are based on the hearsay. We ask representatives of the business to tell us what they want and need. If hearsay is inadmissible in court, then why is it admissible in IT? Hearsay evidence is not admissible...

There are seven sources of waste identified in lean thinking. Unnecessary Inventory is one of them and found in any company. On first thought it might be easy to say that there is no inventory in IT so this form of waste does...