“The appellation Business Rule Management System (BRMS), after all, is merely a rebranding of the lesser named Business Rule Engine (BRE); in most cases the vendor simply made the change to reflect the fashion of the times rather than provide a specific set of tools that reflect the grander moniker. Now, it is quite true that the modern BRMS sports some niftier capabilities than the BRE of yore; but these are mainly extensions to the capabilities of the BRE in the field of rule execution.”
Barbara von Halle and Larry Goldberg, A BRMS is not a BDMS: Ten Ways in Which Dealing Business Rules Vendors can be Frustrating for Business Analysts
“Chargeback is based on the premise that if CIOs make the cost of IT visible to people, they will buy less. They will naturally control their own demand. What we have seen out of chargeback is that all people do is wind up arguing about the price.”
Mark McDonald, as quoted in Supply demand IT vs. IT chargeback
“The internet’s completely over. I don’t see why I should give my new music to iTunes or anyone else. They won’t pay me an advance for it and then they get angry when they can’t get it. The internet’s like MTV. At one time MTV was hip and suddenly it became outdated.”
“Business intelligence (BI) applications offer the promise to be the focal point to customer intelligence across multiple data sources. But, BI efforts often highlight how poor customer data quality really is — leaving users scrambling to fight a losing battle to keep customer data clean and updated.”
William Band, The Top Eight Customer Management Trends For 2010
|Organizations in certain industries will not tolerate the incursion of iPads and iPhones into their IT infrastructure because of compliance reasons.
Kevin McDonald, iPads force their way into corporate IT
Today’s WhatIs.com Word of the Day is ITAR and EAR compliance.
“On the HIPAA side and in ITAR, [customers] were booting iPhones,” McDonald said. “We’re removing them in favor of the Blackberry.” (ITAR refers to the U.S. State Department’s International Traffic in Arms Regulations, which outlaw the export of critical technologies that could be used against the U.S.)
“You can’t centrally manage them or control the apps,” McDonald said. “You can’t remote-delete with any assurance. And in an environment where you absolutely must prove where the data goes and where it’s stored, if it’s encrypted, you cannot do that with an iPhone or iPad.”
In short, the strength of the iPad and iPhone — the availability of thousands of apps — is also their weakness when it comes to security. To be fair, Google’s Android phones fall into the same trap, McDonald said.
Today’s WhatIs.com Word of the Day is N+1 UPS.
Today’s WhatIs.com Word of the Day is non-governmental organization.
|The Library’s main portal for consumer health information is MedlinePlus, available in both English and Spanish. MedlinePlus has comprehensive, up-to-date, easy-to-read information on nearly 800 health topics. It also provides interactive health tutorials and a collection of surgery videos, as well as information about thousands of prescription, over-the-counter and herbal medicines.
David R. Donohue, M.A., NATIONAL LIBRARY OF MEDICINE FACT SHEET
Today’s WhatIs.com Word of the Day is National Library of Medicine.
|Our reliance on the conveniences of remote access, and the ability of our networked control systems to reduce costs and manpower needs, have led to weaknesses that are being exploited daily by our opponents.
Melissa Hathaway, Government Must Keep Pace with Cybersecurity Threats
|The next time you start a project, begin by creating stakeholder groups, indentifying which stakeholder belongs to each group. Next, initiate the communications process with the main stakeholders before even launching the project. If you don’t have a solid communications link with your stakeholders, then your project is poised for failure.
Danielle and Nelson Ruest, Communication with IT project stakeholders is key to success
Today’s WhatIs.com Word of the Day is federal portfolio management.