IT Management Article Archive

  • Svyatoslav Kotusev, an independent researcher, discusses the, sometimes, complex relationships between the different types of enterprise architecture artefacts.
  • Lucy Ireland, Deputy CEO at BCS Learning & Development, looks at how focusing on the problem rather than rushing to solutions can ameliorate project underachievement, and shows how a business analyst can help.
  • Peter Wenham MBCS, Director of information assurance consultancy Trusted Management and committee member of the BCS Security Forum strategic panel, examines ransomware and discusses how individuals and organisations can keep themselves safe(r).
  • The internet of things promises amazing possibilities. It also threatens chaos if security isn't taken seriously. Thomas McGrath considers how we can ensure we stay safe and still enjoy the new technology’s benefits.
  • Despite a large amount of negativity around offshoring software development, Paul Taylor - a change consultant - outlines a simple three step process to allow firms to successfully offshore software development.
  • Digital Business Analyst, Ian Hunter MBCS, responds to a recent event on women in IT, namely BCS’s Women in IT Question Time Debate, hosted by Zurich in Fareham, who proved to be excellent hosts for an evening of stimulating discussion and debate.
  • Svyatoslav Kotusev discusses eight specific enterprise architecture (EA) artifacts that seemingly can be considered as essential for EA practices, and explains how these EA artifacts map to the generalised CSVLOD taxonomy.
  • The link between increased business performance and inclusivity is hard to deny. But to feel the benefits, organisations need to make diversity part of their DNA, writes Martin Cooper AMBCS.
  • Martyn Thomas CBE FREng looks at current vulnerabilities in our systems and compares cybercrime to a disease - what can be done at the project level?
  • Nicholas D. Evans reveals four strategic technology trends CIOs need to embrace when planning for the year ahead.