In the past, I have contributed on topics like innovation management and open innovation. I have always been a big fan of innovation. But then recently I stumbled upon the term “fabrication”. I was talking to this friend of mine who works in the R&D department of an IT company. We were debating about product lines and how to expand or diversify them. As the debate heated up, he very passionately announced, “I would rather innovate than fabricate!”
Read More Product Development – Innovate or Fabricate?
When it comes to enterprise systems, the one common thread running through all of them is their intent to improve enterprise decision making. All of them support disparate processes and cycles. But at the end of the day the bottom line is to improve the quality and time of decision making. The same is true in case of enterprise content management system popularly known as ECM.
Read More Mobile ECM
In March 2011, RSA – EMC’s security division – sent shockwaves through the industry as it announced a sophisticated cyber-attack on its SecureID system. Theft of unspecified information from SecureID has left marring scars and lot of red faces. But at the same time it has raised a lot of questions for IT industry as a whole.
Prior to the attack, SecureID was a benchmark in two-factor authentication system. But the attack proves that just having a strong security mechanism is not enough. We cannot just deploy a security system and hang up our boots expecting it to take care of everything. We have to be vigilant at all times and keep testing the security of our IT setup. In other words, we need to regularly conduct an IT audit.
Read More Information Technology Audit
Remember the early days when the concept of customer relationship management (CRM) systems had emerged? There was a mad rush in the market and almost everybody wanted to try out this newly discovered abstract. But as the dust settled on CRM, we realized that CRM systems were not just about anybody’s cup of tea.
This realization brought about a phase where CRM systems became entitlements of enterprises that had deep pockets. These enterprises had big budgets, talent pool, and IT resources available at hand to successfully deploy CRM systems. It was a time when CRM systems made silent inroads into enterprise IT architecture. And now after a quiet and peaceful existence for some time, CRM systems are back in the limelight.
Read More Traditional CRM & Social Media – An Interesting Wedlock
A few days back, I came across news of a raging storm uprooting some giant oak trees and blocking off traffic for several hours. Initially, I didn’t bat an eyelash or gawk at nature’s fury. But then a very quirky thought came to my mind. I thought ‘how come I have never read about bamboo trees getting uprooted’. The answer was staring right back at me. Bamboo trees survive the worst of storms because of their agility and ability to adapt.
We as enterprises need to be more like bamboo trees and less like oak trees. The more rigid we are in our ways and processes the more likely we are to lose our footing. But if we are open to new technologies, processes, and experiences, we have a far better chance of surviving and thriving.
Read More Technology Change Management