Skip to content

Managing Technology

Page 12 of 18

  • What Makes Information Workers Productive

    Technology use, diverse networks and access to new information all enhance productivity.

    More

  • Why VIPs Shouldn't Get the Best Tech Support

    Two Unisys studies indicate there's a wiser use of your IT resources.

    More

  • Avoiding the Alignment Trap in IT

    For many years now, companies seeking to deliver higher business performance by harnessing IT have focused on alignment -- the degree to which the IT group understands the priorities of the business and expends its resources, pursues projects and provides information consistent with them. In practical terms, that means there must be shared ownership and shared governance of IT projects. However, the authors contend that their research -- a survey of more than 500 senior business and technology executives worldwide, followed up with in-depth interviews of 30 CIOs -- reveals a troubling pattern: Even at companies that were focused on alignment, business performance dependent on IT sometimes went sideways, or even declined. That's because underperforming capabilities are often rooted not just in misalignment but in the complexity of systems, applications and other infrastructure. The complexity doesn't magically disappear just because an IT organization learns to focus on aligned projects rather than less aligned ones. On the contrary, the authors say, in some situations it can actually get worse. Costs rise, delays mount and the fragmentation makes it difficult for managers to coordinate across business units. The survey also showed that almost three-quarters of respondents are mired in the "maintenance zone." IT at these companies is generally underperforming, undervalued and kept largely separate from a company's core business functions. Corporate management budgets the amounts necessary to keep the systems running, but IT doesn't offer enough added value to the business and often isn't expected to. Drawing on the experiences of Charles Schwab & Co., Selective Insurance Group, De Beers, First Data Corp. and National City, among others, the authors identify a group of best practices that constitute "IT-enabled growth." The companies that achieve the highest growth at a low cost manage complexity down, source IT staffing and software wherever it makes the most sense and create start-to-finish accountability connected to business results. Then, and only then, the best performers tightly align their entire IT organization to the strategic objectives of the overall business, using governance principles that cross organizational lines and making business executives responsible for key IT initiatives.

    More

  • How to Plan E-Business Initiatives in Established Companies

    A new planning process, tested at established companies, puts e-business into perspective and helps make it manageable.

    More

  • The Trouble With Enterprise Software

    Has enterprise software become too complex to be effective?

    More

  • Beyond Enterprise 2.0

    Over the last decade, the Internet has transformed many aspects of the way business is conducted -- from how goods are bought and sold to where work is done. To explore what might constitute the next generation of Web technologies and what effect they will have on the nature, purpose and management of organizations, MIT Sloan Management Review contributing editor Martha E. Mangelsdorf talked with two leading experts: Erik Brynjolfsson, director of the MIT Center for Digital Business and the George and Sandra Schussel Professor of Management at the MIT Sloan School of Management, and Andrew P. McAfee, associate professor of business administration in the Technology and Operations Management Unit at Harvard Business School. Brynjolffsson and McAfee are confident that the future emphasis of some businesses will be on the use of Web 2.0 technologies to support innovation, creativity and information sharing rather than just to achieve cost cutting. They discussed the complementary relationship between traditional managerial tools, such as ERP and CRM, and the evolving modes of collaboration and communication, such as wikis. McAfee pointed out that one set of tools allows good ideas to percolate upward, after which the very structured process-management technologies can be used to replicate the innovation -- with brutal efficiency in some cases. Companies in very turbulent, information-intensive industries tend to be the ones that have gone the furthest with deploying the new Enterprise 2.0 infrastructure and the mindset that goes along with it, said McAfee. There are "softer cultural things" that companies can do to promote creativity among employees, Brynjolfsson said, which gives them the freedom to work laterally or diagonally within their organizations. The cultural shift away from the classic notions of productivity and output, such as billable hours, is more difficult for some companies to manage, and neither Brynjolfsson nor McAfee sees any technology that by itself will resolve this dilemma. According to Brynjolfsson and McAfee, technology innovation is engendering a whole set of complementary innovations in organizations that actually heighten the role of managers and executives. In fact, they said, it will be managers who will have to increase the ambient level of participation in and contribution to these Enterprise 2.0 environments. Companies cited in the discussion that are integrating the new technologies and cultivating the complementary cultural changes include Google, retail pharmacy chain CVS, Spanish fashion retailer Zara and Canadian software developer Cambrian House.

    More

  • How Secure Is the Internet?

    Although the Internet has become an indispensable tool for 21st-century organizations, a 2005 report of the President's Information Technology Advisory Committee bluntly states that the information technology infrastructure of the United States is highly vulnerable to terrorist or criminal attacks. In a brief overview of this sobering situation, MIT applied mathematics professor and Akamai Technologies chief scientist Tom Leighton, who served on PITAC and chaired its cyber-security subcommittee, describes two of today's big Internet security threats: denial of service attacks and "pharming" -- both of which could be used to disable individual companies or critical infrastructure, such as the nation's utilities. At the present time, little is being done to fix these problems, says Leighton, though the advisory committee recommended that the U.S. government lead the way by funding long-term, fundamental research on cyber-security issues. Doing so, would promote wider adoption of improved Internet protocols, and that, he says, would lead to a more secure, reliable Internet infrastructure.

    More

  • Bridging the Gap Between Stewards and Creators

    When conflicts aren't managed well, a company's ability to innovate may be at risk.

    More

  • Suing Your Software

    The multitrillion-dollar IT industry's status of freedom from liability for consequences of product and service failure is historically unique and extraordinary, argues the author, and it is nearing its end. In a world increasingly dependent on software to run critical systems, including cardiac devices, financial markets and transportation systems, the potential for catastrophic and lethal failures increases. However, in the U.S. and elsewhere, at least where life and limb are not involved, it is technology users, not providers, that are regulated. Technology providers have benefited from a series of inhibiting factors including early legal settlement, corporate users being unwilling to offend their IT providers, and aggressive self-regulation in the industry. Eventually, the author argues, this will not be enough to stem the tide of IT regulation, and IT providers must be prepared for that day.

    More

  • Finishing Off IT

    The author re-examines the role of IT as a commodity and considers whether IT can still be used to provide strategic advantage. In discussing regulation, outsourcing relationships and corporate dependence on IT, this article further clarifies the argument that IT will soon be handled by larger corporate utilities. While agreeing that most IT functions can be outsourced to utility-style providers, the article suggests that in-house corporate computing can still provide a strategic advantage. By examining failed IT outsourcing relationships, the author identifies key aspects of IT, including auditing and reporting procedures and customer-facing resources that are too important to a firm's success to outsource. The author argues that to better exploit these advantages, managers should embrace the fact that IT is no different than any other corporate function, instead of placing it in its own silo separate from other business practices. Only then will the real commoditization of IT be complete and the long-promised benefits be seen.

    More