Wednesday marked the beginning of a new decade, and perhaps the beginning of a new era in digital, as the California Consumer Privacy Act (CCPA) went into effect as law. While the CCPA’s statutes are overly burdensome for today’s data-powered Internet economy, the law is a necessary step in restoring balance of power and trust across Internet behemoths, consumers and legislators.
What does it mean to ‘rock’ at Agile Project Management? Aligning with the three areas of the Talent Triangle takes agile beyond the mediocrity of ‘just doing agile’ and to the next level, the Rock Star enterprise level.
Below are our Senior Vice President, Jim Blizzard’s Top 7 ways to be an Enterprise Agile Rock Star.
Service Oriented Architecture (SOA), microservices, and cloud best practices can result in the creation of loosely coupled complex systems with many potential points-of-failure. At Impact Makers, we observe many customers dealing with service outages, which are difficult to diagnose and more importantly, difficult to recover from quickly. Service outages have significant financial impact; therefore, it is incumbent upon software architects and engineers to find ways to prove the systems we build and deploy make it easy to detect and recover from failures.
Robotic Process Automation – using bots instead of associates to perform processing tasks – can be an effective way to increase speed and accuracy while redeploying associates on higher-value processes and projects. RPA implementations are commonplace across financial services and healthcare, as both industries have a disparate mix of non-integrated systems and data-intensive processes. However, RPA as a solution has finite value and should be compared against more strategic solutions such as true machine learning, BPMS and microservices integration.
What is your reaction when you hear about a hack? Maybe “hacker” elicits thoughts of a sinister group of computer experts in a fortified basement committing acts of espionage and cyberwarfare. Hacking is frequently associated with illegally gaining access to critical personal, organizational, or government information. Oh yes, and of course, dark hoodies. It’s obviously very cold in the basement.