A Simple Technology Game Plan for Entrepreneurs

You have a vision of providing a unique product or service to the world, but that pesky little thing called technology is just standing in the way like a big bouncer at a trendy, popular nightclub. If you could do it yourself, you would do it in a heartbeat, but there’s only so much available… Read More

How to Write a Technology Game Plan for IT Projects

These days, a growing number of companies are adopting techniques from IT (Information Technology) world for solving common problems. For instance, some of these companies are adopting the use of version control for non-technical documents and other objects of collaboration in the workplace. Another technique more companies should adopt is the documenting of solution proposals… Read More

Solution Architect? Enterprise Architect? Application Architect? What’s the Difference?

By John Conley III In the IT world, and in particular in the software side of IT, the word “architect” has evolved into a gray, confused mess, to be honest. I like how Geeks with Blogs humorously stated the 2 biggest misconceptions about the architect role: •An architect is simply a more senior/higher-earning developer with… Read More

How Much Influence Should Politicians Have Over Cryptography?

By John Conley This is a topic I’ve thought about at times when I read or see news headlines where certain political leaders call for tighter regulations on how data is encrypted on our smartphones and computers due to an existential terrorist threat. The claims made during press conferences and interviews often make me cringe… Read More

BPM is dead. Long Live BPM!

Long live BPM! Business Process Management, BPM for short, is close to couple of decades old. I feel sad for the companies that make Business Process Management (BPM) Software. Reason? They have been fighting the perpetual battle of adapting to the change that has been plaguing this category. At first I think the BPM Vendors… Read More

Gartner BPM Summit 2014: Implementing an Application Rationalization Program | MicroPact

In an insightful session here at the Gartner BPM Summit in Las Vegas, analyst Andy Kyte discussed the need for application rationalization and how BPM can play a role in such an effort. In this post I will highlight the points that jumped out to me, and I will also look at them in the… Read More

Protecting your data in the age of the NSA and PRISM

Soon after Edward Snowden released a cache of top-secret documents detailing the far-ranging data collection activities of the U.S. National Security Agency (NSA) in the summer of 2013, the Federal Bureau of Investigation (FBI) approached the secure email provider Lavabit with a demand to turn over the encryption keys to its communications. Their target was,… Read More