Does the Tragedy of the Commons apply to application portfolios? Many business and application leaders are known to address a bloated application portfolio. They should look at the decades of research in a widely known economic problem, The Tragedy of the commons, for guidance. We discuss here today what The Tragedy of the commons mean.

Application leaders have struggled to achieve meaningful outcomes from application rationalization efforts as they do not have the authority to standardize business processes. The state they are in has parallels…

Technology
Read more

Vendor monitoring and management to lower risks Analytics vendors offer a free or low-cost named-user licensing that enables them to sell their products directly to business analysts. But if not properly monitored, this practice can potentially aggravate the trend to bypass traditional software procurement processes and make the analytics program even more difficult.

Most of the times, organizations face difficulty when they have to decide which licensing model would be more cost-effective for them, in the present scenario as well as in the…

Blockchain
Read more

Application Rationalization: 3 steps to success Contrary to what anyone might say, application rationalization is an intense and long-term transformation of business capabilities. It requires strong governance and clearly assigned responsibilities. We look at the steps to successfully implement application rationalization.

Application rationalization is the process of analyzing the applications being used by your enterprise to determine the presence of overlapping functionalities, unused applications and sunsetting technologies in order to improve…

BlockchainTechnology
Read more

Importance of adaptive sourcing strategies Innovation is one of the most popular subjects today in business and technology. It is expected that about 70% of all businesses will modify their sourcing strategies in the near future so that costs can be lowered and overall quality and flexibility can be increased.

Data and analytics leaders must become enablers of the expansion of analytics throughout the organization. Instead of trying to stop land-and-expand strategies, and in turn hinder the natural progression of…

BlockchainDigital Business
Read more

Why do you need SCA technology? It has been predicted by Gartner that about 30% of enterprises will adopt SCA technology by 2018 to secure their software supply chain against known vulnerabilities. We talk about the technology and try to understand the reasons behind this prediction.

Companies around the world are using open source libraries for application development. But these third party libraries can contain hidden vulnerabilities which may not be easily detectable and are further…

BlockchainTechnology
Read more

What is RASP and how can it be used for the security of DevOps? For some time now, applications have been targeted by hackers who are looking to penetrate an enterprise. The main reason is that even if they cannot find and exploit a vulnerability in an application, they always have a chance to pull off a data breach. One way to prevent a breach is to have the applications protect themselves by identifying and blocking attacks in real time with the help of Runtime Application Self-Protection (RASP).

The likelihood of finding a vulnerability in an application is quite high. Most applications are not very highly tested for security during the development and quality assurance stages, and go…

Blockchain
Read more