Internet Industry Search Engine

Enterprise architecture: A key driver of digital and analytic transformation

https://www.infoworld.com/article/3338104/enterprise-architecture/enterprise-architecture-a-key-driver-of-digital-and-analytic-transformation.html
See More From: infoworld.com

Feb 4, 2019 3:35 PM 2+ mon ago

IDG Contributor Network: Enterprise architecture: A key driver of digital and analytic transformation

Enterprise architecture: A key driver of digital and analytic transformation

A conversation with Claus Torp Jensen, chief technology officer at CVS Health, on how to build an effective architectural function in the enterprise

Enterprise architecture: A key driver of digital and analytic transformation StudioM1 / Getty Images

For large enterprises laden with technology debt, disparate systems, and siloed data, it's important to have a strong and effective enterprise architecture function to guide the organization to a better technology and data fabric. But many attempts at enterprise architecture fail due to a variety of factors. In my conversation with Claus Torp Jensen, chief technology officer (CTO) at CVS Health, I discussed lessons and ideas on how to build an effective architectural function.

Q: As enterprises pivot to digital and try to keep pace with the analytic demands on the company, what is ...

Read More

IDG Contributor Network: Digital transformation is fiction

infoworld.com     9+ mon ago

...

IDG Contributor Network: Top architecture choices for enterprise software development

infoworld.com     7+ mon ago

Enterprise software needs to be built in context. Major development projects aren t started for fun; they re meant to create a product that supports a specific business goal. Every ...

IDG Contributor Network: Evolution of IT departments to support IoT and digital transformation

networkworld.com     8+ mon ago

You can t spell IoT without IT, but that doesn t mean IT departments are big fans of Internet of Things deployments. In fact, we ve observed that IoT tends to exacerbate some of the ...

IDG Contributor Network: Why you need to change your monolithic architecture

infoworld.com     7+ mon ago

In a perfect world, the contents of this section belong at the end of the article, as part of a conclusion. But a key theme to this article is that there is a lot of unintentional impe...

IDG Contributor Network: How enterprise knowledge graphs can proactively reduce risk

infoworld.com     7+ mon ago

Traditional enterprise risk management consisted of reactive reactionary efforts to specific domains such as cyber security, fraud detection, regulatory compliance, and legal complianc...


IDG Contributor Network: Digital transformation is fiction

infoworld.com     9+ mon ago

...

IDG Contributor Network: Top architecture choices for enterprise software development

infoworld.com     7+ mon ago

Enterprise software needs to be built in context. Major development projects aren t started for fun; they re meant to create a product that supports a specific business goal. Every ...

IDG Contributor Network: Evolution of IT departments to support IoT and digital transformation

networkworld.com     8+ mon ago

You can t spell IoT without IT, but that doesn t mean IT departments are big fans of Internet of Things deployments. In fact, we ve observed that IoT tends to exacerbate some of the ...

IDG Contributor Network: Why you need to change your monolithic architecture

infoworld.com     7+ mon ago

In a perfect world, the contents of this section belong at the end of the article, as part of a conclusion. But a key theme to this article is that there is a lot of unintentional impe...

IDG Contributor Network: How enterprise knowledge graphs can proactively reduce risk

infoworld.com     7+ mon ago

Traditional enterprise risk management consisted of reactive reactionary efforts to specific domains such as cyber security, fraud detection, regulatory compliance, and legal complianc...

IDG Contributor Network: Enterprise systems to monetize and bill for new IoT services

IDG Contributor Network: Enterprise systems to monetize and bill for new IoT services

networkworld.com     4+ mon ago

Enterprises adopt IoT solutions for two primary reasons. First, they want to lower their companies operating and capital costs. These types of IoT solutions including factory ...

IDG Contributor Network: Networking anomalies

networkworld.com     9+ mon ago

...

IDG Contributor Network: Visibility is key for devops and the hybrid cloud

networkworld.com     7+ mon ago

Cloud has undoubtedly become a key component of successful business in recent years, especially when you consider the race to digitally transform. Across the globe, companies are movin...

IDG Contributor Network: Does your network have a trade imbalance?

networkworld.com     7+ mon ago

Network traffic, by nature, is often unbalanced. For example, a client that requests a video on demand may receive ten times more bandwidth than it sends for that service. Likewise, mo...

IDG Contributor Network: When data becomes a service

infoworld.com     7+ mon ago

...

IDG Contributor Network: The future of cloud interconnects

networkworld.com     5+ mon ago

There are three types of applications; applications that manage the business, applications that run the business and miscellaneous apps. A security breach or performanc...

IDG Contributor Network: The state of the network is murky

networkworld.com     8+ mon ago

Hybrid IT networking has come a long way in the past decade, as enterprises have gradually come to embrace and trust cloud computing. Yet, despite the growing popularity of both privat...

IDG Contributor Network: Test automation comes of age

infoworld.com     9+ mon ago

...

IDG Contributor Network: Analytics are the key to network uptime, but are they enough?

networkworld.com     7+ mon ago

Imagine you are in a crowded ER, and doctors are running from room to room. In the waiting area, patients are checking in via an online portal, and hospital staff are quickly capturing...

IDG Contributor Network: A primer on closed-loop automation

networkworld.com     8+ mon ago

...

IDG Contributor Network: Maximize ROI with MVP

infoworld.com     6+ mon ago

...

IDG Contributor Network: Introducing Named Data Networking

networkworld.com     6+ mon ago

While computing, storage and programming have dramatically changed and become simpler and cheaper over the last 20 years, however, IP networking has not. IP networking is still stuck in the era of mid...

IDG Contributor Network: Zero-trust: microsegmentation networking

IDG Contributor Network: Zero-trust: microsegmentation networking

networkworld.com     2+ week ago

Microsegmentation gives administrators the control to set granular policies in order to protect the application environment. The transformation to the digital age has introduced s...

IDG Contributor Network: IoT alphabet soup: when should an enterprise use MQTT versus LWM2M?

networkworld.com     7+ mon ago

There is tremendous interest from industrial enterprises to understand the nuances of the two most debated IoT data communications protocols: MQTT and LWM2M. MQTT and LWM2M are protoco...

IDG Contributor Network: Leveraging the engineering hierarchy of needs

infoworld.com     6+ mon ago

Abraham Maslow introduced his now-famous hierarchy of needs in 1943, proposing that people had to achieve a sequential set of conditions to attain complete fulfilment. The five levels of the hierarchy...

IDG Contributor Network: 3 types of IoT platform analytics

IDG Contributor Network: 3 types of IoT platform analytics

networkworld.com     4+ mon ago

...

Search Builder

(Click to add to search box)
Claus Torp Jensen  right reasons  right time  right decisions  right people  right thing  technology debt  business difference  business partners  Forrester spectrum  middle part  data fabric  siloed data  
**Content contained on this site is provided on an “as is” basis. 4Internet, LLC makes no commitments regarding the content and does not review it, so don't assume that it's been reviewed. What you see here may not be accurate and should not be relied upon. The content does not necessarily represent the views and opinions of 4Internet, LLC. You use this service and everything you see here at your own risk. Content displayed may be subject to copyright. Content is removed on a case by case basis. To request that content be removed, contact us using the following form: Contact Us.