Quantcast
Channel: Richard Hunter
Browsing all 23 articles
Browse latest View live

A few things about running, growing, and transforming in the cloud

I hear a lot lately about cloud as a means to “transformation,” and when I hear that word my personal value-meter kicks in, especially since so many people use the word “transformation” in ways that...

View Article



Let me entertain you…

This is my first blog for Gartner. Anyone who’s read the books I co-wrote with George Westerman on Harvard Business Press, “IT Risk” and “The Real Business of IT,” knows that the issues that interest...

View Article

Q: Can IT failure bring a company down? A: Yes.

My colleagues at Gartner and I have recently been discussing the importance of IT risk, often in the context of Cloud adoption, where the discussion is usually about the extent to which risks in the...

View Article

What does KCG’s recent debacle say about governance and technology?

In the days since Knight Capital Group suffered a “computer glitch” that cost the company $440M in losses, I’ve been discussing with my colleagues how this catastrophe might have been prevented....

View Article

What Ethics Are Appropriate to a Hacker?

I’ve been thinking lately about Matt Honan, who wrote almost a year ago in Wired about his experiences with a hacker named Phobia who hacked Honan’s Apple account, and soon after used his access to the...

View Article


Help Tina Nunno name her new book!

My esteemed colleague Tina Nunno has been writing and presenting on the topic of CIO politics for years now, and her book on this topic is well underway.  Tina needs help naming the book, and I’m...

View Article

IT investment decisions are the best early-warning system for the success of...

I’ve been thinking a lot lately about the “kernal” construct that Richard Rumelt proposes in his book “Good Strategy, Bad Strategy.”  According to Rumelt, the irreducible core of a strategy–the...

View Article

Maturity models are proxies for value, not value itself

Maturity models are all the rage in IT circles.  There are maturity models for nearly everything an IT organization does.  Lots of IT professionals, in practically every IT discipline, talk about...

View Article


Privacy is Power

The recent revelations of NSA surveillance of just about everybody have of course provoked a lot of discussion about privacy–what it is, why it matters, who needs it and who doesn’t.  Daniel Solove,...

View Article


Fracking the Human Ecosphere

The center cannot hold.   W.B. Yeats, “The Second Coming”   For roughly 50 years, IT organizations have been structured according to what my former Gartner colleague Mark McDonald called the “dominant...

View Article

Target CEO’s resignation is a shot across the bow for enterprises (and maybe...

The Associated Press reported today that Target’s CEO resigned, largely as a result of the damage done to the company in the wake of the massive credit card breach reported five months ago.  You can...

View Article

Sony says there was no material financial impact from the hack. Really?

In an announcement titled “Submission of an application for approval of extension of deadline to file the quarterly securities report for the third quarter of the fiscal year ending March 31, 2015″...

View Article

Privacy is a Right, Not a Transaction

Privacy is not a commercial commodity.  It’s a fundamental human right.  A fundamental human right by definition can’t be bought or sold. These comments are inspired by a post written a few months ago...

View Article


What does KCG’s recent debacle say about governance and technology?

In the days since Knight Capital Group suffered a “computer glitch” that cost the company $440M in losses, I’ve been discussing with my colleagues how this catastrophe might have been prevented....

View Article

What Ethics Are Appropriate to a Hacker?

I’ve been thinking lately about Matt Honan, who wrote almost a year ago in Wired about his experiences with a hacker named Phobia who hacked Honan’s Apple account, and soon after used his access to the...

View Article


Help Tina Nunno name her new book!

My esteemed colleague Tina Nunno has been writing and presenting on the topic of CIO politics for years now, and her book on this topic is well underway.  Tina needs help naming the book, and I’m...

View Article

IT investment decisions are the best early-warning system for the success of...

I’ve been thinking a lot lately about the “kernal” construct that Richard Rumelt proposes in his book “Good Strategy, Bad Strategy.”  According to Rumelt, the irreducible core of a strategy–the...

View Article


Maturity models are proxies for value, not value itself

Maturity models are all the rage in IT circles.  There are maturity models for nearly everything an IT organization does.  Lots of IT professionals, in practically every IT discipline, talk about...

View Article

Privacy is Power

The recent revelations of NSA surveillance of just about everybody have of course provoked a lot of discussion about privacy–what it is, why it matters, who needs it and who doesn’t.  Daniel Solove,...

View Article

Fracking the Human Ecosphere

The center cannot hold.   W.B. Yeats, “The Second Coming”   For roughly 50 years, IT organizations have been structured according to what my former Gartner colleague Mark McDonald called the “dominant...

View Article
Browsing all 23 articles
Browse latest View live


Latest Images