R.E.A.L. - Realistic, Enabling, Actionable, Logical. Every day we hear jargon and see writing from so-called “experts,” and we don’t know what we should follow and what we should avoid. Published practices aren’t always best practices! Listen to episodes from Sam Holcman’s radio show, webinars, and podcasts, Real Talk with Sam Holcman. Each episode gets to the bottom of what business executives, managers, practitioners, and staff actually need to create innovative solutions that deliver- no ...
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Explaining ChatGPT in Nine Minutes
9:00
9:00
Main Kemudian
Main Kemudian
Senarai
Suka
Disukai
9:00
Keeping with our tradition of bringing “human consumable” understanding of all things technology, we give you a nine minute overview of ChatGPT. Let us remember what this is really all about – processing data. With this technology, we are processing data faster. The fuel is data. What you need to be aware of is the data quality that is being proces…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Setting up your Artificial Intelligence Sandbox for about $100
6:45
6:45
Main Kemudian
Main Kemudian
Senarai
Suka
Disukai
6:45
Do you really feel safe experimenting with AI right now? I mean really safe? The answer, at best, should be I am not sure. Well, that is a good answer. So, for $100 investment, plus approximately $40 a month, you can set up a completely independent environment and play all you want. And maybe some of that playing around can then be translated into …
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Data, Information, Information Technology, Information Management – let us take a look
6:20
6:20
Main Kemudian
Main Kemudian
Senarai
Suka
Disukai
6:20
Yes, we are in the information age, and moving out of the internet age. The key driver in the information age – the fuel/oil is data, that organizations can use to create information that has value. Let us discuss these terms and the concepts of an Information Strategy.Oleh Sam Holcman
…
continue reading
![Artwork](/static/images/128pixel.png)
1
What can Wayne Gretzky Teach Technology Personnel, EA’s. and BA’s?
7:10
7:10
Main Kemudian
Main Kemudian
Senarai
Suka
Disukai
7:10
Wayne Gretzky is a G.O.A.T. – Greatest Of All Time. He holds many records in the National Hockey League. But what can he teach us as Technology Professionals, Enterprise Architects or Business Architects? Have a listen to this Podcast!Oleh Sam Holcman
…
continue reading
Much is being speculated and written about the numerous world-wide legal issues facing Google. Perhaps addressing these legal issues can be done by Google removing the word “search” and replacing it by “Forum” – The Google Forum. Why? Because Google is not a search engine. Yes, we need a real search engine. This broadcast outlines how Google (and o…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Commentary on 5 Signs Your Agile Practices Will Lead to Digital Disaster
7:30
7:30
Main Kemudian
Main Kemudian
Senarai
Suka
Disukai
7:30
This recent article in CIO caught my attention. The article describes the five practices this author feels is a cause of digital innovation implementation issues. Practice two specifically caught my attention. Practice two is “You’re retaining waterfall planning but demanding agile delivery”. My analysis and commentary suggest, if this author has a…
…
continue reading
Why aren’t our Stakeholders reacting to our Enterprise Architecture or Business Architecture deliverables we provide? Perhaps one reason is that we expect “one and done” – we provide them with the deliverables and expect their understanding and reaction. Well, this is where the number seven has relevancy. Have a listen!…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Shadow AI – It is here and will make Shadow IT look like child’s play
8:00
8:00
Main Kemudian
Main Kemudian
Senarai
Suka
Disukai
8:00
Shadow AI! – the use of public AI engines by stakeholders – both business and technology professionals, outside the prevue of the Technology Organization. Everything from privacy, customer data, trade secrets, confidential data, and personal data is exposed outside of the Enterprise walls. It is now time to look at these possibilities and establish…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Rethinking the Cloud First Approach
6:30
6:30
Main Kemudian
Main Kemudian
Senarai
Suka
Disukai
6:30
A technology department's goal should be to put the computing processing and storage in the right location that supports the Enterprise's needs and business objectives. We suggest that an Architected Cloud approach – that optimizes both on-premises and off-premises environments is not only gaining traction but is optimal. We explore the reasons for…
…
continue reading
As a practicing Enterprise Architect or Business Architect, have you inventoried all of the deliverables you produce in your Architecture? Then have you taken that inventory and mapped it to your Stakeholders? That is what we refer to as the Deliverables String Test. This broadcasts overviews the very effect technique to optimize your Architecture …
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Selecting an Enterprise Architecture Methodology; A Ratings and Evaluation Handbook
8:30
8:30
Main Kemudian
Main Kemudian
Senarai
Suka
Disukai
8:30
This Handbook is designed to help you evaluate an Enterprise Architecture methodology on a quantitative basis. Twenty-six distinct criteria are divided into five categories: objectives, properties, components, functions, and services. Each criterion is presented in the form of a question, followed by a discussion to guide you in evaluating the meth…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Enterprise Architecture Definitions – the What Definition and the How Definition
5:20
5:20
Main Kemudian
Main Kemudian
Senarai
Suka
Disukai
5:20
Significant confusion remains as to what Enterprise Architecture is and what it produces. We suggest one reason for this confusion, is the Certification and Training Organizations that are providing an Enterprise Architecture definition that parallels what they teach. Let us look at the different foci.…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
AI and Lawsuits – A Brief Status Report
11:10
11:10
Main Kemudian
Main Kemudian
Senarai
Suka
Disukai
11:10
We now have numerous lawsuits that have been filed again both AI providers, and more concerning to the general population, lawsuits that are filed against those that are using AI in decision making. Four general categories of concerns are outlined: Privacy, Copyright Infringement, Responsible party in the use of AI generated decisions and expressio…
…
continue reading
A recent incident with a cloud service provider has left their clients with absolutely nothing in their accounts, no data, mail, applications etc. This includes the two backups that the cloud provider had believed were secure and safe. We have a suggestion that all need to consider.Oleh Sam Holcman
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Overhyped Technologies or Marketing – Which is it?
7:30
7:30
Main Kemudian
Main Kemudian
Senarai
Suka
Disukai
7:30
We define hype and marketing and compare these terms. We then list just a few of the “new” technologies that are in the press recently and leave it to the listener to determine the hype or marketing category. Yes, we have suggestions!Oleh Sam Holcman
…
continue reading
![Artwork](/static/images/128pixel.png)
1
What is Strategy? Part 4 – Begin with One Sentence.
7:30
7:30
Main Kemudian
Main Kemudian
Senarai
Suka
Disukai
7:30
In this fourth episode of What is Strategy, we discuss the one sentence that is vital in developing your Strategy.Oleh Sam Holcman
…
continue reading
![Artwork](/static/images/128pixel.png)
1
What is Strategy? Part 3 – Fool’s Gold
6:00
6:00
Main Kemudian
Main Kemudian
Senarai
Suka
Disukai
6:00
In this third episode of What is Strategy, we discuss Fool’s Gold, so you will not be fooled!Oleh Sam Holcman
…
continue reading
In this second installment of What is Strategy, we will continue our dialogue on What is Strategy and emphasize what makes a compelling and competing Strategy.Oleh Sam Holcman
…
continue reading
In this first installment of What is Strategy, we will define what is Strategy.Oleh Sam Holcman
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Questions to ask your EA or BA consultant advisor prior to engagement
8:00
8:00
Main Kemudian
Main Kemudian
Senarai
Suka
Disukai
8:00
We suggest eight questions that you ask your potential Enterprise Architecture or Business Architecture Consultant/Advisor/Potential Hire, prior to spending hard earned money.Oleh Sam Holcman
…
continue reading
We define Business Architecture, from a Stakeholder perspective and Practitioner perspective, and how Business Capabilities are developed and defined.Oleh Sam Holcman
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Continuous Digital Transformation – The Move-Ahead Alternative
5:45
5:45
Main Kemudian
Main Kemudian
Senarai
Suka
Disukai
5:45
The latest published statistics are documenting a digital transformation failure rate of between seventy and ninety five percent. WOW! We suggest a “Succeed-Fast” approach that is Business-Goal aligned. Select areas that are most critical/important to the organization, which will engage the stakeholders directly due to their interest in a specific …
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Ontologies=Architecture Flows and Hierarchies = Implementation
6:15
6:15
Main Kemudian
Main Kemudian
Senarai
Suka
Disukai
6:15
Ontologies=Architecture Flows and Hierarchies = Implementation. It is not one or the other – it is both for Enterprise Architecture or Business Architecture. If your Enterprise or Business Architecture efforts are not getting the results or recognition you believe should be there, it is highly likely that what are presenting is not architecture and…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Causation, Contributing, Correlation, Coincidence. Four Very Different Words!
6:15
6:15
Main Kemudian
Main Kemudian
Senarai
Suka
Disukai
6:15
In the Artificial Intelligence – Internet Age, these four words are rarely discussed, yet they are extremely important when we read or hear something. How do you determine which one of these you are seeing, when a conclusion is drawn. Some real thoughtful analysis needs to be done.Oleh Sam Holcman
…
continue reading
![Artwork](/static/images/128pixel.png)
1
The Key Sentence and Key Step To Begin Digital Transformation
6:10
6:10
Main Kemudian
Main Kemudian
Senarai
Suka
Disukai
6:10
Unfortunately, studies show an alarming failure rate in digital transformation efforts. Our analysis indicates two contributing factors to this failure rate – no fully defined Goal for the digital transformation effort and beginning the transformation by documenting the current business state prior to first defining the desired business state and o…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Laying the Foundation for your AI Environment
5:50
5:50
Main Kemudian
Main Kemudian
Senarai
Suka
Disukai
5:50
Yes, AI data is already a mess. The excuse phrase we use is AI is “hallucinations”. Well, another term to use is “mistakes”! But let us stop looking out the rear view mirror and look how we can harness the AI engine for our competitive advantage. How – by building out your data foundation. The right time to do this is when data starts coming in the…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
R.E.A.L. Enterprise Architects – More Important Than Ever!
6:30
6:30
Main Kemudian
Main Kemudian
Senarai
Suka
Disukai
6:30
Federal labor statics now confirm an almost four percent month to month decline in host computer costs and server costs, while cloud services are increasing almost two- and one-half percent. Cloud computing as a default is no longer a strategy. R.E.A.L. Enterprise Architects have the ability to provide an analysis on a case-by-case basis, as to dep…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Reward-Risk Balance with Today’s Hyper Technology Innovations
9:15
9:15
Main Kemudian
Main Kemudian
Senarai
Suka
Disukai
9:15
The pace of technological innovations seems to be accelerating at a pace unseen before. Yet studies have indicated that seventy-five percent of respondents to a recent survey have a level of concern as to what they are hearing about these innovations. This broadcast outlines a balanced reward/risk approach as to analyzing these innovations moving f…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Digital Transformation – What End State Are You Trying To Achieve
6:00
6:00
Main Kemudian
Main Kemudian
Senarai
Suka
Disukai
6:00
There are several phases that we suggest organizations need to work though, to get to, what the organization considers is digital transformation. You sort of have a hint in this first sentence – what is the end state you desire to achieve through this effort. From that understanding, then look at business changes possibly required – especially proc…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
China discussing internet time limit for those under 18 years of age.
6:00
6:00
Main Kemudian
Main Kemudian
Senarai
Suka
Disukai
6:00
Flowing through the Chinese government is a proposal to restrict internet usage on mobile devices for those under 18 years of age. Those limits range from a 40 minute limit to those eight and under to two hours for those 18 and under. Additionally, no internet between the hours of 10PM and 6AM. Food for thought for those of us outside China. Have a…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Postal Mail, Email, Links, Text Messages – and Security
6:00
6:00
Main Kemudian
Main Kemudian
Senarai
Suka
Disukai
6:00
I revived a real letter recently – yes, an envelope with a stamp and contents. I was not sure whether the envelope and some of the enclosed writing was handwritten, or computer generated. What did intrigue me was one of the notes that was in the content explaining why this organization used regular mail to get my attention. Have a listen and see wh…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Questions to ask your EA or BA Instructor Before You Enroll.
8:00
8:00
Main Kemudian
Main Kemudian
Senarai
Suka
Disukai
8:00
Do you actually know the credentials of your Business Architecture or Enterprise Architecture prior to you parting with your hard-earned money, or your company’s money? Not just the organization they work for, but who will be providing you with the training and knowledge you need to be successful? This broadcast outlines just a few simple questions…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Think Simple and Complete, Not Minimal or Just Enough
6:00
6:00
Main Kemudian
Main Kemudian
Senarai
Suka
Disukai
6:00
In the field of Business Architecture and Enterprise Architecture, some are trying to popularize the concept of just enough architecture or minimal viable architecture and resulting products. We suggest that underlying this trend is too much complexity in what is being represented – not level of detail, but its representation. This broadcast will d…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Investigate Microsoft for Negligent Cybersecurity? Or do root cause analysis.
7:00
7:00
Main Kemudian
Main Kemudian
Senarai
Suka
Disukai
7:00
A United States Senator – Senator Wyden – has asked the FTC, and DOJ to investigate Microsoft for its role in a previous cyber-hack and an email breach. I applaud this direction, but suggest that “picking” on Microsoft and looking at cybersecurity is, at most, only a start, and I may question that this is a good starting point. Let us do “root caus…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Large data sources with bad data. Smaller data sources with good data. Which is better?
6:00
6:00
Main Kemudian
Main Kemudian
Senarai
Suka
Disukai
6:00
Large bad data. Obviously not good and some have recognized this as “model collapse” – the bad data causes more bad data to be generated. Small bad data – nothing needs to be said here. Small (vetted, provenance-known) data – perhaps within your enterprise walls – perhaps the way to go, until large, good data that is used for training appears. When…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Outputs and Outcomes - What are you producing from your Architecture Efforts?
6:30
6:30
Main Kemudian
Main Kemudian
Senarai
Suka
Disukai
6:30
Outputs – something that is produced. Outcomes – the result of something. What is your “end state” that you are producing from your Enterprise Architecture or Business Architecture efforts? What are your Stakeholders seeing? Outputs or Outcomes? If it is Outputs, perhaps listening to this broadcast will explain the reception you are getting. Words …
…
continue reading
There is a growing realization that AI large models are being trained on AI generated content. You may have to read this sentence again! In some circles, this is being called AI generated spam. And more of concern, as we enter the “political season” in the United States, the ease of which political disinformation, with AI generated disinformation w…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
The Software Development Maturity Model
8:00
8:00
Main Kemudian
Main Kemudian
Senarai
Suka
Disukai
8:00
We describe the three maturity levels for organizations that write computer software and develop applications. Maturity Level 1 – Make to Order, Maturity Level 2 – Provide from Stock, Maturity Level 3 – Assemble to Order. Maturity Level three is the key to Enterprise Agility.Oleh Sam Holcman
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Patch the Patch, and we spend our time and money doing this.
7:30
7:30
Main Kemudian
Main Kemudian
Senarai
Suka
Disukai
7:30
A vendor releases a software update to address a serious flaw in their software. The treat was serious enough to cause the software vendor to rush out a patch. The patch itself had a problem. The response from the vendor? Back out the patch and await another patch! I thought this flaw was serious. It is still there. We need to get this madness stop…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Hackers already are attacking EV charges – so what is new?
6:45
6:45
Main Kemudian
Main Kemudian
Senarai
Suka
Disukai
6:45
Some of the newest software is being developed for electric vehicles charging stations. Guess what? Hackers are having a field day. What is the reaction of the government and industry? Continuing the whack-a-mole approach to after the fact security. The madness must stop. Just a bit of root cause analysis shows us the pathway.…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Think Simple and Complete, not Minimal
7:15
7:15
Main Kemudian
Main Kemudian
Senarai
Suka
Disukai
7:15
You hear numerous phrases like “minimal viable”, “just enough”, and terms like this. Yet, the implementations tend to default to massive, costly, and lengthy “final solutions”. Let us think in an opposite manner. Not what is minimal, but what is needed for a particular purpose. It begins with Architecture, more specifically Federated Architecture. …
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Computer Hardware Compute Capabilities and Software Development Advancements
7:30
7:30
Main Kemudian
Main Kemudian
Senarai
Suka
Disukai
7:30
We review some eye-opening statistics on the incredible increases in computer hardware advancements in processing capacity and relate that to the very different productivity and effectiveness of using this capacity and today's software development practices. It is time for a true assessment of what best practices are in software development.…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Confirmation Bias in Artificial Intelligence Solution Selection
7:30
7:30
Main Kemudian
Main Kemudian
Senarai
Suka
Disukai
7:30
Confirmation Bias is defined as the tendency to attribute more weight than we should to information or solutions that are consistent with our beliefs. The technology industry has seen this in cloud computing, enterprise and business architecture, and numerous other areas. Unfortunately, the ramifications of an unoptimized solution do not show up fo…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
RightSourcing - Making Sourcing Decisions Based on Optimizing Achieving Organizational Goals
6:30
6:30
Main Kemudian
Main Kemudian
Senarai
Suka
Disukai
6:30
How do you make decisions on when to do things in-house, offshore, or outsourced? We suggest the optional decision is what is the most direct way to achieve organizational goals and strategies. With simple two-dimensional representation, all stakeholders will be able to see the relationship between the goals that are to be achieved and the personne…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
The Architect Roles In An Enterprise
7:00
7:00
Main Kemudian
Main Kemudian
Senarai
Suka
Disukai
7:00
Enterprise Architecture is a discipline. Enterprise Architect is one Architecture Role. We name the twelve architect roles in an enterprise. These names are associated with The Enterprise FrameworkTM and are mapped into this Framework. Wordy definitions of these roles are not as helpful as the actual understanding of what each of these Roles produc…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
The Fuel for the Internet/Knowledge Age Is Data, and Who Owns The Data Is Front And Center
7:00
7:00
Main Kemudian
Main Kemudian
Senarai
Suka
Disukai
7:00
Two articles were recently published that demonstrate clearly, the Data ownership debate/discussion/concerns that are going to determine where the public internet, search engines, and AI are facing and how these areas will mature very soon. Quite simply, who “owns” the data, and what rights do those data owners have. This seven-minute broadcast is …
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Digital Transformation – Going on Fifty Years?
7:00
7:00
Main Kemudian
Main Kemudian
Senarai
Suka
Disukai
7:00
When we were asked this question by one of our clients, the question being what is digital transformation, we did a bit of research. As typical, we started with Google and Bing. And to be a bit more contemporary, we asked a few AI engines the same question. Summary – not really helpful! Words have meaning. What we suggest we need to do is enhancing…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
The Key Skill for Business Architects and Enterprise Architects
7:00
7:00
Main Kemudian
Main Kemudian
Senarai
Suka
Disukai
7:00
What is the key skill that is not generally taught in Business Architecture or Enterprise Architecture Seminars and Training Courses? Soft Skills! The skills needed to get your point across and be heard. Yes, a balance between “Hard Skills” that you get in these Seminars is just one component, and some say not the key component. Have a listen to wh…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Cloud Computing and In House Computing - The New Reality
6:00
6:00
Main Kemudian
Main Kemudian
Senarai
Suka
Disukai
6:00
It has been ten-plus years since the meteoric rise in the use of off-premises computing – cloud computing. Of course, we all know things change, and a little advertised change in the Information Technology world is the widening costs differential between in-house computing and cloud-based computing. There has been and is a steady rise in the cost o…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
The Six Questions To Ask When Hiring A Consultant, and One That Is A Waste Of Time
7:00
7:00
Main Kemudian
Main Kemudian
Senarai
Suka
Disukai
7:00
We have compiled the six most often asked questions when we are called on for a potential consulting engagement. These six questions address the most important skills a consultant needs. And you should be able to gauge the answers to these questions quite quickly. And yes, there is one time-waster question we also suggest really is a time waster!…
…
continue reading