SlideShare una empresa de Scribd logo
1 de 21
Meet in the Middle
Slow IT and Fast IT
Rob England
www.twohills.co.nz
To protect and serve
Picture © Canstockphoto.com
Failed projects
Fund for success
Drowning in projects
Picture © Canstockphoto.com
Human rate of change
Picture © Canstockphoto.com
All exponential curves level out
IT is reaching a limit
Picture © Canstockphoto.com
Governance of IT
Picture © Canstockphoto.com
Service portfolio
Demand Projects Catalogue Retire
resources
Overheating
Picture © Canstockphoto.com
Slow IT
Picture © Canstockphoto.com
Fast IT
Picture © Canstockphoto.com
Optimisation: CSI
Standard Change
Picture © Canstockphoto.com
Lean
Picture © Canstockphoto.com
Outsourcing
Picture © Canstockphoto.com
Retire and replace
Picture © Canstockphoto.com
Agile
Picture © Canstockphoto.com
DevOps and The Three Ways
Meet in the Middle
Slow IT Fast IT
Demand
Portfolio
Projects
Build
Deploy
Optimise
Protect Serve
www.twohills.co.nz

Más contenido relacionado

Similar a Meet in the middle Slow IT and Fast IT

La Redoute Quality Engineering Transformation
La Redoute Quality Engineering TransformationLa Redoute Quality Engineering Transformation
La Redoute Quality Engineering TransformationAntoine Craske
 
2010 Global Awards for Excellence in BPM and Workflow
2010 Global Awards for Excellence in BPM and Workflow2010 Global Awards for Excellence in BPM and Workflow
2010 Global Awards for Excellence in BPM and WorkflowFuture Strategies Inc.
 
Cms Solution 07162010
Cms Solution 07162010Cms Solution 07162010
Cms Solution 07162010larrybaker90
 
Estambul Resumen World Ingles
Estambul Resumen World Ingles Estambul Resumen World Ingles
Estambul Resumen World Ingles Pablo Prieto
 
Aligning IT With World-Class Fashion
Aligning IT With World-Class FashionAligning IT With World-Class Fashion
Aligning IT With World-Class FashionCA Technologies
 
Innovation Funding Lunch & Learn May 13, 2014
Innovation Funding Lunch & Learn May 13, 2014Innovation Funding Lunch & Learn May 13, 2014
Innovation Funding Lunch & Learn May 13, 2014Boast Capital
 
Legacy IBM Systems and Splunk: Security, Compliance and Uptime
Legacy IBM Systems and Splunk: Security, Compliance and UptimeLegacy IBM Systems and Splunk: Security, Compliance and Uptime
Legacy IBM Systems and Splunk: Security, Compliance and UptimePrecisely
 
Policy Control and Real-Time Charging Workshop Sample
Policy Control and Real-Time Charging Workshop SamplePolicy Control and Real-Time Charging Workshop Sample
Policy Control and Real-Time Charging Workshop SampleAlan Quayle
 
WHSG ICT Presentation Slides ARK
WHSG ICT Presentation Slides ARKWHSG ICT Presentation Slides ARK
WHSG ICT Presentation Slides ARKAndrew Kenyon
 
Push the button with continuous delivery
Push the button with continuous deliveryPush the button with continuous delivery
Push the button with continuous deliveryThoughtworks
 
Security Surveillance 2010_Final
Security Surveillance 2010_FinalSecurity Surveillance 2010_Final
Security Surveillance 2010_FinalRKDickey
 
Policy Control and Charging Workshop Issue 2 sample
Policy Control and Charging Workshop Issue 2 samplePolicy Control and Charging Workshop Issue 2 sample
Policy Control and Charging Workshop Issue 2 sampleAlan Quayle
 
Throwing IoT in the Trash (literally) - How sensor data, analytics, and AWS c...
Throwing IoT in the Trash (literally) - How sensor data, analytics, and AWS c...Throwing IoT in the Trash (literally) - How sensor data, analytics, and AWS c...
Throwing IoT in the Trash (literally) - How sensor data, analytics, and AWS c...TIBCO Jaspersoft
 
ADV Slides: Modern Analytic Data Architecture Maturity Modeling
ADV Slides: Modern Analytic Data Architecture Maturity ModelingADV Slides: Modern Analytic Data Architecture Maturity Modeling
ADV Slides: Modern Analytic Data Architecture Maturity ModelingDATAVERSITY
 

Similar a Meet in the middle Slow IT and Fast IT (20)

An Mfi Story
An Mfi StoryAn Mfi Story
An Mfi Story
 
Cms solution 08072010
Cms solution 08072010Cms solution 08072010
Cms solution 08072010
 
La Redoute Quality Engineering Transformation
La Redoute Quality Engineering TransformationLa Redoute Quality Engineering Transformation
La Redoute Quality Engineering Transformation
 
2010 Global Awards for Excellence in BPM and Workflow
2010 Global Awards for Excellence in BPM and Workflow2010 Global Awards for Excellence in BPM and Workflow
2010 Global Awards for Excellence in BPM and Workflow
 
Cms Solution 07162010
Cms Solution 07162010Cms Solution 07162010
Cms Solution 07162010
 
Estambul Resumen World Ingles
Estambul Resumen World Ingles Estambul Resumen World Ingles
Estambul Resumen World Ingles
 
Aligning IT With World-Class Fashion
Aligning IT With World-Class FashionAligning IT With World-Class Fashion
Aligning IT With World-Class Fashion
 
Pacnet Story 20101108
Pacnet Story 20101108Pacnet Story 20101108
Pacnet Story 20101108
 
Innovation Funding Lunch & Learn May 13, 2014
Innovation Funding Lunch & Learn May 13, 2014Innovation Funding Lunch & Learn May 13, 2014
Innovation Funding Lunch & Learn May 13, 2014
 
Legacy IBM Systems and Splunk: Security, Compliance and Uptime
Legacy IBM Systems and Splunk: Security, Compliance and UptimeLegacy IBM Systems and Splunk: Security, Compliance and Uptime
Legacy IBM Systems and Splunk: Security, Compliance and Uptime
 
Policy Control and Real-Time Charging Workshop Sample
Policy Control and Real-Time Charging Workshop SamplePolicy Control and Real-Time Charging Workshop Sample
Policy Control and Real-Time Charging Workshop Sample
 
WHSG ICT Presentation Slides ARK
WHSG ICT Presentation Slides ARKWHSG ICT Presentation Slides ARK
WHSG ICT Presentation Slides ARK
 
CD December 2015 Main Slides
CD December 2015 Main SlidesCD December 2015 Main Slides
CD December 2015 Main Slides
 
L4B case study tata steel
L4B case study tata steelL4B case study tata steel
L4B case study tata steel
 
Push the button with continuous delivery
Push the button with continuous deliveryPush the button with continuous delivery
Push the button with continuous delivery
 
Security Surveillance 2010_Final
Security Surveillance 2010_FinalSecurity Surveillance 2010_Final
Security Surveillance 2010_Final
 
Policy Control and Charging Workshop Issue 2 sample
Policy Control and Charging Workshop Issue 2 samplePolicy Control and Charging Workshop Issue 2 sample
Policy Control and Charging Workshop Issue 2 sample
 
Throwing IoT in the Trash (literally) - How sensor data, analytics, and AWS c...
Throwing IoT in the Trash (literally) - How sensor data, analytics, and AWS c...Throwing IoT in the Trash (literally) - How sensor data, analytics, and AWS c...
Throwing IoT in the Trash (literally) - How sensor data, analytics, and AWS c...
 
ADV Slides: Modern Analytic Data Architecture Maturity Modeling
ADV Slides: Modern Analytic Data Architecture Maturity ModelingADV Slides: Modern Analytic Data Architecture Maturity Modeling
ADV Slides: Modern Analytic Data Architecture Maturity Modeling
 
Agile Executive Forum: O&B Adoption Story
Agile Executive Forum: O&B Adoption StoryAgile Executive Forum: O&B Adoption Story
Agile Executive Forum: O&B Adoption Story
 

Más de Rob England

Business agility in Vietnam
Business agility in Vietnam Business agility in Vietnam
Business agility in Vietnam Rob England
 
Managing agile teams v1
Managing agile teams v1Managing agile teams v1
Managing agile teams v1Rob England
 
Agile at work within industry and business v5
Agile at work within industry and business v5Agile at work within industry and business v5
Agile at work within industry and business v5Rob England
 
Bringing humanity to work
Bringing humanity to work Bringing humanity to work
Bringing humanity to work Rob England
 
England 20181023 does18 usa
England 20181023 does18 usaEngland 20181023 does18 usa
England 20181023 does18 usaRob England
 
A skeptic's view of Automation and AI
A skeptic's view of Automation and AIA skeptic's view of Automation and AI
A skeptic's view of Automation and AIRob England
 
DevOps experiment guidelines for leaders
DevOps experiment guidelines for leaders DevOps experiment guidelines for leaders
DevOps experiment guidelines for leaders Rob England
 
Impact of DevOps on governance
Impact of DevOps on governanceImpact of DevOps on governance
Impact of DevOps on governanceRob England
 
Surviving DevOps: bringing everyone along on the transformation journey
Surviving DevOps: bringing everyone along on the transformation journeySurviving DevOps: bringing everyone along on the transformation journey
Surviving DevOps: bringing everyone along on the transformation journeyRob England
 
The three Rs: Roles Responsibilities Relationships
The three Rs: Roles Responsibilities RelationshipsThe three Rs: Roles Responsibilities Relationships
The three Rs: Roles Responsibilities RelationshipsRob England
 
How DevOps messes with your head
How DevOps messes with your head How DevOps messes with your head
How DevOps messes with your head Rob England
 
The IT Renaissance
The IT RenaissanceThe IT Renaissance
The IT RenaissanceRob England
 
Big Uncle: privacy and surveillance
Big Uncle: privacy and surveillanceBig Uncle: privacy and surveillance
Big Uncle: privacy and surveillanceRob England
 
What about run? Considerations for Agile/DevOps: its not over once its live
What about run? Considerations for Agile/DevOps: its not over once its liveWhat about run? Considerations for Agile/DevOps: its not over once its live
What about run? Considerations for Agile/DevOps: its not over once its liveRob England
 
Engaging suppliers and customers
Engaging suppliers and customersEngaging suppliers and customers
Engaging suppliers and customersRob England
 
Tipu: agile service improvement
Tipu: agile service improvementTipu: agile service improvement
Tipu: agile service improvementRob England
 
Why COBIT® wins
Why COBIT® wins Why COBIT® wins
Why COBIT® wins Rob England
 

Más de Rob England (20)

Business agility in Vietnam
Business agility in Vietnam Business agility in Vietnam
Business agility in Vietnam
 
Managing agile teams v1
Managing agile teams v1Managing agile teams v1
Managing agile teams v1
 
DevOps 101
DevOps 101DevOps 101
DevOps 101
 
Agile at work within industry and business v5
Agile at work within industry and business v5Agile at work within industry and business v5
Agile at work within industry and business v5
 
Bringing humanity to work
Bringing humanity to work Bringing humanity to work
Bringing humanity to work
 
England 20181023 does18 usa
England 20181023 does18 usaEngland 20181023 does18 usa
England 20181023 does18 usa
 
A skeptic's view of Automation and AI
A skeptic's view of Automation and AIA skeptic's view of Automation and AI
A skeptic's view of Automation and AI
 
DevOps experiment guidelines for leaders
DevOps experiment guidelines for leaders DevOps experiment guidelines for leaders
DevOps experiment guidelines for leaders
 
DevOps and ITSM
DevOps and ITSMDevOps and ITSM
DevOps and ITSM
 
Impact of DevOps on governance
Impact of DevOps on governanceImpact of DevOps on governance
Impact of DevOps on governance
 
Surviving DevOps: bringing everyone along on the transformation journey
Surviving DevOps: bringing everyone along on the transformation journeySurviving DevOps: bringing everyone along on the transformation journey
Surviving DevOps: bringing everyone along on the transformation journey
 
The three Rs: Roles Responsibilities Relationships
The three Rs: Roles Responsibilities RelationshipsThe three Rs: Roles Responsibilities Relationships
The three Rs: Roles Responsibilities Relationships
 
How DevOps messes with your head
How DevOps messes with your head How DevOps messes with your head
How DevOps messes with your head
 
The IT Renaissance
The IT RenaissanceThe IT Renaissance
The IT Renaissance
 
Multi Speed IT
Multi Speed ITMulti Speed IT
Multi Speed IT
 
Big Uncle: privacy and surveillance
Big Uncle: privacy and surveillanceBig Uncle: privacy and surveillance
Big Uncle: privacy and surveillance
 
What about run? Considerations for Agile/DevOps: its not over once its live
What about run? Considerations for Agile/DevOps: its not over once its liveWhat about run? Considerations for Agile/DevOps: its not over once its live
What about run? Considerations for Agile/DevOps: its not over once its live
 
Engaging suppliers and customers
Engaging suppliers and customersEngaging suppliers and customers
Engaging suppliers and customers
 
Tipu: agile service improvement
Tipu: agile service improvementTipu: agile service improvement
Tipu: agile service improvement
 
Why COBIT® wins
Why COBIT® wins Why COBIT® wins
Why COBIT® wins
 

Último

08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsRoshan Dwivedi
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilV3cube
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 

Último (20)

08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of Brazil
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 

Meet in the middle Slow IT and Fast IT

Notas del editor

  1. Tension between protecting the existing investment in information and technology assets, and serving change, the new A balancing act
  2. Why do we have such a sucky project reputation? We do too many So we underfund them Especially we underfund people and process relative to tech
  3. If we spend the right amount on people and process we’d have to kill some Free up the money to do the others properly
  4. Eating BAU to deliver change People are breaking
  5. Forget technology rate of change which keeps accelerating Humans, culture and organisations have a limit Changing faster than people within IT and consuming IT can manage
  6. Putting the organisation at risk IT must speak up How?
  7. The governors must understand their responsibilities wrt IT And they must understand the risk to the organisation Then it is their informed decision
  8. How to decide properly With a service portfolio Not a project portfolio Take into account the effect on BAU
  9. Not every organisation wants or needs to change at breakneck speed America has this fixation with competitiveness Compete or die And quarterly results We’re getting swept up in the hysteria Take the german or japanese manufacturers They play the long game
  10. Not slow food Or slow business Slow IT: deliberately provocative Really mean SLOWER IT at a rate that IT can sustain delivery And the org can absorb delivery And the quid pro quo?
  11. What does the business get in return? More successful projects Safer organisational change And FASTER DELIVERY How?
  12. Finally time to do CSI: 10%
  13. And Kaizen
  14. : traditional outsourcing, Cloud, SaaS, PaaS, IaaS...
  15. And Scrum And Kanban And Scrumban And… fast, iterative, incremental development
  16. : fast, iterative, automated deployment