Taming Legacy Platform Terror
Every business has to grapple with the legacy terror this client was facing: You’ve outgrown a core system, but it’s so intrinsic to daily operations that you just can’t replace it.
Every business has to grapple with the legacy terror this client was facing: You’ve outgrown a core system, but it’s so intrinsic to daily operations that you just can’t replace it.
It’s the week of Thanksgiving—and teams across the country are starting to slow down and think Turkey! Thanksgiving brings a time of reflection and an opportunity to exercise your gratitude mindset. At Mind Over Machines, we are grateful to have CEO and Founder, Tom Loveland at the helm, because he values and champions innovative workplace…
Welcome aboard, finance professionals! Yes, it looks like we are now in the same boat. For years, digital transformation soothsayers have been pointing to the rise of cloud computing and DevOps as a sign that IT professionals must step up and claim our rightful role as strategic business advisers and change agents. We are no…
Business processes are important. Staff train on them. They keep quality consistent. They direct your resources, guiding your work force. So you have to understand them. But how well do you have to understand them? The answer is different for every company. Business Process Management (BPM) is a multibillion-dollar industry. It’s also a heavy lift.…
6 minute read “We need a mobile app” has become a standard discussion starter in the software application development conversation. The high-speed growth of mobile device usage – and usefulness – in the workforce has delivered some impressive workplace efficiencies, cost- savings, and improved employee satisfaction rates – just to name a few benefits.
[toggle title=”Enterprise Security – Part 2 of 2″]Learn how big data, machine learning, business intelligence, and holistic security profiling help make enterprise security an affordable reality – and of course, help ward off the zombies.[/toggle] “I’ll be back.” ~ The Terminator Part 1 of this series on enterprise security explored 6 IT tools and tactics that…
4 minute read “In this business, by the time you realize you’re in trouble, it’s too late to save yourself. Unless you’re running scared all the time, you’re gone.” ~Bill Gates Relentless hackers infect millions of personal records by exploiting a tiny hole in the protective wall surrounding the Internet. A mid-level analyst, frustrated that…
5 minute read Your system is mission critical. It has hundreds, thousands, or even millions of daily users and it must continue to perform its functions no matter what. But it’s now 10-15 years old, and though it has served its purpose faithfully and is still a solid performer, the time has come to plan…
5 minute read “Decommission the legacy system” is one issue that never seems to get priority on the agenda. Month after month, this major decision sits in the old business category, dwarfed by the other initiatives. With an excitement factor of zero, and a tenuous link to business goals, the prospect of investing precious IT…
7 minute read When was the last time you visualized your company’s operations? I’m not talking about a spreadsheet or a slide deck, or a new arrangement of chairs. Have you taken a few hours recently to sit back, think out loud, and try to form a picture of how your business might look in…
5 minute read The Dunbar armored car company is a titan of the trust industry. Family-owned for ninety years, Dunbar is best known for protecting and transporting cash in reinforced, guarded trucks.
5 minute read Stephanie Reel had what some may categorize as an insurmountable challenge — pull some of the best doctors in the world away from their hectic schedules to chat about IT. Tapping her penchant for innovative thinking, Reel, CIO for all divisions of the Johns Hopkins University and Health System, guessed that maybe…
[toggle title=”Enterprise Security – Part 1 of 2″]The first of a two-part series discussing enterprise security reviews major tactics employed today, cautions about limitations, and highlights the data that can be collected from each. In Part 2, we’ll lay out strategies for using that data – in new ways – to achieve high-level enterprise security. [/toggle]…
2 minute reader It’s a seller’s market when it comes to top IT talent. As enterprise technology has quickly occupied a larger and larger piece of the organizational asset pie, the technology recruiting scene has become more and more competitive. The Society for Human Resource Management released survey results last year that confirmed what we…
5 minute read Back then – it was just what you needed. You built a good looking website to front your business, and customers used it like the Yellow Pages. It was your online corporate brochure. But what was cutting edge just a few years ago is now common, and may convey the wrong message…
ThomasNet News Tech Trends Journal writer Faye Rivkin interviewed Mind Over Machines IT solutions expert Michael Askin for best practices on delivering high value manufacturing-related technology projects. The following article is reprinted here with permission from ThomasNet News Tech Trends Journal and with gratitude from Mind Over Machines. Upgrading capabilities and re-engineering to align capabilities to…