When is a business case not a business case?

You can talk to five different people who have that word in their CV and each one will probably have a different take on what a business case is for, who should prepare it and what it should contain.
In fact, you could say that the whole science around business cases, especially those involving IT investment has moved on substantially in the past two or three years.

When is a business case not a business case (part two)

A key to building a rock solid business case is to understand the relationships between requirements, features, benefits and risks and to take a methodical approach to evaluating likely ROI as a key part of the process.

When is a business case not a business case (part three)

After all the bottom line in any busines case is going to be financial although individual stakeholder priorities and concerns will play important parts as will the organisation’s history with similar projects and even good old office politics will often play a part.

At this point I would caution that despite the importance of the figures, it would be foolish to present a business case without taking into account the stated aims of the business in it’s short and long term plans and the key performance indicators and critical success factors of the key stakeholders.

AI

Artificial intelligence (AI) is intelligence exhibited by machines. In computer science, the field of AI research defines itself as the study of “intelligent agents“: any device that perceives its environment and takes actions that maximize its chance of success at some goal.[1] Colloquially, the term “artificial intelligence” is applied when a machine mimics “cognitive” functions that humans associate with other human minds, … Read more

The evils of groupthink and the risk to all Social media users

AKA “ Say hello to someone” Power to think The most spectacularly creative people in many fields are often introverted, according to studies by the psychologists Mihaly Csikszentmihalyi and Gregory Feist. They’re extroverted enough to exchange and advance ideas, but see themselves as independent and individualistic. They’re not joiners by nature.” NYtimes SUSAN CAIN JAN. … Read more

Selecting Waterfall, structured, Iterative or agile for your software project

First lets understand the difference. Waterfall is the most misquoted of all methods. Waterfall is defined by the simple fact that each stage in the project must complete fully and be agreed/signed-off before the next stage can begin. Sometimes it is very important that the previous stage was fully and correctly completed. An example would … Read more

Digital Transformation explained for the layman

Digital Transformation is a buzzword and as such you will find a wide range of explanations out there, yet there is in fact no widely agreed definition. Since the arrival of the internet as a force in the mid-nineties, I and millions like me around the globe have engaged in finding new ideas and turning … Read more

Data Mining explained for the layman

Data mining is a buzzword. What it describes is really a form of Machine learning and there is no definitive border between one of these many overlapping disciplines and another, so the takeaway is not to get too worried about it and ignore anyone who does unless they are your boss, or paying very well. … Read more

Inflation explained for the layman

It is impossible to discuss cryptocurrency without understanding inflation. It is a simple concept that causes massive confusion. Even politicians with fiscal responsibility can be heard making huge gaffes in public, though often that is deliberate. Ill return to this. There are two ways of viewing inflation that are two sides of the same coin … Read more

Encryption explained for the layman

Encryption is nothing more than a harmless mathematical algorithm that converts your information into unintelligible rubbish to the extent that that it is pretty much impossible to retrieve and read it without the Public key. Blowfish, AES RC4, RC5, and RC6 are examples of encryption algorithms. By giving someone the Public key they can achieve … Read more