Home Whiskey Tango Foxtrot! In IT, the pace of change is too fast

Author's Opinion

The views in this column are those of the author and do not necessarily reflect the views of iTWire.

Have your say and comment below.

In IT, the pace of change is too fast Alphamu57 via wikipedia.org

IT projects are becoming too big and too complex. We keep hearing of failed IT projects ranging in value from a few hundred thousand dollars to a few hundred million dollars (or more!).

Perhaps it's an extreme generalisation, but the reporting around most failures seems to suggest either the solution has taken far longer (and cost many more dollars) than expected OR upon delivery (or in testing) it was determined that it was not fit for purpose – either "wrong" or too limited.

Initial business requirements exhibit a relatively smooth view of the environment. Perhaps in defining the new system they will either say, "wrap up all these disparate systems we're currently using and make a cohesive whole that works faster and more efficiently", or they might say, "build me a system that looks a lot like my current software, but make it better and more flexible – allow for growth in both usage and features".

Both of these options lead to the same "wall of death": complexity. Worse, evolving complexity!

A comprehensive design of such a system will take a considerable amount of time, will involve a huge number of stakeholders and will almost invariably lead to fights, trade-offs, politicisation and turf-wars. And that's just during the requirements gathering phase!!

So, having spent some months designing this new system, the go-ahead is finally given by the appropriate competent authority (based on the value of the project) – that may be the project sponsor, or it may well require a full board-level approval. Either way, it is expected that go-ahead will only be given when the project budget and scope of works are costed with just a 10% margin of error.

Construction begins. Software is written, hardware is ordered and specific milestones are defined and (hopefully) achieved. Communications infrastructure is designed and tenders let for it's completion.

And then it all goes to the dogs.

The software designers/implementers complain that the design specifications are incomplete. Hardware that had been specified for the new system is found to be seriously under-performing. Perhaps only the communications infrastructure is remotely close to what was actually needed (perhaps not!). Initial testing by trial users exposes far more flaws than successes...

And now we see the issue. The pace of change has grown so much that specifications are obsolete before they can be implemented. Hard-earned software language abilities rapidly become "yesterday's skill" long before anyone is able to gain more than competence – mastery is a pipe-dream. COBOL, anyone?

We have reached a stage where the evolution of requirements, of competing products and of the ability to implement has become seriously compromised. The world of IT is evolving faster than the practitioners are able to keep up.

Which leaves us with the Faustian choice between the "uber-programmer" who can solve all our problems, and the recognition that we cannot continue to grow complexity and expect to maintain our sanity.

Uber is probably a myth.

LEARN HOW TO REDUCE YOUR RISK OF A CYBER ATTACK

Australia is a cyber espionage hot spot.

As we automate, script and move to the cloud, more and more businesses are reliant on infrastructure that has the high potential to be exposed to risk.

It only takes one awry email to expose an accounts’ payable process, and for cyber attackers to cost a business thousands of dollars.

In the free white paper ‘6 Steps to Improve your Business Cyber Security’ you’ll learn some simple steps you should be taking to prevent devastating and malicious cyber attacks from destroying your business.

Cyber security can no longer be ignored, in this white paper you’ll learn:

· How does business security get breached?
· What can it cost to get it wrong?
· 6 actionable tips

DOWNLOAD NOW!

10 SIMPLE TIPS TO PROTECT YOUR ORGANISATION FROM RANSOMWARE

Ransomware attacks on businesses and institutions are now the most common type of malware breach, accounting for 39% of all IT security incidents, and they are still growing.

Criminal ransomware revenues are projected to reach $11.5B by 2019.

With a few simple policies and procedures, plus some cutting-edge endpoint countermeasures, you can effectively protect your business from the ransomware menace.

DOWNLOAD NOW!

 

Popular News

 

Telecommunications

 

Sponsored News

 

 

 

 

Connect