The Value of a Consulting Analyst
To provide the best and most relevant research, consulting and decision support services, we are bringing our clients a special class of expert: The Consulting Analyst. A consulting analyst gives our...
View ArticleIT Outsourcing–Lessons Learned
I have worked with many organizations over the years that have replaced significant portions of their IT organization with outsourced services. In some cases the level of outsourcing is a specific...
View ArticleSafe Harbour? The new EU-US Privacy Shield
By David Goodman, D. Phil TechVision Research Consulting Analyst The recent judgement against Facebook led to the termination of the Safe Harbour agreement shaking up the 15-year old arrangement for...
View ArticleIdentity Management’s Future
The post Identity Management’s Future appeared first on Tech Vision Research.
View ArticleIoT Risk Amplifier & Mitigation Strategies
The post IoT Risk Amplifier & Mitigation Strategies appeared first on Tech Vision Research.
View ArticleBusiness Blueprint – Fixing the Data
The post Business Blueprint – Fixing the Data appeared first on Tech Vision Research.
View ArticleNew European Privacy & Data Protection Regulations
The post New European Privacy & Data Protection Regulations appeared first on TechVision Research.
View ArticleOpportunities in Europe with Electronic Identification and Trust Services
The post Opportunities in Europe with Electronic Identification and Trust Services appeared first on TechVision Research.
View ArticleSafe Harbour? The new EU-US Privacy Shield
By David Goodman, D. Phil TechVision Research Consulting Analyst The recent judgement against Facebook led to the termination of the Safe Harbour agreement shaking up the 15-year old arrangement for...
View ArticleEnd EA – Part 1
The world of corporate IT is changing rapidly. The proliferation of the cloud, the ascent of millennials in IT leadership roles and shorter and shorter technology life-cycles are enabling (and...
View ArticleEnd o EA, part 2
About a month ago I wrote a short blog about the “End of EA and IT as we know IT” and expected a few hundred people to read the post and a few comments. At this point 4,000 people have read the...
View ArticleBlockchain Level Set
Blockchain, distributed ledgers, and Bitcoin have been in the limelight for the past few years with hype at stratospheric levels. There are thousands of blockchain-based start-ups, and most established...
View ArticleBlockchain Identity Management
Identity Management is at the core of the secure IT infrastructure that every company, government agency and institute of higher education strives to achieve. The establishment of identities and...
View ArticleIdentity in Context; Vendor Short-List
Putting identity into context or contextualizing and establishing relationships between identity data sets is, when seen holistically, a major step on the path to a significant digital transformation...
View ArticleThe Rise of Chief Privacy Officers
Corporate privacy programs are rapidly ascending in importance to the enterprise as are the leaders of these programs. Stiff penalties associated with the EU’s General Data Protection Regulation...
View ArticleLarge Organization Innovation, Oil and Water
Uber, Airbnb, Google, Apple, Amazon, and other disruptive, innovative and successful companies are rapidly growing their market cap and disrupting historic market leaders. These organizations have...
View ArticleCustomer Identity Access Management
Most organizations are collecting increasing volumes of information about external stakeholders including consumers, prospects, customers and partners. The challenge most face is that the identities...
View ArticleBanking on Blockchain
Banks have both the biggest opportunity and the most to lose with the adoption of blockchain or distributed ledger. To separate banking reality from pervasive blockchain hype, TechVision engaged...
View Article