article thumbnail

How Technical Debt Opens the Door to Cyber Attacks—and Steps to Protect Your Small Business

Strategy Driven

Months of investigation by a cyber consulting firm finally determined the source of the vulnerability to Azotrope’s network: a combination printer/fax machine in their testing and QA area that engineers regularly used to fax lunch orders to a local Chinese restaurant. His new book is Tech Debt 2.0™:

article thumbnail

The C-Suite Needs a Chief Entrepreneur

Harvard Business Review

This is not a CTO role or a role that reports to the CEO. You produce growth engines with calculated bets, not “wild-ass gambles.” Communication will be key to this partnership because the CEO is the person who can help finance your future experiments. You do not work for the CEO, or alongside the CTO, CIO, and CFO.

article thumbnail

How IBM, Intuit, and Rich Products Became More Customer-Centric

Harvard Business Review

In response to the rapid advance of cloud computing, IBM’s software engineering groups embraced the Agile development method – with teams focused on incremental delivery of new capabilities every few weeks or months. To the engineers, the design thinking process seemed like a return to the Waterfall method. .”