Welcome!

Artificial Intelligence Authors: Zakia Bouachraoui, Liz McMillan, Yeshim Deniz, Elizabeth White, William Schmarzo

Blog Feed Post

The Authoritative Book on IT Management, “Unlocking the Power of Information Technology”, is Now Available as a Kindle eBook

Houston, TX, February 13, 2013 --(PR.com)-- Information technology is an integral and vital element of any organization’s business, and a smooth-running IT operation will not only directly impact the bottom line, but it will also project a quality, professional image of the company externally. The average company today spends between four and five percent of revenue on IT, and that figure can be ten percent or more in industries highly dependent on IT. This is a substantial investment which can add significant value to the corporation but also represents a large component of expense. However, the quality (or lack thereof) of IT services can have an even broader impact on the success of the enterprise. IT service management can literally make the difference between a thriving, successful business and one that struggles or even fails.

Addressing this challenge was the mission of the paperback edition of the book, “Unlocking the Power of Information Technology”. The processes described in this book are primarily based on those utilized by one of today’s most successful global companies. And now this same text has been made available as an eBook, through Kindle Direct Publishing (KDP). The eBook Edition contains all of the figures, tables, charts and text material found in the original edition. Some formatting changes were made to accommodate the eBook medium and the Table of Contents in this edition is bookmarked with active links to the chapters and main sections within the book. Other updates have been included to reflect growing trends in the areas of BYOD (Bring Your Own Device) and Cloud Computing, and how to effectively address these developments.

From a business leader's perspective, the world of Information Technology can be an intimidating maze of terminology and hype, with an insatiable appetite for ongoing and new project funding. Business leaders struggle with questions on how much to spend on IT, how to be sure benefits will accrue from the very significant investments, and how to effectively organize and manage IT. This is all the more challenging as IT is not normally the main mission of the enterprise, nor the core competence of the senior business leaders. Even within IT management circles, the complexities can be overwhelming in the absence of a disciplined approach to managing IT services.

“Applying the discipline of operational excellence across all aspects of a company's business activities is the key competitive advantage, and nowhere is this more evident than in the realm of internal IT services,” says James Hamilton, author of Unlocking the Power of Information Technology. Operationally excellent companies get more value from their IT investments and benefit from a much more stable and robust operating environment. They avoid debilitating scenarios where - a server crashes with no viable back-up, a virus shuts down the network, security breaches compromise corporate databases, or large and costly IT projects fail due to poor definition or execution. Employing a disciplined IT management process can have a dramatic effect on the bottom line, and in some cases may even determine the long term viability of the entire enterprise.

Those companies that master the discipline of Operational Excellence in managing their IT services will see benefits in a number of critical areas:

· Flawless execution
· Robust, reliable operations
· Lower costs
· Effective change management
· A 'great deal' for the customer

“Unlocking the Power of Information Technology” provides pragmatic guidance on business alignment, strategic planning, governance, IT architecture, security services, managing IT systems as services, project management, organization design, sourcing and vendor management. It documents compelling insights distilled from the author’s years of experience providing IT services for one of the largest and most successful global corporations. This approach has been proven to be a winning strategy throughout the highs and lows of business cycles.

Both the paperback and the Kindle editions of the book can be purchased at Amazon.com for $19.95 (USD) and $8.95 (USD) respectively. To learn more about the book and how to purchase a copy, you can also visit www.jchamiltonconsulting.com.

JCHamilton Consulting LLC provides Information Technology Management services based on a proven commitment to the discipline of Operational Excellence.

Contact Information:
JCHamilton Consulting
James Hamilton
832-367-4846
Contact via Email
www.jchamiltonconsulting.com

Click here to read the full story: The Authoritative Book on IT Management, “Unlocking the Power of Information Technology”, is Now Available as a Kindle eBook

Press Release Distributed by PR.com

Read the original blog entry...

More Stories By PR.com Newswire

PR.com is a unique website where companies can promote literally everything about their business and/or organization in a one-stop, all inclusive business marketplace. A cross between a public relations and advertising entity, PR.com is a directory of businesses, products and services, jobs and dynamic articles that include exclusive celebrity interviews. In addition, PR.com is one of the most effective and widely used press release distribution services on the Internet. With a full PR.com company profile, each business listed on PR.com has a powerful means by which to generate quality leads as well as gain worldwide and local exposure for all of their products, services and other business information. PR.com offers the best advantages of the Internet on one website.

IoT & Smart Cities Stories
LogRocket helps product teams develop better experiences for users by recording videos of user sessions with logs and network data. It identifies UX problems and reveals the root cause of every bug. LogRocket presents impactful errors on a website, and how to reproduce it. With LogRocket, users can replay problems.
Data Theorem is a leading provider of modern application security. Its core mission is to analyze and secure any modern application anytime, anywhere. The Data Theorem Analyzer Engine continuously scans APIs and mobile applications in search of security flaws and data privacy gaps. Data Theorem products help organizations build safer applications that maximize data security and brand protection. The company has detected more than 300 million application eavesdropping incidents and currently secu...
Rafay enables developers to automate the distribution, operations, cross-region scaling and lifecycle management of containerized microservices across public and private clouds, and service provider networks. Rafay's platform is built around foundational elements that together deliver an optimal abstraction layer across disparate infrastructure, making it easy for developers to scale and operate applications across any number of locations or regions. Consumed as a service, Rafay's platform elimi...
The Internet of Things is clearly many things: data collection and analytics, wearables, Smart Grids and Smart Cities, the Industrial Internet, and more. Cool platforms like Arduino, Raspberry Pi, Intel's Galileo and Edison, and a diverse world of sensors are making the IoT a great toy box for developers in all these areas. In this Power Panel at @ThingsExpo, moderated by Conference Chair Roger Strukhoff, panelists discussed what things are the most important, which will have the most profound e...
In today's enterprise, digital transformation represents organizational change even more so than technology change, as customer preferences and behavior drive end-to-end transformation across lines of business as well as IT. To capitalize on the ubiquitous disruption driving this transformation, companies must be able to innovate at an increasingly rapid pace.
Growth hacking is common for startups to make unheard-of progress in building their business. Career Hacks can help Geek Girls and those who support them (yes, that's you too, Dad!) to excel in this typically male-dominated world. Get ready to learn the facts: Is there a bias against women in the tech / developer communities? Why are women 50% of the workforce, but hold only 24% of the STEM or IT positions? Some beginnings of what to do about it! In her Day 2 Keynote at 17th Cloud Expo, Sandy Ca...
New competitors, disruptive technologies, and growing expectations are pushing every business to both adopt and deliver new digital services. This ‘Digital Transformation’ demands rapid delivery and continuous iteration of new competitive services via multiple channels, which in turn demands new service delivery techniques – including DevOps. In this power panel at @DevOpsSummit 20th Cloud Expo, moderated by DevOps Conference Co-Chair Andi Mann, panelists examined how DevOps helps to meet the de...
According to Forrester Research, every business will become either a digital predator or digital prey by 2020. To avoid demise, organizations must rapidly create new sources of value in their end-to-end customer experiences. True digital predators also must break down information and process silos and extend digital transformation initiatives to empower employees with the digital resources needed to win, serve, and retain customers.
In his keynote at 18th Cloud Expo, Andrew Keys, Co-Founder of ConsenSys Enterprise, will provide an overview of the evolution of the Internet and the Database and the future of their combination – the Blockchain. Andrew Keys is Co-Founder of ConsenSys Enterprise. He comes to ConsenSys Enterprise with capital markets, technology and entrepreneurial experience. Previously, he worked for UBS investment bank in equities analysis. Later, he was responsible for the creation and distribution of life ...
While the focus and objectives of IoT initiatives are many and diverse, they all share a few common attributes, and one of those is the network. Commonly, that network includes the Internet, over which there isn't any real control for performance and availability. Or is there? The current state of the art for Big Data analytics, as applied to network telemetry, offers new opportunities for improving and assuring operational integrity. In his session at @ThingsExpo, Jim Frey, Vice President of S...