Critical.
Authoritative.
Strategic.
Subscribe to CIO Magazine »

Why Two Thirds of Enterprise Architecture Projects Fail

Why Two Thirds of Enterprise Architecture Projects Fail
This is the conclusion of a study for the R otterdam U niversity carried out by J onathan B roer in the summer of 2008, ordered by BPM and E A software vendor IDS S cheer. B roer questioned 161 respondents from 89 organizations representing a range of industries about their vision and implementation of the enterprise architecture concept.
Download Whitepaper
Related Whitepapers
Thanks for downloading Why Two Thirds of Enterprise Architecture Projects Fail. Here are some other white papers that we feel may be of interest to you given your recent download:
  • The Internet of Things (IoT) is a concept that is completely transforming the way Australian organisations operate. More than ever, companies have the opportunity to make machine-to-machine communication work for them to improve service and deliver competitive advantage. CIO Australia, Microsoft and Readify recently conducted research to determine the benefits, challenges and drivers to IoT adoption. Download now: Download whitepaper »

  • With the fast paced world of technology, organisations are looking for a more flexible finance model that allows them to leverage the latest in technology and keep up with competitive trends without having to continually blow IT budgets on lumpy assets with fast depreciating value. This whitepaper looks at: the trends that are spurring a change in the utilisation of IT and associated expenditure, how CIOs are meeting demands in a way that frees up cash for further investment; and tips to maximise ROI with financial models. Download whitepaper »

  • In this exclusive Security Leadership Series eBook, Citrix chief information security officer Stan Black and chief security strategist Kurt Roemer share best practices for: • Leading meaningful security discussions with the board of directors • Engaging end users to protect business information • Meeting security-related compliance requirements Download whitepaper »