SlideShare a Scribd company logo
1 of 2
The Company Technology Profile
Technology viewed as a strategic asset or a cost
Examples of strategic advantages
Operational competitive advantage
Recruit and retain the best employees
Customer touch points
Accelerating the business’ strategic plan
Industry
System stability
Employees
Computing workload
Computing efficiency expectations
Technology training
Technology expenditures
Industry metrics
Percentage of gross income
Per full time employee
IT components as a percentage of total IT spend
Security
IT department training / outsourcing
Use of new technology; risk / reward
Remote access
Smart phones, tablets
Technology Profile
1. IT as a cost versus a strategic asset
2. Spending levels
3. Security, risk aversion
4. Employees' computing aptitudes, and training provided by organization
5. Computing environment - flexible or restrictive, “menu” of apps or mandatory use
6. IT staffing, outsourcing and consulting services
7. Collaborative or individual work environment
8. Touch-points – number and quality of client (customer/constituent/donor) touch-points
9. Bring your own device policy, smart phone, tablet, laptop
10. IT Governance
11. Remote access
12. Early technology adopters or laggards? Both vertical and standard applications

More Related Content

What's hot

What's hot (14)

levels of system
levels of systemlevels of system
levels of system
 
ICAB - ITK Chapter 3 Class 9-10 - Management of IT
ICAB - ITK Chapter 3 Class 9-10 - Management of ITICAB - ITK Chapter 3 Class 9-10 - Management of IT
ICAB - ITK Chapter 3 Class 9-10 - Management of IT
 
ICAB - ITK Chapter 3 class 6-7 - Management of IT
ICAB - ITK Chapter 3 class 6-7 - Management of ITICAB - ITK Chapter 3 class 6-7 - Management of IT
ICAB - ITK Chapter 3 class 6-7 - Management of IT
 
C.V-Ezzat-mohamed
C.V-Ezzat-mohamedC.V-Ezzat-mohamed
C.V-Ezzat-mohamed
 
Ppt 21 ge
Ppt 21 gePpt 21 ge
Ppt 21 ge
 
Sivakumar Updated Resume
Sivakumar Updated ResumeSivakumar Updated Resume
Sivakumar Updated Resume
 
SOLOMON MUTABAZI
SOLOMON MUTABAZISOLOMON MUTABAZI
SOLOMON MUTABAZI
 
Schooley Mitchell Presentation
Schooley Mitchell PresentationSchooley Mitchell Presentation
Schooley Mitchell Presentation
 
Erp
ErpErp
Erp
 
2016_IndTech_PLC_CERTIFICATE_RevJuly14
2016_IndTech_PLC_CERTIFICATE_RevJuly142016_IndTech_PLC_CERTIFICATE_RevJuly14
2016_IndTech_PLC_CERTIFICATE_RevJuly14
 
FY11 PC Refresh Plan
FY11 PC Refresh PlanFY11 PC Refresh Plan
FY11 PC Refresh Plan
 
Wilbert M David
Wilbert M  DavidWilbert M  David
Wilbert M David
 
Optimizing Technology Refresh
Optimizing Technology RefreshOptimizing Technology Refresh
Optimizing Technology Refresh
 
GE Education Presentation
GE Education PresentationGE Education Presentation
GE Education Presentation
 

Viewers also liked

Advice to graduates
Advice to graduatesAdvice to graduates
Advice to graduatesPeter Henley
 
Cloud Computing Discussion Points
Cloud Computing Discussion PointsCloud Computing Discussion Points
Cloud Computing Discussion PointsPeter Henley
 
Cyber Security - ASGFOA
Cyber Security - ASGFOACyber Security - ASGFOA
Cyber Security - ASGFOAPeter Henley
 
From desktop support to CIO in twelve easy years
From desktop support to CIO in twelve easy yearsFrom desktop support to CIO in twelve easy years
From desktop support to CIO in twelve easy yearsPeter Henley
 
How technology supports our strategic map
How technology supports our strategic mapHow technology supports our strategic map
How technology supports our strategic mapPeter Henley
 
Vision, Mission, Values
Vision, Mission, ValuesVision, Mission, Values
Vision, Mission, ValuesPeter Henley
 
CIO skills evaluation
CIO skills evaluationCIO skills evaluation
CIO skills evaluationPeter Henley
 
Strategic role of the CIO
Strategic role of the CIOStrategic role of the CIO
Strategic role of the CIOPeter Henley
 
Executive personal characteristics
Executive personal characteristicsExecutive personal characteristics
Executive personal characteristicsPeter Henley
 
Killer Interview Questions
Killer Interview QuestionsKiller Interview Questions
Killer Interview QuestionsPeter Henley
 
IT Policy Template
IT Policy TemplateIT Policy Template
IT Policy TemplatePeter Henley
 

Viewers also liked (12)

Advice to graduates
Advice to graduatesAdvice to graduates
Advice to graduates
 
Cloud Computing Discussion Points
Cloud Computing Discussion PointsCloud Computing Discussion Points
Cloud Computing Discussion Points
 
Cyber Security - ASGFOA
Cyber Security - ASGFOACyber Security - ASGFOA
Cyber Security - ASGFOA
 
From desktop support to CIO in twelve easy years
From desktop support to CIO in twelve easy yearsFrom desktop support to CIO in twelve easy years
From desktop support to CIO in twelve easy years
 
How technology supports our strategic map
How technology supports our strategic mapHow technology supports our strategic map
How technology supports our strategic map
 
Vision, Mission, Values
Vision, Mission, ValuesVision, Mission, Values
Vision, Mission, Values
 
CIO Role
CIO RoleCIO Role
CIO Role
 
CIO skills evaluation
CIO skills evaluationCIO skills evaluation
CIO skills evaluation
 
Strategic role of the CIO
Strategic role of the CIOStrategic role of the CIO
Strategic role of the CIO
 
Executive personal characteristics
Executive personal characteristicsExecutive personal characteristics
Executive personal characteristics
 
Killer Interview Questions
Killer Interview QuestionsKiller Interview Questions
Killer Interview Questions
 
IT Policy Template
IT Policy TemplateIT Policy Template
IT Policy Template
 

Similar to Technology Profile of a Company

Resume - Mohamed Aman Mohamed Elhelw-Jun 2016
Resume - Mohamed Aman Mohamed Elhelw-Jun 2016Resume - Mohamed Aman Mohamed Elhelw-Jun 2016
Resume - Mohamed Aman Mohamed Elhelw-Jun 2016Mohamed Aman Elhelw
 
Service Technology Investments: Building the Case
Service Technology Investments:Building the CaseService Technology Investments:Building the Case
Service Technology Investments: Building the CaseImaging Network
 
Presentation of educational vertical
Presentation of educational verticalPresentation of educational vertical
Presentation of educational verticalArchana Negi
 
ICT Cluster - Education
ICT Cluster - EducationICT Cluster - Education
ICT Cluster - EducationAmar Patel
 
Application Portfolio Analysis
Application Portfolio AnalysisApplication Portfolio Analysis
Application Portfolio AnalysisAnn Tse
 
Proteus OCM Company Profile
Proteus OCM Company ProfileProteus OCM Company Profile
Proteus OCM Company ProfileKGanzy
 
Formal Information Technology in a Small, Growing Company
Formal Information Technology in a Small, Growing CompanyFormal Information Technology in a Small, Growing Company
Formal Information Technology in a Small, Growing CompanyFarrokh Poorooshasb
 
It days 2015 digital transformation and workplace
It days 2015   digital transformation and workplaceIt days 2015   digital transformation and workplace
It days 2015 digital transformation and workplacePaperjam_redaction
 
Ppt Template
Ppt TemplatePpt Template
Ppt Templatepapdev
 
With the evolution of technology, a comprehensive mobility strategy is impera...
With the evolution of technology, a comprehensive mobility strategy is impera...With the evolution of technology, a comprehensive mobility strategy is impera...
With the evolution of technology, a comprehensive mobility strategy is impera...EES Africa (Pty) Ltd
 
Current topic in it presentation
Current topic in it presentationCurrent topic in it presentation
Current topic in it presentationMihreteab F
 
Kaseya: 5 Tips for Education IT Directors
Kaseya: 5 Tips for Education IT DirectorsKaseya: 5 Tips for Education IT Directors
Kaseya: 5 Tips for Education IT DirectorsKaseya
 
Elan Presentation
Elan PresentationElan Presentation
Elan Presentationnnange
 
International Technology Adoption & Workforce Issues Study - German Summary
International Technology Adoption & Workforce Issues Study - German SummaryInternational Technology Adoption & Workforce Issues Study - German Summary
International Technology Adoption & Workforce Issues Study - German SummaryCompTIA
 
5 Benefits of Hiring an IT Consultancy Services
5 Benefits of Hiring an IT Consultancy Services5 Benefits of Hiring an IT Consultancy Services
5 Benefits of Hiring an IT Consultancy ServicesXperteks
 
Select and Implement a Next Generation Endpoint Protection Solution
Select and Implement a Next Generation Endpoint Protection SolutionSelect and Implement a Next Generation Endpoint Protection Solution
Select and Implement a Next Generation Endpoint Protection SolutionInfo-Tech Research Group
 

Similar to Technology Profile of a Company (20)

Resume - Mohamed Aman Mohamed Elhelw-Jun 2016
Resume - Mohamed Aman Mohamed Elhelw-Jun 2016Resume - Mohamed Aman Mohamed Elhelw-Jun 2016
Resume - Mohamed Aman Mohamed Elhelw-Jun 2016
 
Service Technology Investments: Building the Case
Service Technology Investments:Building the CaseService Technology Investments:Building the Case
Service Technology Investments: Building the Case
 
Presentation of educational vertical
Presentation of educational verticalPresentation of educational vertical
Presentation of educational vertical
 
ICT Cluster - Education
ICT Cluster - EducationICT Cluster - Education
ICT Cluster - Education
 
Application Portfolio Analysis
Application Portfolio AnalysisApplication Portfolio Analysis
Application Portfolio Analysis
 
Proteus OCM Company Profile
Proteus OCM Company ProfileProteus OCM Company Profile
Proteus OCM Company Profile
 
Formal Information Technology in a Small, Growing Company
Formal Information Technology in a Small, Growing CompanyFormal Information Technology in a Small, Growing Company
Formal Information Technology in a Small, Growing Company
 
Ace pitch deck
Ace pitch deckAce pitch deck
Ace pitch deck
 
It days 2015 digital transformation and workplace
It days 2015   digital transformation and workplaceIt days 2015   digital transformation and workplace
It days 2015 digital transformation and workplace
 
Ppt Template
Ppt TemplatePpt Template
Ppt Template
 
With the evolution of technology, a comprehensive mobility strategy is impera...
With the evolution of technology, a comprehensive mobility strategy is impera...With the evolution of technology, a comprehensive mobility strategy is impera...
With the evolution of technology, a comprehensive mobility strategy is impera...
 
Current topic in it presentation
Current topic in it presentationCurrent topic in it presentation
Current topic in it presentation
 
Kaseya: 5 Tips for Education IT Directors
Kaseya: 5 Tips for Education IT DirectorsKaseya: 5 Tips for Education IT Directors
Kaseya: 5 Tips for Education IT Directors
 
Elan Presentation
Elan PresentationElan Presentation
Elan Presentation
 
International Technology Adoption & Workforce Issues Study - German Summary
International Technology Adoption & Workforce Issues Study - German SummaryInternational Technology Adoption & Workforce Issues Study - German Summary
International Technology Adoption & Workforce Issues Study - German Summary
 
5 Benefits of Hiring an IT Consultancy Services
5 Benefits of Hiring an IT Consultancy Services5 Benefits of Hiring an IT Consultancy Services
5 Benefits of Hiring an IT Consultancy Services
 
Ecs high level
Ecs high levelEcs high level
Ecs high level
 
Cv
Cv Cv
Cv
 
Erp selection criteria - uwsb
Erp  selection criteria - uwsbErp  selection criteria - uwsb
Erp selection criteria - uwsb
 
Select and Implement a Next Generation Endpoint Protection Solution
Select and Implement a Next Generation Endpoint Protection SolutionSelect and Implement a Next Generation Endpoint Protection Solution
Select and Implement a Next Generation Endpoint Protection Solution
 

More from Peter Henley

Experion Data Breach Response Excerpts
Experion Data Breach Response ExcerptsExperion Data Breach Response Excerpts
Experion Data Breach Response ExcerptsPeter Henley
 
eSign 2014 With IRS form 8879
eSign 2014 With IRS form 8879eSign 2014 With IRS form 8879
eSign 2014 With IRS form 8879Peter Henley
 
Digital Signatures
Digital SignaturesDigital Signatures
Digital SignaturesPeter Henley
 
Cloud Computing Classifications
Cloud Computing ClassificationsCloud Computing Classifications
Cloud Computing ClassificationsPeter Henley
 
Paperless Best Practices 2014
Paperless Best Practices 2014Paperless Best Practices 2014
Paperless Best Practices 2014Peter Henley
 
CPA Firm CIO Job Description
CPA Firm CIO Job DescriptionCPA Firm CIO Job Description
CPA Firm CIO Job DescriptionPeter Henley
 
2001 Terrorist Attacks On USA
2001 Terrorist Attacks On USA2001 Terrorist Attacks On USA
2001 Terrorist Attacks On USAPeter Henley
 
Clark Nuber IT Policy
Clark Nuber IT PolicyClark Nuber IT Policy
Clark Nuber IT PolicyPeter Henley
 
Business continuity
Business continuityBusiness continuity
Business continuityPeter Henley
 
Cloud classifications
Cloud classificationsCloud classifications
Cloud classificationsPeter Henley
 
Identity theft and data responsibilities
Identity theft and data responsibilitiesIdentity theft and data responsibilities
Identity theft and data responsibilitiesPeter Henley
 
Sample Technology Timeline
Sample Technology TimelineSample Technology Timeline
Sample Technology TimelinePeter Henley
 
Strategic IT Planning
Strategic IT PlanningStrategic IT Planning
Strategic IT PlanningPeter Henley
 
Information Technology Executive Management in the Public Accounting Industry
Information Technology Executive Management in the Public Accounting IndustryInformation Technology Executive Management in the Public Accounting Industry
Information Technology Executive Management in the Public Accounting IndustryPeter Henley
 

More from Peter Henley (18)

Experion Data Breach Response Excerpts
Experion Data Breach Response ExcerptsExperion Data Breach Response Excerpts
Experion Data Breach Response Excerpts
 
Cyber security
Cyber securityCyber security
Cyber security
 
eSign 2014 With IRS form 8879
eSign 2014 With IRS form 8879eSign 2014 With IRS form 8879
eSign 2014 With IRS form 8879
 
Cloud Plan 2014
Cloud Plan 2014Cloud Plan 2014
Cloud Plan 2014
 
Digital Signatures
Digital SignaturesDigital Signatures
Digital Signatures
 
Cloud Computing Classifications
Cloud Computing ClassificationsCloud Computing Classifications
Cloud Computing Classifications
 
Cloud slides
Cloud slidesCloud slides
Cloud slides
 
Paperless Best Practices 2014
Paperless Best Practices 2014Paperless Best Practices 2014
Paperless Best Practices 2014
 
CPA Firm CIO Job Description
CPA Firm CIO Job DescriptionCPA Firm CIO Job Description
CPA Firm CIO Job Description
 
2001 Terrorist Attacks On USA
2001 Terrorist Attacks On USA2001 Terrorist Attacks On USA
2001 Terrorist Attacks On USA
 
Clark Nuber IT Policy
Clark Nuber IT PolicyClark Nuber IT Policy
Clark Nuber IT Policy
 
Business continuity
Business continuityBusiness continuity
Business continuity
 
IT Decision model
IT Decision modelIT Decision model
IT Decision model
 
Cloud classifications
Cloud classificationsCloud classifications
Cloud classifications
 
Identity theft and data responsibilities
Identity theft and data responsibilitiesIdentity theft and data responsibilities
Identity theft and data responsibilities
 
Sample Technology Timeline
Sample Technology TimelineSample Technology Timeline
Sample Technology Timeline
 
Strategic IT Planning
Strategic IT PlanningStrategic IT Planning
Strategic IT Planning
 
Information Technology Executive Management in the Public Accounting Industry
Information Technology Executive Management in the Public Accounting IndustryInformation Technology Executive Management in the Public Accounting Industry
Information Technology Executive Management in the Public Accounting Industry
 

Recently uploaded

Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your BudgetHyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your BudgetEnjoy Anytime
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraDeakin University
 

Recently uploaded (20)

Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your BudgetHyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptxVulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
The transition to renewables in India.pdf
The transition to renewables in India.pdfThe transition to renewables in India.pdf
The transition to renewables in India.pdf
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning era
 

Technology Profile of a Company

  • 1. The Company Technology Profile Technology viewed as a strategic asset or a cost Examples of strategic advantages Operational competitive advantage Recruit and retain the best employees Customer touch points Accelerating the business’ strategic plan Industry System stability Employees Computing workload Computing efficiency expectations Technology training Technology expenditures Industry metrics Percentage of gross income Per full time employee IT components as a percentage of total IT spend Security IT department training / outsourcing Use of new technology; risk / reward Remote access Smart phones, tablets
  • 2. Technology Profile 1. IT as a cost versus a strategic asset 2. Spending levels 3. Security, risk aversion 4. Employees' computing aptitudes, and training provided by organization 5. Computing environment - flexible or restrictive, “menu” of apps or mandatory use 6. IT staffing, outsourcing and consulting services 7. Collaborative or individual work environment 8. Touch-points – number and quality of client (customer/constituent/donor) touch-points 9. Bring your own device policy, smart phone, tablet, laptop 10. IT Governance 11. Remote access 12. Early technology adopters or laggards? Both vertical and standard applications