The best way to interpret the approach is to read it as an open letter to your company. The organizational structure described below can work within a centralized or decentralized organization, though the clear bias is toward a decentralized structure.
What follows also works within alternative sourcing scenarios. If, for example, you’re decentralized but insist on in-house requirements, specification, implementation and support, then you can use the model to help you make it all work.
The “open letter” format is intended to personalize new organizational requirements. It was constructed in response to the problems plaguing most IT organizations and companies struggling with what to do about IT. Please read it with these assumptions in mind and – much more importantly – as something that you might perhaps resend in your company!
THE ORGANIZATION OF IT
An Open Letter to the Business/Technology Community
It’s time for us to re-think how we acquire, deploy and support IT and how we should organize ourselves to effectively apply IT to our business models and processes. This letter is intended to explore the parameters of that organization and offer a set of specific suggestions for making IT the strategic weapon it’s destined to become. Let’s begin with a description of the new business/IT agenda – which really describes a new business/IT partnership.
The New Business/IT Agenda
From Here to There
— The design and development of a world-class communications network.
— Methods for organizing, accessing and securing data.
— World-class mobile computing, virtual office and electronic commerce infrastructure
technology.
— The setting of standards boundaries that simultaneously provide room for the businesses to operate in and offer the cost and performance advantages of less-rather-than-more-variation in our communications and computing environment.
— Process improvement initiatives.
— The co-management of any enterprise outsourcing activities.
— Procedures for aligning systems and technology investments with business strategies.
— The facilitation of reuse (of applications, data bases, development architectures) and the reduction of redundant technical activity in the lines of business.
— Leadership in enterprise wide initiatives (like major upgrades).
— Enterprise hardware and software (license) acquisition.
— Contracting and sub-contracting.
— Hardware and software asset acquisition and disposition.
— Selected security administration and business resumption planning.
— Overall security policy.
— IT should evolve to a proactive decision-making and problem-solving body: The technology decision-making organization should be comprised not only of technology professionals but business representatives as well.
— The central IT organization should establish a Program Office (PO) that will manage all outsourced activities, all account executive activities, and those “negotiations” activities that characterize so many of the interactions with the businesses. This PO should be staffed by central/enterprise IT and representatives from the lines of business.
— The office of the CIO of the enterprise should create deputy CIO positions to be filled by technology representatives from the lines of business.
— Enterprise IT should organize according to the targeted enterprise activities, according to the percentage of support that is outsourced, and according to what the businesses need and will find useful. The organization should be defined via a partnership with the lines of business (who – as “clients” – have a clear vested interest in the way enterprise IT is organized). The central IT organization has a clear vested interest in defining an organization the businesses will find useful. This is not a call for reengineering, which when done in-house nearly always fails; rather, the suggestion is to identify – with the help of the divisions – a slate of activities and capabilities the businesses would find valuable and then back-fill the organization into these requirements.
— The central IT organization should establish Centers of Excellence on a temporary basis. For example, when there is a cross-divisional need like in the areas of Year 2000 compliance or eBusiness, Centers of Excellence, staffed by enterprise and lines of business professionals.
— IT should take the lead in massing the talent and technology to develop solutions to problems that all the businesses face. Once the problems have been solved, the technology should be exported to the businesses, making room for the next Center (or “tiger team”). These Centers collectively represent the “special services” the central IT organization provides to the lines of business.
— Central IT should organize a small set of (excellent) “consultants” that will support the businesses in the enterprise areas. These consultants should not be charged on a fee-for-service basis. Instead, they should be (a) charged to tax or (b) embedded in the rates. However, over time – and once value has been demonstrated – then a “declining subsidy” funding model can be implemented. Such a model provides non-fee-for-service support initially but converts the support to fee-for-service over time.
— It should partner with the businesses, actively seeking their involvement in key decisions about infrastructure and other enterprise activities. Failure to get buy-in results in unnecessary and unproductive conflict.
— The central IT organization should adopt the “consulting mindset” which would see the divisions as clients, not as adversaries.
— The central IT organization should work with the businesses to develop charge-back and investment procedures for paying for IT services. This source of enormous conflict can be reduced or eliminated.
— It should identify (with the businesses) those services that should fall into the traditional charge back model, those services that should be fee-for-service, those services that should be non-fee-for-service, and those services that should be funded centrally (via some model that puts skin in the game from all sources). Ambiguity here must be eliminated.
— There are special occasions when the enterprise will subsidize business costs, such as for major technology refreshes and events like the Year 2000 conversion effort. But this funding will come with “strings”: The enterprise will require the divisions to comply with certain conditions of acceptance, such as hardware/software asset acquisition practices, adherence to standards, and enterprise systems management.
In Part 3 on Tuesday, we’ll cover services, alternative funding mechanisms, organizational structure and people.
Steve Andriole is the Thomas G. Labrecque Professor of Business at Villanova University where he conducts applied research in business and technology alignment. He is also the founder & CTO of TechVestCo, a new-economy consortium that focuses on optimizing investments in information technology. He can be reached at stephen.andriole@villanova.edu.
Ethics and Artificial Intelligence: Driving Greater Equality
FEATURE | By James Maguire,
December 16, 2020
AI vs. Machine Learning vs. Deep Learning
FEATURE | By Cynthia Harvey,
December 11, 2020
Huawei’s AI Update: Things Are Moving Faster Than We Think
FEATURE | By Rob Enderle,
December 04, 2020
Keeping Machine Learning Algorithms Honest in the ‘Ethics-First’ Era
ARTIFICIAL INTELLIGENCE | By Guest Author,
November 18, 2020
Key Trends in Chatbots and RPA
FEATURE | By Guest Author,
November 10, 2020
FEATURE | By Samuel Greengard,
November 05, 2020
ARTIFICIAL INTELLIGENCE | By Guest Author,
November 02, 2020
How Intel’s Work With Autonomous Cars Could Redefine General Purpose AI
ARTIFICIAL INTELLIGENCE | By Rob Enderle,
October 29, 2020
Dell Technologies World: Weaving Together Human And Machine Interaction For AI And Robotics
ARTIFICIAL INTELLIGENCE | By Rob Enderle,
October 23, 2020
The Super Moderator, or How IBM Project Debater Could Save Social Media
FEATURE | By Rob Enderle,
October 16, 2020
FEATURE | By Cynthia Harvey,
October 07, 2020
ARTIFICIAL INTELLIGENCE | By Guest Author,
October 05, 2020
CIOs Discuss the Promise of AI and Data Science
FEATURE | By Guest Author,
September 25, 2020
Microsoft Is Building An AI Product That Could Predict The Future
FEATURE | By Rob Enderle,
September 25, 2020
Top 10 Machine Learning Companies 2021
FEATURE | By Cynthia Harvey,
September 22, 2020
NVIDIA and ARM: Massively Changing The AI Landscape
ARTIFICIAL INTELLIGENCE | By Rob Enderle,
September 18, 2020
Continuous Intelligence: Expert Discussion [Video and Podcast]
ARTIFICIAL INTELLIGENCE | By James Maguire,
September 14, 2020
Artificial Intelligence: Governance and Ethics [Video]
ARTIFICIAL INTELLIGENCE | By James Maguire,
September 13, 2020
IBM Watson At The US Open: Showcasing The Power Of A Mature Enterprise-Class AI
FEATURE | By Rob Enderle,
September 11, 2020
Artificial Intelligence: Perception vs. Reality
FEATURE | By James Maguire,
September 09, 2020
Datamation is the leading industry resource for B2B data professionals and technology buyers. Datamation's focus is on providing insight into the latest trends and innovation in AI, data security, big data, and more, along with in-depth product recommendations and comparisons. More than 1.7M users gain insight and guidance from Datamation every year.
Advertise with TechnologyAdvice on Datamation and our other data and technology-focused platforms.
Advertise with Us
Property of TechnologyAdvice.
© 2025 TechnologyAdvice. All Rights Reserved
Advertiser Disclosure: Some of the products that appear on this
site are from companies from which TechnologyAdvice receives
compensation. This compensation may impact how and where products
appear on this site including, for example, the order in which
they appear. TechnologyAdvice does not include all companies
or all types of products available in the marketplace.