Although coaching is rooted in sports, it is used in many other areas throughout the world. This blog provides insights on a Cyma company coaching partnership, both from a coach and coachee perspective. It outlines the approach and what can be gained through coaching, as well as sharing a personal coaching experience and why coaching is a worthwhile investment.
Risk is a factor in many, if not most architecture decisions and can be a great tool to help make your case. This blog uses a case study to demonstrate how a risk based approach can be a great tool for architects.
We all know that peer reviews are a good idea, but who has time to do them? Here are some ideas around peer reviews and how we can find ways to do them.
Architect Governance can be hard to get right. For smaller organisations, do you need it at all? We share our thoughts and experience on Architect Governance for larger organisations in terms of what we’ve seen work well and not so well.
The Cyma Story at a glance. You can see the lessons we learnt and how we overcame.
The world is changing, and it is changing far faster than we imagine and in ways that we can’t even begin to imagine…..
If you’re going to be successful then, you need to be able to adapt which means being able to learn. This applies to Cyma as much as it would to any other start up, so what have we learnt in the six years we’ve been operating?
When we created Cyma we wanted to do something a little bit different to everyone else. We could see that there was an opportunity to try something new in a relatively homogenised and traditional IT services market.
The purpose of GDPR is to create a unified data protection framework across the EU. It comprises a new set of rules designed to give EU citizens more control over their personal data, it will significantly strengthen the rights of individuals who will have more power to demand companies to reveal or delete the the personal data that they hold.
Information Security is the practice that is concerned with preventing unauthorised access, use, disclosure, disruption, modification, inspection, recording or destruction of information and its’ primary focus is the balanced protection of the confidentiality, integrity and availability of information Information Security is the practice that is concerned with preventing unauthorised access, use, disclosure, disruption, modification, inspection, recording or destruction of information and its’ primary focus is the balanced protection of the confidentiality, integrity and availability of information