Gartner Blog Network

Richard Hunter
VP Distinguished Analyst
17 years at Gartner
32 years IT industry

Richard Hunter is vice president and Gartner Fellow in Gartner's CIO Research Group – Office of the CIO Research Team, where his recent work has focused on issues of interest to CIOs, including risk and value. ...Read Full Bio

Privacy is a Right, Not a Transaction

by Richard Hunter  |  January 28, 2015

Privacy is not a commercial commodity.  It’s a fundamental human right.  A fundamental human right by definition can’t be bought or sold. These comments are inspired by a post written a few months ago by Chris Messina, ex-Google employee, about privacy and Google+ –a post I’ve obviously been thinking about for a while.  In that […]

Read more »

Sony says there was no material financial impact from the hack. Really?

by Richard Hunter  |  January 26, 2015

In an announcement titled “Submission of an application for approval of extension of deadline to file the quarterly securities report for the third quarter of the fiscal year ending March 31, 2015″ (see the full statement here), Sony Corporation notes that: “… today that it has filed with the Financial Services Agency of Japan (the “FSA”) an […]

Read more »

Target CEO’s resignation is a shot across the bow for enterprises (and maybe Cloud)

by Richard Hunter  |  May 5, 2014

The Associated Press reported today that Target’s CEO resigned, largely as a result of the damage done to the company in the wake of the massive credit card breach reported five months ago.  You can read the AP’s full story here: http://www.wjla.com/articles/2014/05/target-ceo-fired-following-last-year-s-security-breach-102788.html The gist of the story is contained in one paragraph:  “He was the […]

Read more »

Fracking the Human Ecosphere

by Richard Hunter  |  April 7, 2014

The center cannot hold.   W.B. Yeats, “The Second Coming”   For roughly 50 years, IT organizations have been structured according to what my former Gartner colleague Mark McDonald called the “dominant model”: a pattern that was so widely adopted that it was effectively ubiquitous.  In this model, IT organizations were designed above all to […]

Read more »

Privacy is Power

by Richard Hunter  |  November 4, 2013

The recent revelations of NSA surveillance of just about everybody have of course provoked a lot of discussion about privacy–what it is, why it matters, who needs it and who doesn’t.  Daniel Solove, writing well before the NSA’s activities came to light, took on the “I’ve Got Nothing to Hide” argument against privacy in this […]

Read more »

Maturity models are proxies for value, not value itself

by Richard Hunter  |  October 23, 2013

Maturity models are all the rage in IT circles.  There are maturity models for nearly everything an IT organization does.  Lots of IT professionals, in practically every IT discipline, talk about improving maturity as if it was the ultimate goal for the organization.  And that’s a problem for the IT professional. The heart of the […]

Read more »

IT investment decisions are the best early-warning system for the success of enterprise strategies

by Richard Hunter  |  October 17, 2013

I’ve been thinking a lot lately about the “kernal” construct that Richard Rumelt proposes in his book “Good Strategy, Bad Strategy.”  According to Rumelt, the irreducible core of a strategy–the “kernal”–consists of a diagnosis of the environment an enterprise operates in, one or more policies that are intended to address the diagnosis, and coherent execution […]

Read more »

Help Tina Nunno name her new book!

by Richard Hunter  |  July 3, 2013

My esteemed colleague Tina Nunno has been writing and presenting on the topic of CIO politics for years now, and her book on this topic is well underway.  Tina needs help naming the book, and I’m helping to spread the word.  Follow the link below to help Tina choose between two titles (and get a […]

Read more »

What Ethics Are Appropriate to a Hacker?

by Richard Hunter  |  July 2, 2013

I’ve been thinking lately about Matt Honan, who wrote almost a year ago in Wired about his experiences with a hacker named Phobia who hacked Honan’s Apple account, and soon after used his access to the account to wipe out Honan’s electronic memories–everything Honan had acquired and stored on his Apple devices.  Honan later was […]

Read more »

What does KCG’s recent debacle say about governance and technology?

by Richard Hunter  |  August 6, 2012

In the days since Knight Capital Group suffered a “computer glitch” that cost the company $440M in losses, I’ve been discussing with my colleagues how this catastrophe might have been prevented.    Some of my colleagues have argued that the failure was basically about IT governance–that the IT team at Knight was responsible only for implementing […]

Read more »