Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Browse by topic Browse by titles Authors Reviewers Browse by issue Browse Help
Search
 
Strnadl, Christoph
Software AG
Vienna, New York
 
   Featured Reviewer
   Reader Recommended
   Reviewer Selected
   Highlighted
Follow this Reviewer
 
 
 

As principal of Atos Origin Austria’s management consulting practice, Strnadl is currently accountable for the consulting domain of information management and strategy and strategic sourcing, helping top companies leverage the value of their information technology (IT) assets and services.

Parallel to his academic education, Strnadl worked as a consultant in IT and communications (1988-1994), and completed several successful projects in the field of electronic data interchange and messaging integration. In 1994, Strnadl joined Atos Origin (Austria), a leading global IT consulting and services firm, where he has held various management positions in the value added network services field. In 1997, he was appointed to the management team. In this role, Strnadl has developed, applied, and published several conceptual frameworks and models to be used for effectively bridging the communications gap between business and IT management to enable the effective alignment of business and IT. These include the IT Driver Model, the Triple-A Approach to IT Investment Appraisal, and the IT Score Card, a generic model for developing an IT strategy based on the notion of the (suitably adapted) Balanced Scorecard by Kaplan and Norton.

His customers include the largest Austrian enterprises, where his projects support executive management and IT management alike to develop, formulate, and realize long-term and truly strategic approaches to IT and information management. They comprise various themes, including IT strategy development, determination of the return on investment (ROI) of IT projects, or evaluation of different IT sourcing options (for instance, insourcing versus outsourcing). In addition to his consulting projects, Strnadl frequently acts as senior project manager for very large, highly complex strategic IT projects. These assignments included the position of global project manager for Austria’s largest international IT infrastructure outsourcing deal ever.

The rare combination of a deep theoretical foundation and ample practical application experience qualifies Strnadl as one of the leading IT outsourcing specialists in Austria. Due to his broad technical experience and integration skills within complex contexts, Strnadl is a recognized speaker at public events, and is a trainer at IT strategy seminars, with over 40 appearances in the last couple of years.

Strnadl is member of the ACM, IEEE, ¿¿VO (Austrian Association for Organisation and Management), and the CMG, where he holds various national and international board positions. He is a senior referee for the IEEE's Computer magazine, and writes for IEEE Multimedia. His contributions to the IT strategy and sourcing field have been published in international peer-reviewed journals and conferences.

He was born in 1966, and is married with two children.

 
 
Options:
Date Reviewed  
 
1
- 10 of 16 reviews

   
   A survey on end-edge-cloud orchestrated network computing paradigms: transparent computing, mobile edge computing, fog computing, and cloudlet
Ren J., Zhang D., He S., Zhang Y., Li T. ACM Computing Surveys 52(6): 1-36, 2019.  Type: Article

Recognizing the limits of (distant) cloud computing, modern Internet of things (IoT) architectures recognize the so-called edge continuum between cloud applications and IoT devices and machines. “Continuum” implies ...

Jun 17 2022  
   Service description languages in cloud computing: state-of-the-art and research issues
Nawaz F., Mohsin A., Janjua N. Service Oriented Computing and Applications 13(2): 109-125, 2019.  Type: Article

Given the ubiquity of cloud computing on the one hand and the (well-hidden) complexity of providing elastically scaling distributed services on the other, one wonders how cloud architects can describe such scenarios. Remembering the he...

Jan 26 2021  
   Dense 3D-convolutional neural network for person re-identification in videos
Liu J., Zha Z., Chen X., Wang Z., Zhang Y. ACM Transactions on Multimedia Computing, Communications, and Applications 15(1s): 1-19, 2019.  Type: Article

It is well known that the current types of neural networks perform quite well in identifying faces in (still) images. But what about re-identifying moving pedestrians in non-overlapping video sequences taken from different cameras?...

Apr 19 2019  
   Survey on fog computing
Hu P., Dhelim S., Ning H., Qiu T. Journal of Network and Computer Applications 98(C): 27-42, 2017.  Type: Article

In the Internet of things (IoT), is there a difference between edge and fog computing?...

Apr 3 2019  
   Introducing Ethereum and Solidity: foundations of cryptocurrency and blockchain programming for beginners
Dannen C., Apress, New York, NY, 2017. 185 pp.  Type: Book (978-1-484225-34-9)

Bitcoin and other blockchain variants like Ethereum are currently garnering a tremendous amount of professional and public interest. While this undoubtedly is, in part, due to their financial (highly speculative) rise, I was curious to...

Dec 26 2017  
   A resource oriented integration architecture for the Internet of Things
Dar K., Taherkordi A., Baraki H., Eliassen F., Geihs K. Pervasive and Mobile Computing 20145-159, 2015.  Type: Article

A concrete component architecture for integrating small Internet of Things (IoT) devices into larger business processes is central in this easy-to-follow and comprehensive paper. Against the backdrop of an ambient assisted living syste...

Mar 22 2016  
   Bloom filter-based workflow management to enable QoS guarantee in wireless sensor networks
Tong E., Niu W., Li G., Tang D., Chang L., Shi Z., Ci S. Journal of Network and Computer Applications 3938-51, 2014.  Type: Article

In service-oriented architectures (SOAs), workflow quality of service (QoS) composed of a hierarchically organized set of services ultimately depends on the reliability of the individual atomic services at the very bottom of the servic...

Feb 12 2015  
   Stewarding a legacy: responsibilities and relationships in the management of post-mortem data
Brubaker J., Dombrowski L., Gilbert A., Kusumakaulika N., Hayes G.  CHI 2014 (Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, Toronto, Ontario, Canada, Apr 26-May 1, 2014) 4157-4166, 2014.  Type: Proceedings

Who should own your digital legacy (for example, your Facebook page or tweets) and manage your “digital afterlife” once you are deceased? As opposed to standard legal inheritance, this paper elaborately explores the...

Oct 2 2014  
   Thriving systems theory: an emergent information systems design theory
Waguespack L., Schiano W.  HICSS 2013 (Proceedings of the 2013 46th Hawaii International Conference on System Sciences,Jan 7-10, 2013) 3757-3766, 2013.  Type: Proceedings

Sometimes it is said that excellent software artifacts are also aesthetically appealing, representing some sense of beauty for an observer. Thriving systems theory (TST), an information systems (IS) design theory, sets out to operation...

Sep 19 2013  
   Software systems architecture: working with stakeholders using viewpoints and perspectives (2nd ed.)
Rozanski N., Woods E., Addison-Wesley Professional, Upper Saddle River, NJ, 2011. 704 pp.  Type: Book (978-0-321718-33-4)

If you need to learn or understand how a software architect should or could work according to the state of the art, or if you like to have a reference in this realm to turn to, then this book is a must-have....

Jul 13 2012  
 
 
 
Display per column
 
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright 1999-2024 ThinkLoud®
Terms of Use
| Privacy Policy