|
|
|
|
| As principal of Atos Origin Austria’s management consulting practice, Strnadl is currently accountable for the consulting domain of information management and strategy and strategic sourcing, helping top companies leverage the value of their information technology (IT) assets and services. Parallel to his academic education, Strnadl worked as a consultant in IT and communications (1988-1994), and completed several successful projects in the field of electronic data interchange and messaging integration. In 1994, Strnadl joined Atos Origin (Austria), a leading global IT consulting and services firm, where he has held various management positions in the value added network services field. In 1997, he was appointed to the management team. In this role, Strnadl has developed, applied, and published several conceptual frameworks and models to be used for effectively bridging the communications gap between business and IT management to enable the effective alignment of business and IT. These include the IT Driver Model, the Triple-A Approach to IT Investment Appraisal, and the IT Score Card, a generic model for developing an IT strategy based on the notion of the (suitably adapted) Balanced Scorecard by Kaplan and Norton. His customers include the largest Austrian enterprises, where his projects support executive management and IT management alike to develop, formulate, and realize long-term and truly strategic approaches to IT and information management. They comprise various themes, including IT strategy development, determination of the return on investment (ROI) of IT projects, or evaluation of different IT sourcing options (for instance, insourcing versus outsourcing). In addition to his consulting projects, Strnadl frequently acts as senior project manager for very large, highly complex strategic IT projects. These assignments included the position of global project manager for Austria’s largest international IT infrastructure outsourcing deal ever. The rare combination of a deep theoretical foundation and ample practical application experience qualifies Strnadl as one of the leading IT outsourcing specialists in Austria. Due to his broad technical experience and integration skills within complex contexts, Strnadl is a recognized speaker at public events, and is a trainer at IT strategy seminars, with over 40 appearances in the last couple of years. Strnadl is member of the ACM, IEEE, ¿¿VO (Austrian Association for Organisation and Management), and the CMG, where he holds various national and international board positions. He is a senior referee for the IEEE's Computer magazine, and writes for IEEE Multimedia. His contributions to the IT strategy and sourcing field have been published in international peer-reviewed journals and conferences. He was born in 1966, and is married with two children. |
|
|
|
Date Reviewed |
|
|
1 - 10 of 16
reviews
|
|
|
|
|
|
|
|
A survey on end-edge-cloud orchestrated network computing paradigms: transparent computing, mobile edge computing, fog computing, and cloudlet Ren J., Zhang D., He S., Zhang Y., Li T. ACM Computing Surveys 52(6): 1-36, 2019. Type: Article
Recognizing the limits of (distant) cloud computing, modern Internet of things (IoT) architectures recognize the so-called edge continuum between cloud applications and IoT devices and machines. “Continuum” implies ...
|
Jun 17 2022 |
|
|
|
|
|
|
Service description languages in cloud computing: state-of-the-art and research issues Nawaz F., Mohsin A., Janjua N. Service Oriented Computing and Applications 13(2): 109-125, 2019. Type: Article
Given the ubiquity of cloud computing on the one hand and the (well-hidden) complexity of providing elastically scaling distributed services on the other, one wonders how cloud architects can describe such scenarios. Remembering the he...
|
Jan 26 2021 |
|
|
|
|
|
|
Dense 3D-convolutional neural network for person re-identification in videos Liu J., Zha Z., Chen X., Wang Z., Zhang Y. ACM Transactions on Multimedia Computing, Communications, and Applications 15(1s): 1-19, 2019. Type: Article
It is well known that the current types of neural networks perform quite well in identifying faces in (still) images. But what about re-identifying moving pedestrians in non-overlapping video sequences taken from different cameras?...
|
Apr 19 2019 |
|
|
|
|
|
|
Survey on fog computing Hu P., Dhelim S., Ning H., Qiu T. Journal of Network and Computer Applications 98(C): 27-42, 2017. Type: Article
In the Internet of things (IoT), is there a difference between edge and fog computing?...
|
Apr 3 2019 |
|
|
|
|
|
|
Introducing Ethereum and Solidity: foundations of cryptocurrency and blockchain programming for beginners Dannen C., Apress, New York, NY, 2017. 185 pp. Type: Book (978-1-484225-34-9)
Bitcoin and other blockchain variants like Ethereum are currently garnering a tremendous amount of professional and public interest. While this undoubtedly is, in part, due to their financial (highly speculative) rise, I was curious to...
|
Dec 26 2017 |
|
|
|
|
|
|
A resource oriented integration architecture for the Internet of Things Dar K., Taherkordi A., Baraki H., Eliassen F., Geihs K. Pervasive and Mobile Computing 20145-159, 2015. Type: Article
A concrete component architecture for integrating small Internet of Things (IoT) devices into larger business processes is central in this easy-to-follow and comprehensive paper. Against the backdrop of an ambient assisted living syste...
|
Mar 22 2016 |
|
|
|
|
|
|
Bloom filter-based workflow management to enable QoS guarantee in wireless sensor networks Tong E., Niu W., Li G., Tang D., Chang L., Shi Z., Ci S. Journal of Network and Computer Applications 3938-51, 2014. Type: Article
In service-oriented architectures (SOAs), workflow quality of service (QoS) composed of a hierarchically organized set of services ultimately depends on the reliability of the individual atomic services at the very bottom of the servic...
|
Feb 12 2015 |
|
|
|
|
|
|
Stewarding a legacy: responsibilities and relationships in the management of post-mortem data Brubaker J., Dombrowski L., Gilbert A., Kusumakaulika N., Hayes G. CHI 2014 (Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, Toronto, Ontario, Canada, Apr 26-May 1, 2014) 4157-4166, 2014. Type: Proceedings
Who should own your digital legacy (for example, your Facebook page or tweets) and manage your “digital afterlife” once you are deceased? As opposed to standard legal inheritance, this paper elaborately explores the...
|
Oct 2 2014 |
|
|
|
|
|
|
Thriving systems theory: an emergent information systems design theory Waguespack L., Schiano W. HICSS 2013 (Proceedings of the 2013 46th Hawaii International Conference on System Sciences,Jan 7-10, 2013) 3757-3766, 2013. Type: Proceedings
Sometimes it is said that excellent software artifacts are also aesthetically appealing, representing some sense of beauty for an observer. Thriving systems theory (TST), an information systems (IS) design theory, sets out to operation...
|
Sep 19 2013 |
|
|
|
|
|
|
Software systems architecture: working with stakeholders using viewpoints and perspectives (2nd ed.) Rozanski N., Woods E., Addison-Wesley Professional, Upper Saddle River, NJ, 2011. 704 pp. Type: Book (978-0-321718-33-4)
If you need to learn or understand how a software architect should or could work according to the state of the art, or if you like to have a reference in this realm to turn to, then this book is a must-have....
|
Jul 13 2012 |
|
|
|
|
|
|
|
|
|
|
|