“Kerrie is a very talented leader. He is also a great team player, approachable and always willing to help a colleague. I particularly valued Kerrie’s focus on achieving quality results for the clients and his ability to work effectively with executives. I enjoyed our time together at IBM and I learned a lot from working with Kerrie.”
Activity
-
Mother's Day is hard for many -- I lost mine to cancer two decades ago. And yet, I find myself on a plane to the Middle East, working with my…
Mother's Day is hard for many -- I lost mine to cancer two decades ago. And yet, I find myself on a plane to the Middle East, working with my…
Liked by Kerrie Holley
-
Thank you to everyone--on the stage, in the audience, and behind the scenes--who made our 3rd-annual Movement conference the best one yet…
Thank you to everyone--on the stage, in the audience, and behind the scenes--who made our 3rd-annual Movement conference the best one yet…
Liked by Kerrie Holley
Publications
-
s Your Company Ready for Cloud: Choosing the Best Cloud Adoption Strategy for Your Business
IBM Press
A guide that emphasizes the need for a Cloud Adoption Strategy offering guidance on cloud Investment decisions and adoption. Provides information on making and evolving your strategy so that it remains relevant during changing business conditions.
-
Harnessing Data to Fight Crime
Huffington Post
Police can now rely on computer and communications systems that provide immediate access to everything that is known about a particular crime or person. This article shows how technology and analytic technology can help fight crime.
-
100 SOA Questions: Asked and Answered
Prentice Hall
100 SOA Questions brings together authoritative answers to the most crucial questions business, technical, practitioners and architectural decision-makers ask about SOA. It draws on the immense experience of two SOA experts who’ve participated in more than 100 SOA projects in the roles of architect, designer, consultant, technical manager, and strategist.
The book is designed for the experienced SOA practitioner and someone just beginning their journey, The reader can easily skip to a…100 SOA Questions brings together authoritative answers to the most crucial questions business, technical, practitioners and architectural decision-makers ask about SOA. It draws on the immense experience of two SOA experts who’ve participated in more than 100 SOA projects in the roles of architect, designer, consultant, technical manager, and strategist.
The book is designed for the experienced SOA practitioner and someone just beginning their journey, The reader can easily skip to a domain of interest such as business, architecture, organization or governance. -
SOA Governance: Achieving and Sustaining Business and IT Agility
Persons/IBM Press
Address the #1 Success Factor in SOA Implementations: Effective, Business-Driven Governance
Inadequate governance might be the most widespread root cause of SOA failure. In SOA Governance, a team of IBM’s leading SOA governance experts share hard-won best practices for governing IT in any service-oriented environment.
The authors begin by introducing a comprehensive SOA governance model that has worked in the field. They define what must be governed, identify key stakeholders, and…Address the #1 Success Factor in SOA Implementations: Effective, Business-Driven Governance
Inadequate governance might be the most widespread root cause of SOA failure. In SOA Governance, a team of IBM’s leading SOA governance experts share hard-won best practices for governing IT in any service-oriented environment.
The authors begin by introducing a comprehensive SOA governance model that has worked in the field. They define what must be governed, identify key stakeholders, and review the relationship of SOA governance to existing governance bodies as well as governance frameworks like COBIT. Next, they walk you through SOA governance assessment and planning, identifying and fixing gaps, setting goals and objectives, and establishing workable roadmaps and governance deliverables. Finally, the authors detail the build-out of the SOA governance model with a case study.
The authors illuminate the unique issues associated with applying IT governance to a services model, including the challenges of compliance auditing when service behavior is inherently unpredictable. They also show why services governance requires a more organizational, business-centric focus than “conventional” IT governance.
Coverage includes
* Understanding the problems SOA governance needs to solve
* Establishing and governing service production lines that automate SOA development activities
* Identifying reusable elements of your existing IT governance model and prioritizing improvements
* Establishing SOA authority chains, roles, responsibilities, policies, standards, mechanisms, procedures, and metrics
* Implementing service versioning and granularity
* Refining SOA governance frameworks to maintain their vitality as business and IT strategies change -
Towards an On Demand Service-oriented Architecture
IBM Systems Journal Volume 44, Number 1
-
Powerful Enterprise Architecture and Information Technology Strategies
Sys-Con
The promises of services-oriented architecture, enterprise architecture (EA), and information technology (IT) strategies - to change IT from inhibitor to enabler of business flexibility and align IT with business strategies - are remarkably similar. However, for many companies, their EA and IT strategies have not become the catalyst for the intelligence enterprise, the sense-and-respond organization, the agile enterprise, or the adaptive enterprise.
-
Migrating to a SOA
IBM DeveloperWorks
This is the first in a series of papers intended to help one understand the value of a service-oriented architecture (SOA), and to develop a realistic plan for evaluating current infrastructure and migrating it to a true service-oriented architecture. It is intended that after reading this paper, one will understand why it is claimed that a SOA is the best platform for carrying existing assets into the future, as well as enabling the rapid and correct development of future applications.
Patents
-
Method for Capturing Evolving Data
Filed US US20180268014A1
A method for capturing evolving data, comprising observing a data graph, identifying a first entity within the graph, defining a first property of the first entity, and identifying a first data value corresponding to the property and the entity. The method further comprises associating a second entity with the first entity at first data value, and forming a dimension of the first entity with associations to other entities within the graph for different data values of the first property…
A method for capturing evolving data, comprising observing a data graph, identifying a first entity within the graph, defining a first property of the first entity, and identifying a first data value corresponding to the property and the entity. The method further comprises associating a second entity with the first entity at first data value, and forming a dimension of the first entity with associations to other entities within the graph for different data values of the first property. Identifying the first entity comprises identifying a property of the first entity representing a dimension but the property does not relate to other entities through the dimension. Defining the first property comprises identifying an attribute of the first entity that will not change; establishing the attribute as the first property.
-
Dynamic Digital Shelves using Big Data
Filed US US20170061519A1
A dynamic digital shelf system includes an interface for identification of a customer: a digital shelf manager in communication with the interface to: retrieve a store's products and services available according to the store's inventory; retrieve an enriched customer profile of a customer's interests wherein the enriched customer profile is enhanced by big data; retrieve a product to product metadata map; develop a customer insights profile to weight the customer's interests with respect to the…
A dynamic digital shelf system includes an interface for identification of a customer: a digital shelf manager in communication with the interface to: retrieve a store's products and services available according to the store's inventory; retrieve an enriched customer profile of a customer's interests wherein the enriched customer profile is enhanced by big data; retrieve a product to product metadata map; develop a customer insights profile to weight the customer's interests with respect to the store's products and services according to the store's criteria in the product to product metadata map; identify the store's products and services matching the enriched customer profile for products and services using the customer insights profile; and output the identified store's products and services. Included is a display in communication with the digital shelf manager to display the identified products and services output from the digital shelf manager which are personalized to the customer.
-
Inferring Insights from Enhanced User Input
Issued US US10108333B2
A method and associated systems for inferring insights from enhanced user input. A computerized messaging system identifies a user operating a mobile, location-enabled, “scribble” device and associates the user or the device with a domain of interest or with other metadata that characterizes the user. When the user enters an ad hoc “scribble” input via the device, the system automatically tags the input with the user's location, with sensory data received from one or more sensor devices, and…
A method and associated systems for inferring insights from enhanced user input. A computerized messaging system identifies a user operating a mobile, location-enabled, “scribble” device and associates the user or the device with a domain of interest or with other metadata that characterizes the user. When the user enters an ad hoc “scribble” input via the device, the system automatically tags the input with the user's location, with sensory data received from one or more sensor devices, and with ancillary data received from extrinsic data repositories. The system may then consider this ancillary and sensory data in order to identify or infer rules or insights associated with the user and the scribble. These rules may then be used to identify targeted, user-specific steps to perform in response to receiving the scribble, where these user-specific steps accommodate a user preference without exposing confidential user information to a public data repository.
-
Dynamic Visualization of Big Data
Filed US US9633090B2
Dynamic visualization of big data is provided. Data describing a user is received from at least one of a plurality of data sources. One or more characteristics of the user are determined based, at least in part, on the data describing the user. One or more visual indicators are determined based, at least in part, on the one or more characteristics of the user. A visual representation of the user is presented. The visual representation is based, at least in part, on the one or more visual…
Dynamic visualization of big data is provided. Data describing a user is received from at least one of a plurality of data sources. One or more characteristics of the user are determined based, at least in part, on the data describing the user. One or more visual indicators are determined based, at least in part, on the one or more characteristics of the user. A visual representation of the user is presented. The visual representation is based, at least in part, on the one or more visual indicators.
Other inventorsSee patent -
Modification of cloud application service levels based upon document consumption
Issued US US9300547 B2
An approach for modifying cloud application service levels based upon analysis of documents is provided. The approach performs automated ingestion of documents to determine criticality and needs of certain applications, and develops an understanding of existing cloud environments and service level agreements. The approach may further suggest or automatically reassign applications to the cloud infrastructure to meet the needs of an application.
Other inventorsSee patent -
System and methods for locating mobile devices using location and presence information
Issued US 8786438B2
A location based service and method configured to provide recovery assistance for a misplaced or stolen mobile device. The location based system and method is configured to locate (recover) high value mobile devices.
Other inventorsSee patent -
System and Methods for Locating Mobile Devices using Location and Presence Information
Issued US US8264352B2
A location based service and method configured to provide recovery assistance for a misplaced or stolen mobile device. The location based system and method is configured to locate (recover) high value mobile devices using location, presence and other IMS (IP Multimedia Subsystem) based telecommunications network assets. The method includes leveraging location dips performed for other services to drive a recovery process for a mobile device to thereby reduce resource overhead on a location…
A location based service and method configured to provide recovery assistance for a misplaced or stolen mobile device. The location based system and method is configured to locate (recover) high value mobile devices using location, presence and other IMS (IP Multimedia Subsystem) based telecommunications network assets. The method includes leveraging location dips performed for other services to drive a recovery process for a mobile device to thereby reduce resource overhead on a location platform; locating the mobile device using the location dips performed for other services; and sending a notification to a subscriber of the location of the mobile device for recovery of the mobile device.
-
Assigning Security Levels to a Shared Component
Issued US US7934093B2
Security levels are assigned to a shared component. A workflow manager receives a workflow request that corresponds to a plurality of workflow steps. For each workflow step, the workflow manager determines whether the workflow step uses a shared component or an unshared component for execution. If the workflow step uses a shared component, the workflow manager invokes the step, and stores the step and its corresponding security level in a security tracking table. When the workflow manager…
Security levels are assigned to a shared component. A workflow manager receives a workflow request that corresponds to a plurality of workflow steps. For each workflow step, the workflow manager determines whether the workflow step uses a shared component or an unshared component for execution. If the workflow step uses a shared component, the workflow manager invokes the step, and stores the step and its corresponding security level in a security tracking table. When the workflow manager encounters a shared component, the workflow manager uses the security tracking table entries in order to determine a security level to assign the shared component. The workflow manager assigns the determined security level to the shared component, and invokes the shared component to execute the corresponding process step.
-
System and Method for Maintaining Functionality During Component Failures
Issued US 20080082863
Maintaining functionality during component failures is presented. During application registration, a recovery engine generates a recovery plan for the application. The recovery plan includes recovery actions that correspond to each component that the application intends to access. When an application encounters an unavailable component, the recovery engine provides a recovery action to the application which instructs the application how to proceed, such as accessing a backup component. The…
Maintaining functionality during component failures is presented. During application registration, a recovery engine generates a recovery plan for the application. The recovery plan includes recovery actions that correspond to each component that the application intends to access. When an application encounters an unavailable component, the recovery engine provides a recovery action to the application which instructs the application how to proceed, such as accessing a backup component. The recovery engine tracks unavailable components and, when a subsequent application registers that intends to use an unavailable component, the recovery engine provides the subsequent application a recovery action, instructing the subsequent application how to proceed.
Other inventorsSee patent -
Method for Transforming an Enterprise Based on Linkages Among Business Components, Business Processes and Services
Filed US 20100250300
Organizations
-
ACM and IEEE
-
Recommendations received
3 people have recommended Kerrie
Join now to viewMore activity by Kerrie
-
The Hinge Health Movement conference is going to be an impactful event. This year promises to be the best yet.
The Hinge Health Movement conference is going to be an impactful event. This year promises to be the best yet.
Liked by Kerrie Holley
-
A Day of Insights and Inspiration at Columbia Business School's Think Bigger Innovation Summit. I recently had the privilege of attending the…
A Day of Insights and Inspiration at Columbia Business School's Think Bigger Innovation Summit. I recently had the privilege of attending the…
Liked by Kerrie Holley
-
Creating the future of computing with #quantum technologies and IBM's great university partner Rensselaer Polytechnic Institute.
Creating the future of computing with #quantum technologies and IBM's great university partner Rensselaer Polytechnic Institute.
Liked by Kerrie Holley
-
I've had many successes in my life. Learn how I leveraged a strong support system to become a technology leader in my #memoir, "Soft Power for the…
I've had many successes in my life. Learn how I leveraged a strong support system to become a technology leader in my #memoir, "Soft Power for the…
Liked by Kerrie Holley
-
I am truly honored to have been nominated for ‘IT Person of the Year’ along with 14 other candidates. I feel incredibly fortunate to have the…
I am truly honored to have been nominated for ‘IT Person of the Year’ along with 14 other candidates. I feel incredibly fortunate to have the…
Liked by Kerrie Holley
-
Where should you get your thought leadership from for Strategy in the age of AI as a GPT (General Purpose Technology) against the backdrop of a VUCAD…
Where should you get your thought leadership from for Strategy in the age of AI as a GPT (General Purpose Technology) against the backdrop of a VUCAD…
Liked by Kerrie Holley
-
The new IBM Research fellows’ wall has been unveiled today. Very proud of being among such great minds! I have been an IBM fellow since 2020, but…
The new IBM Research fellows’ wall has been unveiled today. Very proud of being among such great minds! I have been an IBM fellow since 2020, but…
Liked by Kerrie Holley
-
Standing in front of the Spheres and feeling excited about my upcoming relocation to Seattle. It's been a little over 60 days since I started at…
Standing in front of the Spheres and feeling excited about my upcoming relocation to Seattle. It's been a little over 60 days since I started at…
Liked by Kerrie Holley
-
What an incredible first board meeting with The Honest Company. Congratulations to the talented and hard working team on the stellar Q4 results and…
What an incredible first board meeting with The Honest Company. Congratulations to the talented and hard working team on the stellar Q4 results and…
Liked by Kerrie Holley
Other similar profiles
Explore collaborative articles
We’re unlocking community knowledge in a new way. Experts add insights directly into each article, started with the help of AI.
Explore More