Each month's internationally recognized Guest Editor is an expert on the topic the Journal is exploring. The Guest Editor drills down and identifies the threads that IT professionals worldwide argue about in meetings and then lay awake at night pondering, and helps to find the most experience, skilled, and insightful IT practitioners, consultants and even academics to bring you a complete view of the topic at hand.
|April||Next Generation Production Management||Charalampos Z. Patrikakis|
|March||Value-added Agile Strategies||Dave Rooney|
|February||People Architecture Defines Enterprise Architecture||Balaji Prasad|
|January||Improving Trust and Partnership Between Business and IT||Bob Benson and Piet Riebers|
Mobile Security: Managing the Madness
Long predicted, the mobile revolution still took the community of IT professionals off guard. Initially, it seemed that the mobile computing market was limited in scope -- the Windows CE, Palm OS, Symbian, and even BlackBerry OS devices too expensive and unwieldy to appeal to more than a minority of users. Then the iPhone happened, striking a remarkable balance between Apple user friendliness and carrier-subsidized price point, and the era of the smartphone began. In the span of seven years, mobile has arrived with unprecedented velocity. This astonishing adoption curve has yet to reveal its ultimate ramifications for human society and the global economy, but at this stage, one implication is very obvious -- the teetering balance struck by enterprise IT in the networked PC era is not working anymore.
Internet of Things: Technologies, Opportunities, Solutions
The articles in this issue highlight the technology enablement of a rich set of new and innovative opportunities. Ubiquitous connectivity, nanotechnology, machine learning, and the cloud, in conjunction with trends like mobility and social networks, provide the underpinnings for solutions that will affect our lives in unimaginable ways. Yet with every new wave of technology come basic challenges that need to be addressed. These include security and privacy, the need to create new business models that generate value, interoperability between differing vendor solutions, and some level of standardization.
|Ron Zahavi and Alan Hakimi|
Agile in the Real World
The recurring theme in this issue is that any predefined method such as Scrum, XP, or Kanban is simply a convenient place to start your team's or your organization's journey. All of the stories told in these articles highlight what Benson says -- you must adapt or "die." Those adaptations may or may not be part of what's generally accepted to be Agile, but as Matalonga tells us, that's how adapting to one's context comes into play. In their articles, Waters, Surdek, and Rodriguez all describe how the teams they were a part of spent time and effort to adjust how they worked in order to improve.
Decision-Making: Art, Science, or Alchemy?
Our goal in this issue of Cutter IT Journal is not to put a finite point on decision making but to expose ourselves to the vast array of decision-making complexities. All of this issue's articles give us more to think about, as well as practical tools. We didn't put this issue together to ruin your week. We put it together to arm you with insights. We are confident that readers will store some of the ideas we deliver here somewhere in the backs of their minds and that this information will be triggered at an appropriate time.
Data Hacking: No Day at the Breach
In this edition of Cutter IT Journal, we have collected the viewpoints of five serious thinkers on some of the most troubling security issues involving perhaps today's most troubling business/technology area. Clearly, this CITJ cannot solve the major issues with cyber security. However, as we have found out in so many other areas, solutions frequently begin with understanding the underlying problems, which then leads to future technology and management directions. While no one will be able to create an impenetrable fortress even with this insight, thoughtful business and technology management planning vastly improves the odds that an enterprise's security problems will not be the lead story on the evening news.
In this special double issue of Cutter IT Journal, we endeavor to examine the correlation between empathy and the practices surrounding the systems development lifecycle (SDLC). Our goal is to demonstrate the benefits that an empathy-based approach can bring to the SDLC and the way that IT leaders interact with their internal customers and constituents.
Serious games provide an attractive alternative to traditional innovation techniques for both participants in the innovation process: technology producers and technology consumers. Whether or not producers and consumers behave like innovation partners, or even realize they are engaged in this partnership, innovation does require at least two participants to play. In the best of all possible partnerships, there is a smooth collaboration between the two players, but, as you'll discover in this issue of Cutter IT Journal, this often this isn't the case.
How IT Can Transform Healthcare
In this issue on healthcare IT, we explore the field’s potential and examine how we can address the issues and challenges that IT and the healthcare industry face in realizing the promise of healthcare IT.
Workforce 2020–2025: What Skills Are Needed to Survive and Thrive?
This month in Cutter IT Journal, we present five wide-ranging, insightful articles on the possible technological, management, and business skills that executives, managers, and workers in organizations (private and public sector, large and small) will need in the 2020-2025 timeframe as a result of the ceaseless improvement in information systems and their core technologies. While the articles by our group of international authors offer different predictions about what skills individuals and organizations will need to have in order to succeed in the next decade, they all agree that they will likely be radically different from the skills considered to be in the vanguard today.
Agile Architecture: Dodo Bird or Differentiator?
In this edition of Cutter IT Journal, we offer opinions and perspectives on how an Agile architecture increases the value teams deliver to their organizations. We also seek insight on the possible challenges and risks faced by project teams working within an Agile architecture framework, as well as specific practices that can ensure your team's Agile transformation executes smoothly.
Does Agile = Better DW/BI?
This issue of Cutter IT Journal addresses Agile DW/BI and provides practical advice and insight on how an Agile approach allows DW/BI teams to deliver value more quickly to their organizations. We also provide guidance on the possible challenges and risks faced by DW/BI teams working in an Agile framework and specific practices that can ensure a DW/BI team's Agile transformation goes smoothly.
The Perception, the Power, and the Promise of Social Media Analytics
Clearly there are tremendous possibilities for insights and revelations within the sheer volume of data generated by billions of people worldwide. In this issue we explore -- and, we believe, answer -- the question "How do we measure the value of social media insights?" At one end of the spectrum we can simply understand how much people are talking about a particular product or service. And there is value in knowing that. At the other extreme, we see organizations analyzing this data to uncover entirely new and promising business models. The next step is yours -- what new and insightful information will social media analysis reveal about your organization?
|Matt Ganis and Avinash Kohirkar|
Disciplined Agile Delivery: The Foundation for Scaling Agile
This issue of Cutter IT Journal is a follow-up to June 2013's "Disciplined Agile Delivery in the Enterprise" issue. That edition of the journal covered strategies for bringing greater discipline to Agile software delivery teams, while this one focuses on how to scale disciplined Agile approaches. The term "scaling Agile" has at least two distinct definitions, both of which make complete sense. One vision focuses on adopting Agile techniques across an entire IT organization and ultimately instilling Agile behavior in the enterprise as a whole. The second vision focuses on how to apply Agile techniques in complex situations, in geographically distributed teams, or in regulatory regimes. Some people mistakenly believe these situations are outside the purview of Agile, but that's clearly not true in practice. In this issue, we explore these visions and show that both are key aspects to truly scaling Agile.
Value of Social Media Data Part I
In this issue of CITJ, we address the value of Big Data analysis of social media content and provide guidance, insight, and actual case studies on whether or not the knowledge and insight derived from this data is worth the resources spent.
|Matt Ganis and Avinash Kohirkar|
Profiting in the API Economy
If anything can be said for sure, it is that the time of the API economy is now, and an interesting time it is. The potential benefits are many, and there are plenty of success stories out there. However, which of those benefits are achievable by specific companies and in what ways remains unclear. This issue of Cutter IT Journal explores these topics and aims to help companies answer the question of how the various benefits offered by the API economy can be unlocked.
Privacy in the Internet of Things
While reading through the articles for this special issue of Cutter IT Journal on privacy and security in the Internet of Things (IoT), I kept thinking of that old Carpenters' song, "We've Only Just Begun," along with the Grateful Dead's classic "Truckin,'" which contains the immortal line: "Lately it occurs to me what a long, strange trip it's been." If we mash up the two lines, the resulting "We've Only Just Begun this Long, Strange Trip" would seem to be an appropriate anthem for the Internet of Things. The more you learn about the possibilities of the IoT, the more you realize we have only dipped our toes into this fathomless ocean of data possibilities -- and associated privacy and security concerns.
Is IT Still Relevant?
IT is just one possible channel through which software delivers value. Moreover, the traditional IT channel is being outclassed, outgunned, and outmaneuvered both within the corporation where IT is becoming departmental and in the "real world" via consumer technology (CT) and operational technology (OT). What is a CIO to do? This issue of Cutter IT Journal is rich in actionable insights.
Disciplined Agile Delivery in the Enterprise
This issue describes the experiences and findings of senior consultants and researchers who have been actively involved with helping organizations around the world apply Agile strategies in enterprise environments.
The Role of Coaching, Mentoring and Team Building in High Performance Teams
As the economy continues to recover globally, IT leadership will certainly turn its attention to staff development, leadership development, and training. The articles in this issue provide perspective for leaders trying to be effective with distributed or colocated teams. Our contributors have provided a comprehensive view that includes all aspects of the challenge, from philosophies underlining leadership to practical frameworks that can facilitate common understanding of all team training objectives. There's no time like now to upgrade your leadership development and staff training programs.
Is Lean the Path to Releasing the Competitive Business Potential in Knowledge Work?
The key to improving business effectiveness is to improve our understanding of the world in which we live and do business. Providing options and lenses for new thinking is the purpose of this edition of Cutter IT Journal.
The Emerging Cloud Ecosystem: Innovative New Services and Business Models
Driven by several converging and complementary factors, cloud computing is advancing as an IT service delivery model at a staggering pace. It is also causing a paradigm shift in the way we deliver and use IT. Its transformational potential is huge and impressive, and consequently cloud computing is being adopted by a spectrum of stakeholders -- individual users, businesses, educational institutions, governments, and community organizations. It is also helping to close the digital (information) divide. To provide a glimpse of the emerging cloud ecosystem and the issues surrounding it, we present four articles in this issue that focus, in turn, on PaaS-IaaS integration, intrusion detection as a service (IDaaS), user-centric cloud service agreements, and the realization of an interoperable cloud ecosystem.
SMAC: Social, Mobile, Analytics, and Cloud
From time to time, the corpus of information technologies absorbs new classes of technology, often in one fell swoop. The collection of technologies discussed here -- social, mobile, analytics, and cloud (SMAC) -- represents such a bundle. A decade ago, social, mobile, and cloud technologies were more a gleam in the eye of innovators than part of the CIO repertoire. Back then, analytics were frozen in a period of glacial change that was moving far too slow to attract much attention except from analysts trying to divine which bigger vendor was going to buy which smaller vendor. Today, social, mobile, analytics, and cloud are the cornerstone technologies driving innovation inside many if not most enterprises. In this issue of Cutter IT Journal, we bring together five articles with some different looks at the opportunities and challenges SMAC poses.
Making Managerial Dashboards Meaningful
In this edition of Cutter IT Journal, we will focus on the selection of the metrics that organizations should include in their dashboards to indicate how the business is performing. Moreover, we will learn best practices and guidelines for showing the information on the screen and the main requirements to keep in mind when designing dashboards. We will consider different contexts for dashboards, such as development teams and global enterprises, and we will see how different the requirements for a dashboard can be depending on their context of application.
|December 2006||Sourcing: Out or In?|
|November 2006||Avoiding Privacy Pitfalls|
|October 2006||Web 2.0|
|September 2006||Organizing IT: What's the Right Structure?|
|August 2006||Putting the Intelligence Back into Business Intelligence|
|July 2006||Do Agilists Understand Requirements?|
|June 2006||CRM: The Next Five Years|
|May 2006||Securing Cyberspace, Part II|
|April 2006||IT Performance Management/CIO Dashboard|
|March 2006||Enterprise Architecture: Best Practices?|
|February 2006||The Role of Strategy, Planning, and Budgeting in an Agile Organization|
|January 2006||Securing Cyber Space: Is it Time to Rethink Our Strategy?|
|December 2005||Agile Data Techniques|
|November 2005||IT-Related Litigation: Likely Trends and Recommended Practices|
|October 2005||M&As: Can IT Make the Difference Between Success and Failure?|
|September 2005||IT in the Age of Governance|
|August 2005||Mobile and Wireless Computing, Part II: Vive La Revolution!|
|July 2005||The Elusive Quest for Collaboration and Teamwork, Part II|
|June 2005||Mobile and Wireless Computing at a Crossroads: Where Are We Heading?|
|May 2005||Content Management Systems: The Next Decade|
|April 2005||The Politics of IT Management|
|March 2005||Business Performance Management: Have We Gotten Anywhere?|
|February 2005||The Elusive Quest for Collaboration and Teamwork|
|January 2005||The Magic of Peer Reviews|
|December 2004||How Can IT Support Effective Knowledge Management?|
|November 2004||IT-Based Business Innovations|
|October 2004||Offshore Outsourcing: No Pain, No Gain?|
|September 2004||In Pursuit of Information Quality|
|August 2004||Analyzing IT ROI: Can We Prove the Value?|
|July 2004||The Evolution of Agile Project Management: Part II|
|June 2004||The Evolution of Agile Project Management: Part I|
|May 2004||Service Orientation: New Vintage or Old Wine in New Bottles?|
|April 2004||The Business-IT Relationship|
|March 2004||Killing IT Projects: Part II|
|February 2004||Software Usability, Part II: What, How, and Who|
|January 2004||The Business of Software Architecture|
|December 2003||Killing IT Projects|
|November 2003||IT Metrics and Benchmarking: Part II|
|October 2003||Is Software Usability Getting the Respect It Deserves?|
|September 2003||Patterns in Software Development|
|August 2003||The New CIO Agenda|
|July 2003||EA Governance: From Platitudes to Progress|
|June 2003||IT Metrics and Benchmarking|
|May 2003||Is Open Source Ready for Prime Time?|
|April 2003||Project Portfolio Management: Blueprint for Efficiency or Formula for Boondoggle?|
|March 2003||Critical Chain Project Management: Coming to a Radar Screen Near You!|
|February 2003||XP and Culture Change: Part II|
|January 2003||Garbage In, Garbage Out": IT's Role in Improving Data Quality|
|December 2002||Preventing IT Burnout|
|November 2002||Globalization: Boon or Bane?|
|October 2002||Whither Wireless?|
|September 2002||XP and Culture Change|
|August 2002||Plotting a Testing Course in the IT Universe|
|July 2002||Confronting Complexity: Contemporary Software Testing|
|June 2002||B2B Collaboration: Where to Start?|
|May 2002||Information Security and Privacy in a Fragile World|
|April 2002||Web Services: "You Say You Got a Real Solution..."|
|March 2002||The Technology Myth in Knowledge Management|
|February 2002||Is Risk Management Going the Way of Disco?|
|January 2002||The Great Methodologies Debate: Part 2|
|December 2001||The Great Methodologies Debate: Part 1|
|November 2001||BI and CRM: Critical Success Factors for Achieving Customer Intimacy|
|October 2001||The Future of SPI|
|September 2001||Testing E-Business Applications|
|August 2001||Enterprise Application Integration|
|July 2001||Web Engineering: An Adult's Guide to Developing Internet-Based Applications|
|June 2001||The War for IT Talent|
|May 2001||Implementing an E-Business Strategy|
|April 2001||Multicultural and International Project Management|
|March 2001||Developing Wireless Distributed Applications|
|January 2001||Reorganizing IT for E-Business|