Each month's internationally recognized Guest Editor is an expert on the topic the Journal is exploring. The Guest Editor drills down and identifies the threads that IT professionals worldwide argue about in meetings and then lay awake at night pondering, and helps to find the most experience, skilled, and insightful IT practitioners, consultants and even academics to bring you a complete view of the topic at hand.
|August||Mobile Security Challenges||Simon Woodworth|
|July||Big Data Privacy||Rebecca Herold|
|June||Disciplined Agile Delivery||Scott Ambler|
|May||The Role of Coaching, Mentoring and Team Building in High Performance Teams||Lynne Ellyn|
Is Lean the Path to Releasing the Competitive Business Potential in Knowledge Work?
The key to improving business effectiveness is to improve our understanding of the world in which we live and do business. Providing options and lenses for new thinking is the purpose of this edition of Cutter IT Journal.
The Emerging Cloud Ecosystem: Innovative New Services and Business Models
Driven by several converging and complementary factors, cloud computing is advancing as an IT service delivery model at a staggering pace. It is also causing a paradigm shift in the way we deliver and use IT. Its transformational potential is huge and impressive, and consequently cloud computing is being adopted by a spectrum of stakeholders -- individual users, businesses, educational institutions, governments, and community organizations. It is also helping to close the digital (information) divide. To provide a glimpse of the emerging cloud ecosystem and the issues surrounding it, we present four articles in this issue that focus, in turn, on PaaS-IaaS integration, intrusion detection as a service (IDaaS), user-centric cloud service agreements, and the realization of an interoperable cloud ecosystem.
SMAC: Social, Mobile, Analytics, and Cloud
From time to time, the corpus of information technologies absorbs new classes of technology, often in one fell swoop. The collection of technologies discussed here -- social, mobile, analytics, and cloud (SMAC) -- represents such a bundle. A decade ago, social, mobile, and cloud technologies were more a gleam in the eye of innovators than part of the CIO repertoire. Back then, analytics were frozen in a period of glacial change that was moving far too slow to attract much attention except from analysts trying to divine which bigger vendor was going to buy which smaller vendor. Today, social, mobile, analytics, and cloud are the cornerstone technologies driving innovation inside many if not most enterprises. In this issue of Cutter IT Journal, we bring together five articles with some different looks at the opportunities and challenges SMAC poses.
Making Managerial Dashboards Meaningful
In this edition of Cutter IT Journal, we will focus on the selection of the metrics that organizations should include in their dashboards to indicate how the business is performing. Moreover, we will learn best practices and guidelines for showing the information on the screen and the main requirements to keep in mind when designing dashboards. We will consider different contexts for dashboards, such as development teams and global enterprises, and we will see how different the requirements for a dashboard can be depending on their context of application.
Enterprise Patterns: The Key to Delivering Enterprise Transformation?
Change at an architectural level is always transformational. But too often architects have struggled to demonstrate or realize this potential for making a significant, positive difference at the enterprise level. Instead, big changes are more frequently driven by the architectural opportunities that arise from new technologies. This is starting to change, and leading enterprises are planning architectural change that genuinely combines the organizational, business, and technology perspectives. Enterprise transformation that successfully unites all three viewpoints requires a new technique to raise the architectural debate to the level of senior decision makers. This issue of Cutter IT Journal provides practical insight and guidance on how enterprise patterns are being used to drive transformational change.
Agile CMMI: Why Isn't This Conversation Dead Yet?
The news in this issue of Cutter IT Journal is that it's not agile or CMMI that fosters your culture, and it's not agile or CMMI that shuns or requires documentation. In fact, as we'll see, it's really not about agile or CMMI. And perhaps "To agile or not to agile?" is the wrong question to ask and the wrong perspective on matters. This issue we have lined up six articles that address everything from the right questions to ask to how to deal in an agile manner with very large systems. It seems a fairly universal conclusion that it's not agile or CMMI that are incompatible but the way they're applied in a given situation that makes them incompatible.
Turning Big Data into Big Benefits
The articles selected for this issue of Cutter IT Journal provide a handy opportunity to conduct that sober evaluation of Big Data technology. The discussion first provides a solid introduction to the world of BDA and then explores a set of important extensions of the technology.
IP, Innovation, and Collaboration: BFFs or Frenemies?
Most readers of Cutter IT Journal -- indeed, most CIOs and CTOs and their staffs -- live their professional lives somewhere at the intersection of IT and business management. Therefore, the impact of information and collaboration technologies on the processes of invention and innovation, as well as the effect of changing business conditions (including issues of scale), should be of key importance to them. This is the topic we address in this issue.
|Claude R. Baudoin|
Cloud Computing Standards
Why then the increasing interest in cloud computing standards in 2012? The answer is arguably quite simple: cloud computing represents a game-changing paradigm shift in the industry, with consumers (and the enterprises they serve) crying out for a broadened set of standards in areas where standards have never existed before. How does this all play out? Our contributing authors tackle this topic head on in this month's issue of Cutter IT Journal.
Fixing ERM: From IT Security to Human Behavior
The authors in this month's Cutter IT Journal think that many of the practices, processes, and techniques underpinning ERM continue to exhibit major flaws, which they too believe can be fixed to improve ERM's effectiveness. However, that belief is also balanced in each article by warnings that the fixes recommended will require major, sustained effort and so should not be viewed as easy tasks.
|Robert Charette Brian Hagen|
ITIL and IT Operational Excellence
In this issue of Cutter IT Journal, our six authors have focused on reasonable courses of action to enable ITIL to better satisfy the business customer's goals, and they provide specific recommendations on how IT operations can balance the conflicting demands of ITIL projects against the burgeoning (and sometimes overwhelming) demands of business users. Interestingly, the authors individually develop a consistent theme that the long-term survival of internal IT operations requires immediate changes in positioning and delivering these ITIL processes.
Consumerization of IT: Blessing or Curse?
In this issue of Cutter IT Journal, we present a number of authors with differing approaches to and perspectives on what some have termed the "consumerization of IT." Whatever we call it -- BYOD (bring your own device), mobility, consumerization -- it's not new. Nor is it solely about devices. What we are witnessing is an inevitable outcome of the convergence of technical and social forces that have blurred the line between work and personal lives and identities. The writing has been on the wall (or in this case, the tablet) for some time now.
Tackling Today's Enterprise Security Challenges
While the traditional fundamentals, principles, and approaches to security still hold true, in this issue of Cutter IT Journal we discuss new risks posed by the connected environment and new approaches to risk mitigation. Our four articles present four different perspectives on the issues and solutions.
Is Leadership a Science?
Is leadership a science? Whether you subscribe to the notion of leadership as science or consider it more of an art, we hope that this issue of Cutter IT Journal will provide tools and insights to improve leadership development in your own organization.
"Small is beautiful" in software. While big software might not be beautiful, more often than not, it's in the nature of what needs to be accomplished. This contrast between the beauty of the small and the requirements of the big generates systemic tension in many software projects, organizations, and companies. Resolving this conflict is the focus of this issue of Cutter IT Journal.
Hot IT Trends 2012
Each of these trends described in this issue is powerful on its own and requires devoted study from IT planners and leaders. Taken collectively, they can be a rather large tsunami that engulfs organizations faster than they can adjust. 2012 will likely emerge as a critical transition year in which two well-established trends, social media and consumer technology, meet up with two emerging trends, Big Data and cloud computing, and transform corporate IT from the inside and the outside. There is a lot of promise and peril in these trends. To some, they represent the beginning of the end of the modern IT organization. I -- and I think our authors -- would disagree. This is merely the end of the very early phase of an important transformation that will require all the best and brightest IT leaders across the globe. New tools enable new strategies, and, boy, do we have new tools available to us in 2012! To sort this out, I encourage you to read on and learn how these trends will impact you and your organization.
|December 2006||Sourcing: Out or In?|
|November 2006||Avoiding Privacy Pitfalls|
|October 2006||Web 2.0|
|September 2006||Organizing IT: What's the Right Structure?|
|August 2006||Putting the Intelligence Back into Business Intelligence|
|July 2006||Do Agilists Understand Requirements?|
|June 2006||CRM: The Next Five Years|
|May 2006||Securing Cyberspace, Part II|
|April 2006||IT Performance Management/CIO Dashboard|
|March 2006||Enterprise Architecture: Best Practices?|
|February 2006||The Role of Strategy, Planning, and Budgeting in an Agile Organization|
|January 2006||Securing Cyber Space: Is it Time to Rethink Our Strategy?|
|December 2005||Agile Data Techniques|
|November 2005||IT-Related Litigation: Likely Trends and Recommended Practices|
|October 2005||M&As: Can IT Make the Difference Between Success and Failure?|
|September 2005||IT in the Age of Governance|
|August 2005||Mobile and Wireless Computing, Part II: Vive La Revolution!|
|July 2005||The Elusive Quest for Collaboration and Teamwork, Part II|
|June 2005||Mobile and Wireless Computing at a Crossroads: Where Are We Heading?|
|May 2005||Content Management Systems: The Next Decade|
|April 2005||The Politics of IT Management|
|March 2005||Business Performance Management: Have We Gotten Anywhere?|
|February 2005||The Elusive Quest for Collaboration and Teamwork|
|January 2005||The Magic of Peer Reviews|
|December 2004||How Can IT Support Effective Knowledge Management?|
|November 2004||IT-Based Business Innovations|
|October 2004||Offshore Outsourcing: No Pain, No Gain?|
|September 2004||In Pursuit of Information Quality|
|August 2004||Analyzing IT ROI: Can We Prove the Value?|
|July 2004||The Evolution of Agile Project Management: Part II|
|June 2004||The Evolution of Agile Project Management: Part I|
|May 2004||Service Orientation: New Vintage or Old Wine in New Bottles?|
|April 2004||The Business-IT Relationship|
|March 2004||Killing IT Projects: Part II|
|February 2004||Software Usability, Part II: What, How, and Who|
|January 2004||The Business of Software Architecture|
|December 2003||Killing IT Projects|
|November 2003||IT Metrics and Benchmarking: Part II|
|October 2003||Is Software Usability Getting the Respect It Deserves?|
|September 2003||Patterns in Software Development|
|August 2003||The New CIO Agenda|
|July 2003||EA Governance: From Platitudes to Progress|
|June 2003||IT Metrics and Benchmarking|
|May 2003||Is Open Source Ready for Prime Time?|
|April 2003||Project Portfolio Management: Blueprint for Efficiency or Formula for Boondoggle?|
|March 2003||Critical Chain Project Management: Coming to a Radar Screen Near You!|
|February 2003||XP and Culture Change: Part II|
|January 2003||Garbage In, Garbage Out": IT's Role in Improving Data Quality|
|December 2002||Preventing IT Burnout|
|November 2002||Globalization: Boon or Bane?|
|October 2002||Whither Wireless?|
|September 2002||XP and Culture Change|
|August 2002||Plotting a Testing Course in the IT Universe|
|July 2002||Confronting Complexity: Contemporary Software Testing|
|June 2002||B2B Collaboration: Where to Start?|
|May 2002||Information Security and Privacy in a Fragile World|
|April 2002||Web Services: "You Say You Got a Real Solution..."|
|March 2002||The Technology Myth in Knowledge Management|
|February 2002||Is Risk Management Going the Way of Disco?|
|January 2002||The Great Methodologies Debate: Part 2|
|December 2001||The Great Methodologies Debate: Part 1|
|November 2001||BI and CRM: Critical Success Factors for Achieving Customer Intimacy|
|October 2001||The Future of SPI|
|September 2001||Testing E-Business Applications|
|August 2001||Enterprise Application Integration|
|July 2001||Web Engineering: An Adult's Guide to Developing Internet-Based Applications|
|June 2001||The War for IT Talent|
|May 2001||Implementing an E-Business Strategy|
|April 2001||Multicultural and International Project Management|
|March 2001||Developing Wireless Distributed Applications|
|January 2001||Reorganizing IT for E-Business|