The Psychological Contract in Outsourcing: Harnessing the Value

Sara Cullen

A psychological contract is a construct comprising an indi­vidual’s assumptions and beliefs about what each party to a contract must do and how they are to do it. All individuals in both parties have their own unique psychological versions of that contract, which makes managing expectations quite challenging. In this Update, we explore the topic of harnessing the value of the psychological contract.


Mobile Security and the IoT

Brian Dooley

Mobile security is a complex issue that is growing more difficult as devices multiply within the organization. New devices include new ecosystems and new operating systems, which can conflict with existing security measures as well as adding less understood modes of access to online data. Lack of familiarity creates innumerable vulnerability points that may be exploited by sophisticated hackers, as devices become more widely used in critical applications. We have looked at mobile security before, mainly around the proliferation of smartphones in the office. But the issue is likely to become much more complicated as we enter the era of the Internet of Things (IoT).


Cutter Edge: Architecture's Messiness Begs for Quarkitecture

Cutter Consortium

In this issue: Quarkitecture -- a cure for architecture's messiness; the data integration analyst's pain point; CFP -- what is the emerging role of enterprise architecture and the enterprise architect?; save on Summit 2016 registration, How Mobile, Cloud and Big Data are Transforming Healthcare and more.


Through the Looking Glass: Overcoming Insignificant Product Releases

Thomas Perry

Are your teams delivering products that delight? These are just a few of the things that you can do to help your teams move the dial. 


Failures of Notice and Consent in the IoT Context

R Jason Cronk

One major purpose of the IoT is to collect massive amounts of very discrete data for analysis. Thus, the relevant privacy problems of big data come into play, specifically those of aggregation, scale, and difficulty in understanding what predictive analysis may ultimately affect the individual's interaction with the object.


Is Systems Thinking Finally Hitting Mainstream EA?

Roger Evernden

For many enterprise architects, the concept of systems thinking is almost synonymous with EA. But knowing about systems thinking and applying that knowledge in our daily work can be very different things. Is that finally starting to change? Is systems thinking finally hitting mainstream EA?


IaaS Contracts: From the Vendor’s Perspective

Sara Cullen

In this Executive Update, we look at IaaS contracts and the contentious clauses you might expect to see from an IaaS vendor. We focus on a public (unrestricted) example of IaaS because a private one (restricted to your organization) is nearly identical to a typical outsourcing agreement in which you have physical servers hosted at a vendor’s site.


IT Budgeting in 2015: Folks, It's Time to Remodel — Opening Statement

Joseph Feller

It is clear that our IT homes need a firmer footing, and there is a need for rethinking the fundamental relationships between the IT function, the IT budget, and all the other business entities within organizations. It is also clear that our IT homes need more light and reconfigurable spaces, and there is much we can gain from increasing the transparency and agility of the IT budgeting process.


IT Budgets: A Decade of Data

Dennis Adams

IT managers must construct the IT budget in such a way as to be obviously defendable as being supportive of the overall direction of the company. The wise IT manager will strive to have support from his or her non-IT colleagues whenever possible. This analysis of the latest CBR survey data will view the results from this perspective.


10 Years of the IT Budget Survey: A Look Back

Bob Benson

In the past decade, we have had 658 respondents to survey questions about budget, governance, and IT costs -- that is, the elements that form the foundation of managing IT in the enterprise. With this 10th survey, it is appropriate to consider what we've learned over the past decade and draw some overall conclusions about the IT budget as it relates to the effectiveness of IT in the organization.


IT Budget for 2015: Survey Data

Cutter Consortium

This survey, our 10th annual IT budgeting survey, examined general and specific aspects of IT budgeting in 33 organizations.


Farewell to Cutter Benchmark Review: Thanks for the Insights and Friends

Gabriele Piccoli

Gabriele Piccoli reflects on the foundational thought behind his approach to editing CBR — a data-grounded collaboration between IT academics and practitioners.


Cutter Benchmark Review: A Personal Farewell

Joseph Feller

As philosopher Marshall McLuhan famously argued, "The medium is the message." So here are Joe Feller's final set of CBR takeaways, all drawn from the mission of the journal itself:


Cutter’s Farewell to Cutter Benchmark Review

Cutter Consortium
  From Cindy Swain, Managing Editor:

Cutter Benchmark Review inaugurated its two-perspective (academic/practitioner) approach based on survey data from Cutter Consortium with the October 2005 issue. Our initial contributing authors were Cutter Senior Consultants Gabriele Piccoli and Ken Collier, with Gabe performing double-duty as Editor.


Fog Computing, the IoT, and the Open Fog Consortium

Curt Hall

Fog computing, also referred to as "Edge computing," is an IoT applications architecture designed to distribute the resources and services of computation, communication, control, and storage closer to the devices and systems at or near the edge of an IoT network or its endpoints (e.g., mobile devices, connected machines, users).


Conway’s Law in a Time of Digital Disruption

John Heintz, Israel Gat

With more and more companies embarking on digital transformation efforts of one kind or another, Conway’s law applies simultaneously to three levels of disruption, as identified by Geoffrey Moore: the traditional R&D and IT level, the operating model, and the overall business design. This Executive Update provides guidance on how to apply Conway’s law meaningfully within and across these three disruption levels.


Conway’s Law in a Time of Digital Disruption

John Heintz, Israel Gat

With more and more companies embarking on digital transformation efforts of one kind or another, Conway’s law applies simultaneously to three levels of disruption, as identified by Geoffrey Moore: the traditional R&D and IT level, the operating model, and the overall business design. This Executive Update provides guidance on how to apply Conway’s law meaningfully within and across these three disruption levels.


Recognizing and Managing Indulgences

Vince Kellen

One of the joys of IT is that it gives people the opportunity to learn new concepts and new skills and explore an inner mental world of creativity and show off their new creations.


MobilePay by Danske Bank: A Disruptive Mobile Payment Platform

Mathias Skaarup Lyster

This Executive Report assesses how a Danish bank managed to become the dominant player in the Danish mobile payment market by pursuing a disruptive “up-market” trajectory. By creating an autonomous business unit with full access to tangible and intangible organizational resources, Danske Bank developed the mobile payment app MobilePay, which has been downloaded by more than 60% of the Danish adult population, while creating a significant branding spillover effect in the bank’s favor.


MobilePay by Danske Bank: A Disruptive Mobile Payment Platform (Executive Summary)

Mathias Skaarup Lyster

This Executive Summary and its accompanying Executive Report provides a case description of how a Danish bank managed to create a mobile payment application that has now been installed and activated by more than 60% of the adult population in Denmark.


The Unseen Contract: Your Greatest Outsourcing Friend or Foe

Sara Cullen

In this on-demand webinar, Sara Cullen demonstrates how the items you believe are understood have a direct effect on your outsourcing arrangements' success.


Agile Team Structure and Quality

Maurizio Mancini

What I have found over the years of deploying Agile is that organizations forget one of the fundamental reason why they deploy Agile practices: you want your scrum teams to mature as a team and as they mature you should expect that the level of quality in the software delivered will be higher than it used to be.


Organizational Experience with Big Data Technologies for IoT Applications

Curt Hall

The Internet of Things (IoT) is expected to generate incredible amounts of data from a myriad of connected consumer devices and industrial applications. Achieving business value from this massive data stream will require the use of big data storage and analysis technologies that have the ability to scale to meet the constantly increasing demands placed on organizations. Of course, this brings up the question: just how familiar are organizations with the various big data technologies? A Cutter Consortium survey that asked 80 organizations worldwide about their IoT plans helps offer some insights into this question.


Wearables: Key Takeaways and Adjustments

Jesse Feiler

Takeaways for developers from the companies developing wearables are clear right now. You can find them in the public keynotes at developer conferences from Google and Apple as well as the not-for-disclosure documents widely available to developers for those and other platforms. Detailed APIs are available to developers, and with little effort you can find discussions and test code on public and semi-public resources such as GitHub and YouTube.


Back to the Future with Shared-Screen Experiences

Neil Roodyn

From the fantasy to the real world, there is already an emerging business in large shared-screen experiences. Museums, libraries, hotels, and resorts are among the first locations where organizations can see an immediate return on their investments in creating engaging experiences for visitors in an anonymous fashion. Currently most of these experiences are a small step forward from digital signage, providing people with the opportunity to navigate their own way through the content provided and in some instances share the content to their personal devices.