The BMC Agile Transformation: A Seven-Year Perspective
This Executive Update discusses some of the reasons behind the success of the BMC Agile rollout. It reviews past decisions in light of knowledge, experience, and insights that evolved a long time after the decisions, for better or worse, had been executed. In general, it’s about my making sense of things and sharing the author's insights with Cutter clients.
What is Senior Management Really Afraid Of?
I am on the road about 280 days a year. During my travels, I collect over 500 business cards every five to six weeks. In fact, I've been called a "bow tie wearing sensing device" by my sharper-tongued colleagues. During the past two years, I have been going door to door with senior executives to determine what the "top of the house" is really thinking about.
Reflections on Innovation, Part II: A Useful Idea -- Special Things
In the first installment of this Advisor series (Reflections on Innovation, Part I: An Idea, 29 September 2011), I suggested that you can conceive the idea of something -- its perfect,
Go Big or Go Home with Agile
Modeling Languages that Support BPM
Need Software Engineers to Develop Secure Software? Put It in Your Job Descriptions!
Recently I had occasion to review software engineering position descriptions to try to understand what skills were sought after for entry-level software engineers. Much to my chagrin, I found that the top-level requirements, and for the most part the secondary requirements, made no mention of knowledge of how to develop secure software, how to avoid coding vulnerabilities, how to do threat modeling, and so on.
Applying Decision Models to Resource Allocation in Network Security
Improving the effectiveness of resource allocation decisions for cyber security is an extremely important issue, especially since resources are constrained and organizations would like to have the best security they can for their budgets. The accompanying Executive Report discusses several relevant issues to such decisions.
Applying Decision Models to Resource Allocation in Network Security
Making effective decisions regarding the allocation of resources for network security is a key part of business today. This Executive Report focuses on the relevant issues, including a number of questions that require special attention from CIOs and chief security officers (CSOs).
Applying Decision Models to Resource Allocation in Network Security
Making effective decisions regarding the allocation of resources for network security is a key part of business today. This Executive Report focuses on the relevant issues, including a number of questions that require special attention from CIOs and chief security officers (CSOs).
Applying Decision Models to Resource Allocation in Network Security
Making effective decisions regarding the allocation of resources for network security is a key part of business today.
Applying Decision Models to Resource Allocation in Network Security
Making effective decisions regarding the allocation of resources for network security is a key part of business today.
The Lawful Interception of Social Media: Security Over Privacy
Governments utilize lawful interception (LI) as a means of law enforcement. LI consists of obtaining telecommunications data -- both the signaling information and the content of the communications themselves -- in order to identify and circumvent potential threats and crimes and to gather evidence against the perpetrators.
The Lawful Interception of Social Media: Security Over Privacy
Governments utilize lawful interception (LI) as a means of law enforcement. LI consists of obtaining telecommunications data -- both the signaling information and the content of the communications themselves -- in order to identify and circumvent potential threats and crimes and to gather evidence against the perpetrators.
Gonnegtions, the Occupy Movement, and the Future of Decision Making
In the literary classic The Great Gatsby, Meyer Wolfsheim hints at some shady business "gonnegtions" (an intentional mispronunciation of "connections"), suggesting that there's money to be made if the protagonist is a fellow "businessman" (read: criminal). Over the past few weeks, we've seen the Occupy Wall Street movement
The Make-Up of a Big Agile Engagement: You Need Two Frameworks
The "secret sauce" of agile productivity at the team level is that everyone does the most important thing at any point in time. Instead of following a rigid plan in which it takes months, and possibly years, to act on feedback, agile methods are geared toward immediacy of feedback and subsequent adaptation.
Top 10 Mistakes Project Managers Make
The Barriers to Collaboration
One Size Does Not Fit All: Hiring an Agile Coach
If your company is adopting agile methods for software development, you've probably been told you need ScrumMasters or agile coaches. But who should fill those roles? No matter the name, the essence of the role is to help teams learn new skills, continuously improve, and make the transition to a new way of working.
Making Architectural Principles Actionable
Architectural principles are a common part of most EA programs, but as with anything, some principles are better defined than others and some EA programs better understand the role of principles and how to use them.
The New Outsourcing: Toward Collaborative Innovation
This Executive Report examines current research by my colleagues and I regarding the outsourcing and innovation practices of 26
The New Outsourcing: Toward Collaborative Innovation
In just over 20 years, the IT outsourcing (ITO) and business process outsourcing (BPO) markets have grown to exceed US $420 billion in annual revenues globally. In that time, research studies have shown growing success where limited outsourcing objectives on cost and service have been pursued. However, the record on innovation, cost-plus innovation, and strategic advantage from outsourcing has been more disappointing.