The Latest in Data Virtualization from Composite Software

Curt Hall

This week, I spoke with the folks from Composite Software about the latest version of the company's data virtualization1 platform, Composite Enterprise Information Server 6.0. Composite Software's latest version adds new source data integration capabilities to the mix of sources it can access and integrate.


Are We Already Implementing Business Service Management?

Bill Keyworth

Even though the concept of "business service management" (BSM) has been debated, advocated, debased, and promoted for years, the immaturity in articulating its mechanisms is still somewhat pervasive. Yet IT has been, is, and will continue to be hammered for being disconnected from the business needs of the customers that it serves unless something fundamentally changes within IT.


IT Reorganization: Part II

Jerrold Grochow

In Part I of this three-part Executive Update series, we began our examination of a recent Cutter survey on the reorganization of the IT function. 1 Nearly three-quarters of reporting organizations had some type of IT reorganization in the past three years (81% in the past five).


Business Architecture: Part I — Why It Matters to Business Executives

William Ulrich

This Executive Update, the first in a series, discusses why business leaders should embrace business architecture as a means of addressing complex business challenges in ways that senior leadership can no longer ignore.


What Is a Complex Project Manager -- Really?

Robert Wysocki
Abstract

Despite their differences, there is one common link that all complex projects share: the need for a very special type of project manager, a person I call a "complex project manager." This family of professionals has not yet been formally defined.


What Is a Complex Project Manager -- Really?

Robert Wysocki

There is one common link that all complex projects share: the need for a very special type of project manager, a person I call a "complex project manager" (CPM). This family of professionals has not yet been formally defined.


What Suppliers Say About Clients: Part II -- Managing Outsourced Services

Mary Lacity, Leslie Willcocks, Leslie Willcocks

In this two-part Executive Report series, we share in detail what suppliers have been saying to us and our colleagues about clients during the past two decades -- the things they wish clients would know or do as well as things they wish clients didn't know or do. In Part I, we covered the 10 statements suppliers make about establishing the outsourcing arrangement. Here in Part II, we examine another 10 pertaining to managing outsourced services.


What Suppliers Say About Clients: Part II -- Managing Outsourced Services

Mary Lacity, Leslie Willcocks, Leslie Willcocks

In this two-part Executive Report series, we share in detail what suppliers have been saying to us and our colleagues about clients during the past two decades -- the things they wish clients would know or do as well as things they wish clients didn't know or do. In Part I, we covered the 10 statements suppliers make about establishing the outsourcing arrangement. Here in Part II, we examine another 10 pertaining to managing outsourced services.


Why Do We Need or Want a Mobile Strategy?

Steven Kursh

Let's begin with the most basic of questions that senior executives are asking: "Why do we need or want a mobility strategy and, specifically, mobile applications for our existing and new customers and/or clients?" As one IT executive said, his challenge was convincing senior management that smartphones provide real business applications -- not just A


Why Do We Need or Want a Mobile Strategy?

Steven Kursh

Let's begin with the most basic of questions that senior executives are asking: "Why do we need or want a mobility strategy and, specifically, mobile applications for our existing and new customers and/or clients?" As one IT executive said, his challenge was convincing senior management that smartphones provide real business applications -- not just A


Corporate Use of Predictive Analytics: Part II -- Application Areas and Implementation

Curt Hall

In February/March 2011, Cutter Consortium conducted a survey asking 60 end-user organizations various questions about the adoption and use of predictive analytics. The goal was to uncover corporate adoption trends and examine application development issues to discern how organizations are applying predictive analytics technology and practices to structured data analysis.


Ubiquity Is the New Sticky

Joseph Feller

In the early era of Web commerce, the strategic goal for all Web producers was to achieve and maintain "stickiness" -- the ability to attract repeat visitors to the producer's site. The site-centric Web, for all its disruptive impact on industry, still seemed an awful lot like the physical world of commerce.


Ubiquity Is the New Sticky

Joseph Feller

In the early era of Web commerce, the strategic goal for all Web producers was to achieve and maintain "stickiness" -- the ability to attract repeat visitors to the producer's site. The site-centric Web, for all its disruptive impact on industry, still seemed an awful lot like the physical world of commerce.


How Much Software Debt Do We Have?

Brent Barton, Chris Sterling, Chris Sterling

In the past, teams could tell project stakeholders that software debt existed, but it was difficult to describe where and how much. Teams would increase their estimates for features that used to seem simple because it meant making changes to areas of the code they knew were infested with software debt. In the worst situations, teams would recommend a full rewrite of an application because the software debt was too difficult to work around anymore.


What Suppliers Say About Clients: Part II -- Managing Outsourced Services

Leslie Willcocks, Mary Lacity
More in this series What Suppliers Say About Clients: Part I Part II Abstract

In Part II of this two-part Executive Report series about suppliers, we continue to share in detail what suppliers have been saying to us


Implementing a Technical Debt Prevention, Measurement, and Reduction Program in Your Company Webinar

Israel Gat

In this on-demand webinar, Dr. Israel Gat presents the Cutter Technical Debt Framework. He describes the experience and insights gained by applying the framework in various Cutter client engagements. Dr. Gat puts special emphasis on critical success factors for making the technical debt initiative work for you, your company, its partners and its customers.


Want to Remove Obstacles from Your Project? Then Communicate with Stakeholders

Moshe Cohen

The success of an IS project often depends less on the technical skill of your project team and more on your ability to understand, manage, and gain the support of a bewildering array of stakeholders that impact the project.


Risk Management = Testing

Don Estes

If we create a suitably accurate and comprehensive set of tests at the outset of the project -- tests for both performance and business functionality, the two primary reasons for project failure -- and apply those tests continually throughout the project, then the project can never fail on either basis.


Implementing a Technical Debt Prevention, Measurement, and Reduction Program in Your Company Webinar

Israel Gat

In this on-demand webinar, Dr. Israel Gat presents the Cutter Technical Debt Framework. He describes the experience and insights gained by applying the framework in various Cutter client engagements. Dr. Gat puts special emphasis on critical success factors for making the technical debt initiative work for you, your company, its partners and its customers.


Corporate Spending Trends for Predictive Analytics

Curt Hall

A survey conducted by Cutter Consortium in February/March 2011 offers some insight into corporate spending plans for predictive analytics.1 Specifically, when asked, "Does your organization plan to increase or decrease spending on predictive analytics and data mining this year (i.e., 2011) compared to last year?" participants responded as shown in Figure 1.


Evolution of Technologies to Prevent Data Leaks

Eugene Gerden

The requirements from business for protecting confidential information are constantly growing, because the damage from disclosing such information may result in a loss of a company's competitive advantage and profits, sanctions by regulatory authorities, and even administrative and criminal liability. It is no secret that successful business performance depends on the confidentiality, integrity, and availability of corporate information.


Evolution of Technologies to Prevent Data Leaks

Eugene Gerden

The requirements from business for protecting confidential information are constantly growing, because the damage from disclosing such information may result in a loss of a company's competitive advantage and profits, sanctions by regulatory authorities, and even administrative and criminal liability. It is no secret that successful business performance depends on the confidentiality, integrity, and availability of corporate information.


IT Reorganization: Part I

Jerrold Grochow

The recession and other financial woes of the last three years have affected almost every industry. Reorganization in one form or another, often accompanied by layoffs, became the norm. It is little surprise then that three-quarters of all organizations in a recent Cutter Consortium survey reported IT reorganizations during the period 2008-2010.


Do Cancelled IT Projects Leave a Carbon Footprint?

Robert Charette

There was a recent story in USA Today about how venture capitalists have been pouring billions of dollars into startups that are targeting clean or "green" technologies, with billions more in investment on the horizon.1 The story noted that mainstream companies are investing billions in green technologies, too, as a way to save money and lower their social reputati


Do Cancelled IT Projects Leave a Carbon Footprint?

Robert Charette

There was a recent story in USA Today about how venture capitalists have been pouring billions of dollars into startups that are targeting clean or "green" technologies, with billions more in investment on the horizon.1 The story noted that mainstream companies are investing billions in green technologies, too, as a way to save money and lower their social reputati