From Site to Service: Part II -- Syndication and Provision

Joseph Feller

Firms are increasingly moving toward syndicating Web content rather than just publishing it and providing Web services rather than just Web applications. Likewise, contemporary websites typically consume the content and services supplied by other Web providers.


From Site to Service: Part II -- Syndication and Provision

Joseph Feller

Firms are increasingly moving toward syndicating Web content rather than just publishing it and providing Web services rather than just Web applications. Likewise, contemporary websites typically consume the content and services supplied by other Web providers.


The Critical IT Management Competencies: Focusing on the "Demand" Side of IT

Bob Benson

The development and nurturing of IT management (and technical) competencies has historically focused on the "supply" side of IT.


Lessons from la Tour Eiffel

Mike Rosen

Last week, I was visiting Paris and got the chance to marvel at the Tour Eiffel, one of the world's most well-known and instantly recognizable structures. I also took the opportunity to learn a bit more about its fascinating history.


As Unstructured Data Rises, So Does View of Text Mining

Curt Hall

Back in December, when making predictions for the upcoming year regarding important BI trends, I wrote that we could expect to see use of text mining and analysis increase in 2011, just as it has almost every year since we've measured its adoption (see "What Lies Ahead: BI and D


As Unstructured Data Rises, So Does View of Text Mining

Curt Hall

Back in December, when making predictions for the upcoming year regarding important BI trends, I wrote that we could expect to see use of text mining and analysis increase in 2011, just as it has almost every year since we've measured its adoption (see "What Lies Ahead: BI and D


Changes Sweeping IT Mean Managers Face Significant Decisions

Steve Andriole

Everyone is talking about big changes in IT. They are indeed big -- bigger, in fact, than the ones we discussed before the dot-com bubble exploded. What are you going to do about them?

FIVE AREAS FOR IMMEDIATE ATTENTION

Here are five areas that require your immediate attention:

Devices

Software


Maintaining the Client/Vendor Marriage

Brad Egeland

In the IT world of project management, clients are the bread and butter. It's critical, of course, that what we do, the systems we implement, the processes we use, and the technology we employ falls within our organization's current direction and overall mission. That's definitely important. But even more important is our customer. I'm not saying we serve them at all costs. But it is the customer's money, after all, and this contributes to our bottom line. So satisfaction is important.


Starting Agile Adoption: Avoiding Common Pitfalls of Planning

Steve Berczuk

Agile software development involves people working together, across disciplines, to deliver business value efficiently. While the Agile Manifesto states that agile development values "responding to change over following a plan" and "working software over documentation," that does not mean plans are not important. A plan allows you to measure your progress, focus your efforts, or, more important, present a target that stakeholders can invest in.


Jumping the Radioactive Walrus: Nuclear Risk Mismanagement in Japan

Robert Charette

Last year, I wrote an Advisor titled "Jumping the Walrus: When Risk Management Goes Bad" (1 July 2010), which discussed the systemic risk management blunders by BP and the oil industry in general that came to light in the aftermath of the


Jumping the Radioactive Walrus: Nuclear Risk Mismanagement in Japan

Robert Charette

Last year, I wrote an Advisor titled "Jumping the Walrus: When Risk Management Goes Bad" (1 July 2010), which discussed the systemic risk management blunders by BP and the oil industry in general that came to light in the aftermath of the


Rebooters Versus Doubters: Debate Affects Our Minds

Vince Kellen

With the explosion of data and computing devices over the past decade and the about-to-explode iPad-like consumer device market, it is unsurprising that a vigorous debate about how people should use or not use data and computers has ensued.


Rebooters Versus Doubters: Debate Affects Our Minds

Vince Kellen

With the explosion of data and computing devices over the past decade and the about-to-explode iPad-like consumer device market, it is unsurprising that a vigorous debate about how people should use or not use data and computers has ensued.


12 Steps Toward Confident Excellence

Vince Kellen

Excellence is an old topic, more honored in a book than observed in the workplace. Nonetheless, it is an important topic because of some almost unbearable forces that are shearing the workplace.


Reuse Maturity Model: Establishing a Software Vocabulary

Nikhil Sharma, Vinay Upasani, Lawrence Marsh, Mohit Mutha

Software development has been full of fast-paced advancements, with a focus on increasing efficiency and reducing cost/efforts for stakeholders. Applying these changes forms a crucial part of the reusability concern that has been at the forefront of new business initiatives or development. Reuse has been central to many of the development models as have such tenets as "don't reinvent the wheel" and "don't repeat yourself."


How the Offshoring Debate Affects US Employment

Sara Cullen, Sunil Gupta, Naveen Gupta, Sandeep Gupta, Munish Kumar Gupta, Vishal Gupta, Madina Manap, Alejandro Rosales

There is growing apprehension among business leaders, economists, and ordinary Americans that we are witnessing what may well be the largest outmigration of nonmanufacturing jobs in the history of the US economy.

-- Askok Bardhan and Cynthia Kroll


How the Offshoring Debate Affects US Employment

Sara Cullen, Sunil Gupta, Naveen Gupta, Sandeep Gupta, Munish Kumar Gupta, Vishal Gupta, Madina Manap, Alejandro Rosales

There is growing apprehension among business leaders, economists, and ordinary Americans that we are witnessing what may well be the largest outmigration of nonmanufacturing jobs in the history of the US economy.

-- Askok Bardhan and Cynthia Kroll


Corporate BI, Data Warehousing Spend Trends in 2010-11 Stay Consistent

Curt Hall

A Cutter Consortium survey conducted in February/March 2011 of 60 end-user organizations based worldwide1 helps provide some insight into corporate BI and data warehousing spending trends.


Chinese Wall: An Information Security Approach

Sebastian Konkol
Abstract

This Executive Report by Sebastian Konkol presents one type of advanced information access control: Chinese Wall security policy (CWSP).


Chinese Wall: An Information Security Approach

Sebastian Konkol
Abstract

This Executive Report by Sebastian Konkol presents one type of advanced information access control: Chinese Wall security policy (CWSP).


Chinese Wall: An Information Security Approach

Sebastian Konkol

In today's business realities, there are circumstances in which traditionally employed information access schemas are incapable of securing information against breaches. Such a class of problems can be identified as sensitive information security related to conflict of interests.


Chinese Wall: An Information Security Approach

Sebastian Konkol

In today's business realities, there are circumstances in which traditionally employed information access schemas are incapable of securing information against breaches. Such a class of problems can be identified as sensitive information security related to conflict of interests.


Managing Customer Relationships: Challenging Some Old Assumptions May Usher in the Future

Gabriele Piccoli

In this issue of Cutter Benchmark Review, we consider the future of customer relationships, the management of those relationships, and the role that IT and the IT shop can play in the evolution of effective customer relationship management (CRM). Right off the bat it's important to ponder some questions that are fundamental to how we understand, on the most basic level, the dynamic and structure of the relationships we have with our customers. Think about the following for a moment: In today's world, is it really possible (or even desirable) to "own" a customer anymore? How is our present use of IT aiding our relationships with our customers? And in the current environment of data overload and incredible accessibility of information and services, is it possible (or even wise) to expect consumers to continue to relinquish control of what is truly theirs, namely, their own personal information?


Managing Customer Relationships: Challenging Some Old Assumptions May Usher in the Future

Gabriele Piccoli

In this issue of Cutter Benchmark Review, we consider the future of customer relationships, the management of those relationships, and the role that IT and the IT shop can play in the evolution of effective customer relationship management (CRM). Right off the bat it's important to ponder some questions that are fundamental to how we understand, on the most basic level, the dynamic and structure of the relationships we have with our customers. Think about the following for a moment: In today's world, is it really possible (or even desirable) to "own" a customer anymore? How is our present use of IT aiding our relationships with our customers? And in the current environment of data overload and incredible accessibility of information and services, is it possible (or even wise) to expect consumers to continue to relinquish control of what is truly theirs, namely, their own personal information?


The Key to Getting to Your Customers Is to Get Beyond Yourself

Kathryn Brohman
 

By capitalizing on Internet-enabled technology, organizations have increased visibility and interactivity with their customers through the implementation of CRM systems, which have helped organizations streamline transactions, learn about customer preferences, and boost relationships.