From Site to Service: Part II -- Syndication and Provision
Firms are increasingly moving toward syndicating Web content rather than just publishing it and providing Web services rather than just Web applications. Likewise, contemporary websites typically consume the content and services supplied by other Web providers.
From Site to Service: Part II -- Syndication and Provision
Firms are increasingly moving toward syndicating Web content rather than just publishing it and providing Web services rather than just Web applications. Likewise, contemporary websites typically consume the content and services supplied by other Web providers.
Lessons from la Tour Eiffel
As Unstructured Data Rises, So Does View of Text Mining
Back in December, when making predictions for the upcoming year regarding important BI trends, I wrote that we could expect to see use of text mining and analysis increase in 2011, just as it has almost every year since we've measured its adoption (see "What Lies Ahead: BI and D
As Unstructured Data Rises, So Does View of Text Mining
Back in December, when making predictions for the upcoming year regarding important BI trends, I wrote that we could expect to see use of text mining and analysis increase in 2011, just as it has almost every year since we've measured its adoption (see "What Lies Ahead: BI and D
Changes Sweeping IT Mean Managers Face Significant Decisions
Maintaining the Client/Vendor Marriage
In the IT world of project management, clients are the bread and butter. It's critical, of course, that what we do, the systems we implement, the processes we use, and the technology we employ falls within our organization's current direction and overall mission. That's definitely important. But even more important is our customer. I'm not saying we serve them at all costs. But it is the customer's money, after all, and this contributes to our bottom line. So satisfaction is important.
Starting Agile Adoption: Avoiding Common Pitfalls of Planning
Agile software development involves people working together, across disciplines, to deliver business value efficiently. While the Agile Manifesto states that agile development values "responding to change over following a plan" and "working software over documentation," that does not mean plans are not important. A plan allows you to measure your progress, focus your efforts, or, more important, present a target that stakeholders can invest in.
Jumping the Radioactive Walrus: Nuclear Risk Mismanagement in Japan
Last year, I wrote an Advisor titled "Jumping the Walrus: When Risk Management Goes Bad" (1 July 2010), which discussed the systemic risk management blunders by BP and the oil industry in general that came to light in the aftermath of the
Jumping the Radioactive Walrus: Nuclear Risk Mismanagement in Japan
Last year, I wrote an Advisor titled "Jumping the Walrus: When Risk Management Goes Bad" (1 July 2010), which discussed the systemic risk management blunders by BP and the oil industry in general that came to light in the aftermath of the
Rebooters Versus Doubters: Debate Affects Our Minds
Rebooters Versus Doubters: Debate Affects Our Minds
12 Steps Toward Confident Excellence
Reuse Maturity Model: Establishing a Software Vocabulary
Software development has been full of fast-paced advancements, with a focus on increasing efficiency and reducing cost/efforts for stakeholders. Applying these changes forms a crucial part of the reusability concern that has been at the forefront of new business initiatives or development. Reuse has been central to many of the development models as have such tenets as "don't reinvent the wheel" and "don't repeat yourself."
How the Offshoring Debate Affects US Employment
There is growing apprehension among business leaders, economists, and ordinary Americans that we are witnessing what may well be the largest outmigration of nonmanufacturing jobs in the history of the US economy.
-- Askok Bardhan and Cynthia Kroll
How the Offshoring Debate Affects US Employment
There is growing apprehension among business leaders, economists, and ordinary Americans that we are witnessing what may well be the largest outmigration of nonmanufacturing jobs in the history of the US economy.
-- Askok Bardhan and Cynthia Kroll
Chinese Wall: An Information Security Approach
This Executive Report by Sebastian Konkol presents one type of advanced information access control: Chinese Wall security policy (CWSP).
Chinese Wall: An Information Security Approach
This Executive Report by Sebastian Konkol presents one type of advanced information access control: Chinese Wall security policy (CWSP).
Chinese Wall: An Information Security Approach
Chinese Wall: An Information Security Approach
Managing Customer Relationships: Challenging Some Old Assumptions May Usher in the Future
In this issue of Cutter Benchmark Review, we consider the future of customer relationships, the management of those relationships, and the role that IT and the IT shop can play in the evolution of effective customer relationship management (CRM). Right off the bat it's important to ponder some questions that are fundamental to how we understand, on the most basic level, the dynamic and structure of the relationships we have with our customers. Think about the following for a moment: In today's world, is it really possible (or even desirable) to "own" a customer anymore? How is our present use of IT aiding our relationships with our customers? And in the current environment of data overload and incredible accessibility of information and services, is it possible (or even wise) to expect consumers to continue to relinquish control of what is truly theirs, namely, their own personal information?
Managing Customer Relationships: Challenging Some Old Assumptions May Usher in the Future
In this issue of Cutter Benchmark Review, we consider the future of customer relationships, the management of those relationships, and the role that IT and the IT shop can play in the evolution of effective customer relationship management (CRM). Right off the bat it's important to ponder some questions that are fundamental to how we understand, on the most basic level, the dynamic and structure of the relationships we have with our customers. Think about the following for a moment: In today's world, is it really possible (or even desirable) to "own" a customer anymore? How is our present use of IT aiding our relationships with our customers? And in the current environment of data overload and incredible accessibility of information and services, is it possible (or even wise) to expect consumers to continue to relinquish control of what is truly theirs, namely, their own personal information?
The Key to Getting to Your Customers Is to Get Beyond Yourself
By capitalizing on Internet-enabled technology, organizations have increased visibility and interactivity with their customers through the implementation of CRM systems, which have helped organizations streamline transactions, learn about customer preferences, and boost relationships.