Revolt in Egypt Was Under Our Social-Media Noses

Curt Hall

Last October, I discussed in an Advisor developing trends pertaining to social media monitoring and analysis (see "Psst ... Listen in as Some Business Tune in to Social Media," 5 October 2010).


C-Suite and Sour: Innovation Myth-Busting

Thornton May

In a series of workshops conducted in 12 US and three European cities as well as one in Asia, I asked more than 1,500 CIOs to answer the following question: When you, your CEO, and your CFO hear the word "innovation," what is the first thing that leaps to mind?


C-Suite and Sour: Innovation Myth-Busting

Thornton May

In a series of workshops conducted in 12 US and three European cities as well as one in Asia, I asked more than 1,500 CIOs to answer the following question: When you, your CEO, and your CFO hear the word "innovation," what is the first thing that leaps to mind?


Agile May Not Survive Your Next Reorganization

Brent Barton

Don't be surprised if your agile adoption is going south after your next company reorganization. Many agile implementations I've observed will not survive company or division reorganizations. Unfortunately, many of these agile adoptions enabled teams to exhibit truly breakout performances.


We Are Not Alone. Or Are We? The 'Humanity' of Robots

Ken Orr

Winston Churchill once said, "We make our buildings and afterwards they make us. They regulate the course of our lives." We make technology and our technologies shape us.

— Sherry Turkle, Simulation and its Discontents (The MIT Press, 2009)


We Are Not Alone. Or Are We? The 'Humanity' of Robots

Ken Orr

Winston Churchill once said, "We make our buildings and afterwards they make us. They regulate the course of our lives." We make technology and our technologies shape us.

— Sherry Turkle, Simulation and its Discontents (The MIT Press, 2009)


To Cohere or Adhere: Objects, Relationships, and Architectures

Kenneth Rau

In designing and documenting architectures, be they business, data, application, or technology architectures, enterprise architects are prone to focus first and fore­most on the objects that compose the architecture in question. This is both human nature (nouns before verbs) and a logical approach to design. For example:


The Slow, Steady Climb for Data Mining, Predictive Analytics

Curt Hall

Back in December, when I offered predictions concerning important BI trends I saw for the New Year, I said that adoption of data mining and predictive analytics would experience steady growth in 2011, just as it has over the past 10 years or so (see "What Lie


Putting the Customer Front and Center in a Business

Bhuvan Unhelkar, Keith Sherringham, Keith Sherringham

A customer-centric approach to business puts the customer at the center of activities, with business operations orientated around customers rather than operations in support of internal business structures. This approach applies to external customers, particularly the customer-supplier relationship within processes and between areas of a business.

Understanding the Customer

Such a approach starts with an understanding of the customer and a resolution of the following questions:


What Is the Adaptive Project Framework -- Really?

Robert Wysocki
Abstract

The Adaptive Project Framework (APF) is an umbrella framework that encompasses all project management methodologies. APF has two distinct parts. In the project setup, a decision is made as to what is the best-fit management methodology and how it needs to be adapted for the project at hand.


What Is the Adaptive Project Framework -- Really?

Robert Wysocki

The accompanying Executive Report establishes the Adaptive Project Framework (APF) as an umbrella framework that encompasses all project management methodologies.


"Click Here to Learn This One Crazy Secret..."

Hillel Glazer

Anyone who's surfed the Internet in the last few years has likely run across an online ad that started like the headline, above. Generally, the ad is a front to some "silver bullet" so-called "solution" to a nagging problem.


Aliens, Stability, and Enterprise Risk Management

Robert Charette

There was a fascinating article in the Wall Street Journal over the weekend titled "Why We're Not Listening to Alien Chat Shows" (22 January 2011).


Aliens, Stability, and Enterprise Risk Management

Robert Charette

There was a fascinating article in the Wall Street Journal over the weekend titled "Why We're Not Listening to Alien Chat Shows" (22 January 2011).


Smart Mobile Devices -- Your Next Security Breach?

Shahar Maor

Smart mobile devices (SMDs) have become widespread among employees in organizations in all sectors of the economy. In contrast to the recent past, SMDs are not only for executives anymore. In the last two years, we have witnessed a rise in the demand for SMDs among all levels of employees. Despite resistance on behalf of IT professionals and especially information security professionals, there is a great deal of pressure by senior managers to synchronize their new smartphones to their work e-mail.


Smart Mobile Devices -- Your Next Security Breach?

Shahar Maor

Smart mobile devices (SMDs) have become widespread among employees in organizations in all sectors of the economy. In contrast to the recent past, SMDs are not only for executives anymore. In the last two years, we have witnessed a rise in the demand for SMDs among all levels of employees. Despite resistance on behalf of IT professionals and especially information security professionals, there is a great deal of pressure by senior managers to synchronize their new smartphones to their work e-mail.


Some Steps Toward Designing Architectural Views

Mike Rosen

In my last Advisor (see "Understand the Value Equation," 12 January 2011), I talked about the architecture value equation and the role of architectural views in creating value. To refresh your memory, the equation says that if you make it easier for someone to do their job using architecture, then they’ll use it. To achieve that requires the appropriate view.


Some Steps Toward Designing Architectural Views

Mike Rosen

In my last Advisor (see "Understand the Value Equation," 12 January 2011), I talked about the architecture value equation and the role of architectural views in creating value. To refresh your memory, the equation says that if you make it easier for someone to do their job using architecture, then they’ll use it. To achieve that requires the appropriate view.


The Decision for Goodwill (and its Many Happy Returns)

Carl Pritchard

"And therefore ... though it has never put a scrap of gold or silver in my pocket, I believe that it has done me good, and will do me good; and I say, God bless it!" (Charles Dickens)


Some Steps Toward Designing Architectural Views

Mike Rosen

In my last Advisor (see "Understand the Value Equation," 12 January 2011), I talked about the architecture value equation and the role of architectural views in creating value.


Backsourcing vs. the Hotel California Syndrome

Jim Love, John Berry, Kevin Berry, Craig Berry

"Backsourcing" is the general term used to describe the "repatriation" of IT or other outsourced services. The term first gained prominence about five years ago with two much-publicized failures. Frequently quoted is the decision by Sears to back out of its megadeal in 2005, a year after it had signed. There is also the JPMorgan Chase backsourcing case, also announced in 2005 [1].


Backsourcing vs. the Hotel California Syndrome

Jim Love, John Berry, Kevin Berry, Craig Berry

"Backsourcing" is the general term used to describe the "repatriation" of IT or other outsourced services. The term first gained prominence about five years ago with two much-publicized failures. Frequently quoted is the decision by Sears to back out of its megadeal in 2005, a year after it had signed. There is also the JPMorgan Chase backsourcing case, also announced in 2005 [1].


Vendors Address Mobile BI Security

Curt Hall

One of the biggest concerns among organizations when it comes to adopting mobile BI is security [1]. This is hardly surprising, given that security has always been a major concern of any mobile corporate application, particularly the fear of unauthorized access to, or loss of, sensitive corporate data.


Vendors Address Mobile BI Security

Curt Hall

One of the biggest concerns among organizations when it comes to adopting mobile BI is security [1]. This is hardly surprising, given that security has always been a major concern of any mobile corporate application, particularly the fear of unauthorized access to, or loss of, sensitive corporate data.


IT Trends for 2011: Moving Forward After a Tough Year

Gabriele Piccoli

This issue of Cutter Benchmark Review is the sixth installment in our annual series forecasting technology trends. As faithful readers know, in this issue we examine the range of IT developments that have either surfaced or endured in the past year and look back across previous years to see how the technology landscape is evolving. We also reflect on the multitude of contributing factors that will influence your decision-making processes as you consider your options for change (or staying the course) in the near future. We believe the two sometimes-opposing viewpoints of our contributors will give you much to think about as you come to your own conclusions. We hope that you find this annual IT trends issue of CBR interesting and useful and that it gives you plenty of food for thought as you evaluate your technology use and priorities for this year.