Moving Ahead in 2010: There Is Room for Optimism

Gabriele Piccoli
 

This issue is the fifth in our yearly series on technology and IT trends for the coming year. Our focus is to evaluate new technologies and IT trends you should be watching in 2010 by investigating and benchmarking the priorities of your peers. Moreover, on the basis of our work over the past years, we have assembled a database of responses to a number of questions that we have consistently asked each year since we first began this survey.


IT Trends 2010 Survey Data

Cutter Consortium
  SURVEY DEMOGRAPHICS

This survey explores interest in and adoption of various relatively new IT technologies and initiatives in 97 organizations worldwide. Forty-six percent of respondents hold senior management/policy making or IS/IT management titles, with consulting, project management, and software engineering/programming being among the other job titles reported.


How Not to Run an IT Project: A Case Study

Phil Simon
Abstract

The reasons for, and statistics on, IT project failures are well known and cited. However, because so many organizations attempt to hide their dirty laundry, rarely do we see an insider's account of the precise points at which a project derailed.


How Not to Run an IT Project: A Case Study

Phil Simon

In March 2009, a major hospital system -- which we will call NEP -- began a multimillion-dollar IT project. The objective: to replace its hodgepodge of legacy back-office systems with one integrated enterprise resource planning (ERP) solution and a single database housing all enterprise information.


Agile in Practice: A Composite Approach

Bhuvan Unhelkar
Abstract

This Executive Report by Bhuvan Unhelkar presents the Composite Agile Method and Strategy (CAMS) as an all-encompassing approach to the use of agile principles and practices across processes at various levels within the


Agile in Practice: A Composite Approach

Bhuvan Unhelkar

The popularity of agile methods in software development can be attributed to their promise to accommodate change and deliver rapidly with regard to the expectations of business. The agile approach encompasses the natural way to write code: conversational, visible, and responsive.


Enterprise Risk Management Framework: A Practical View

Ken Doughty
Abstract

Enterprise risk management (ERM) facilitates management's desire to effectively manage the organization's risk and to create sustainable value to its stakeholders through capital growth and increased dividend stream. No organization operates in a risk-free environment, and ERM does not create such an environment.


Enterprise Risk Management Framework: A Practical View

Ken Doughty
Abstract

Enterprise risk management (ERM) facilitates management's desire to effectively manage the organization's risk and to create sustainable value to its stakeholders through capital growth and increased dividend stream. No organization operates in a risk-free environment, and ERM does not create such an environment.


Enterprise Risk Management Framework: A Practical View

Ken Doughty

With the experiences of corporate disasters such as Enron, WorldCom, and Lehmann Brothers in recent years, organizational board members and executive management have realized the impact of ineffective risk management. Could these failures be attributed to their risk management practices, business acumen, or a combination of both?


Enterprise Risk Management Framework: A Practical View

Ken Doughty

With the experiences of corporate disasters such as Enron, WorldCom, and Lehmann Brothers in recent years, organizational board members and executive management have realized the impact of ineffective risk management. Could these failures be attributed to their risk management practices, business acumen, or a combination of both?


The Winds of Change Have Begun to Blow

Lynne Ellyn, Cutter Business Technology Council, Cutter Business Technology Council, Cutter Business Technology Council, Andrew Fried
Domain

IT industry

Assertion 188:

The software industry has had an extended childhood and adolescence, free from the legal responsibilities and market expectations governing mature industries. But childhood is over, and it's time for the software industry to grow up.


The Winds of Change Have Begun to Blow

Lynne Ellyn, Cutter Business Technology Council, Cutter Business Technology Council, Cutter Business Technology Council, Andrew Fried
Domain

IT industry

Assertion 188:

The software industry has had an extended childhood and adolescence, free from the legal responsibilities and market expectations governing mature industries. But childhood is over, and it's time for the software industry to grow up.


The Winds of Change Have Begun to Blow

Lynne Ellyn, Cutter Business Technology Council, Cutter Business Technology Council, Cutter Business Technology Council, Andrew Fried
Domain

IT industry

Assertion 188:

The software industry has had an extended childhood and adolescence, free from the legal responsibilities and market expectations governing mature industries. But childhood is over, and it's time for the software industry to grow up.


Managing Your Application Portfolio

Bob Benson

Cutter Senior Consultant Bob Benson has developed a tested approach to managing the application portfolio as a result of assisting dozens of client companies define and implement successful application portfolio management programs.


Top 5 Intriguing Agile Articles of 2009

Karen Coburn

This week, we're taking a look back at the five most intriguing articles published in Cutter's Agile Product & Project Management practice over this past year. As you might imagine, it was no small task to cull the list and pare it down to just five articles.


Top 5 Intriguing Risk Articles of 2009

Karen Coburn

This week, we're taking a look back at the five most intriguing articles published in Cutter's Enterprise Risk Management & Governance practice over this past year. As you might imagine, it was no small task to cull the list and pare it down to just five articles.


Top 5 Intriguing Risk Articles of 2009

Karen Coburn

This week, we're taking a look back at the five most intriguing articles published in Cutter's Enterprise Risk Management & Governance practice over this past year. As you might imagine, it was no small task to cull the list and pare it down to just five articles.


Top 5 Intriguing Trends Articles of 2009

Karen Coburn

This week, we thought we'd take a look back at the five most intriguing articles published in Cutter's Business Technology Trends & Impacts practice over this past year. As you might imagine, it was no small task to cull the list and choose just five articles.


Top 5 Intriguing Trends Articles of 2009

Karen Coburn

This week, we thought we'd take a look back at the five most intriguing articles published in Cutter's Business Technology Trends & Impacts practice over this past year. As you might imagine, it was no small task to cull the list and choose just five articles.


Social Media Comes of Age: Time to Listen to the Kids

Steve Andriole

Social media is everywhere.

Wikipedia -- the ever-popular encyclopedic wiki -- describes social media as follows: 1


Social Media Comes of Age: Time to Listen to the Kids

Steve Andriole

Social media is everywhere.

Wikipedia -- the ever-popular encyclopedic wiki -- describes social media as follows: 1


Lessons From a Decade of Data: Part I -- The Risky Business of Predicting the Future

E.M. Bennatan

Do you know how much a good saddle horse costs these days? No need to google it; I'll tell you: it's about $4,000. Substantially less than a car, which is not what John Watkins would have expected.


IT Project Management Confidential: Transcending Traditional Project and Product Methodologies

Mitchell Ummel

I must first confess. I've only skimmed the nearly 400 pages of the PMBOK Guide, and I'm not a PMI-certified PMP.1 If I decided to sit for the certification exam, I'm not entirely confident that I would pass.


Top 5 Intriguing Business-IT Strategies Articles of 2009

Karen Coburn

This week, we're taking a look back at the five most intriguing articles published in Cutter's Business-IT Strategies practice over this past year. As you might imagine, it was no small task to cull the list and pare it down to just five articles. Look for these lists from each of our nine practice areas for a compilation of Cutter's 45 most intriguing articles of the year.


Top 5 Intriguing Enterprise Architecture Articles in 2009

Karen Coburn

This week, we're taking a look back at the five most read articles in Cutter's Enterprise Architecture practice over this past year. Each article offers unique insight into the challenges of creating and deploying a successful enterprise architecture. Look for these lists from each of our nine practice areas for a compilation of Cutter's 45 most intriguing articles of the year.