Controlling Risk in the Cloud
Cloud computing provides a great number of advantages, but the new risks that it entails can't be ignored. Every company that takes advantage of these services will need to perform an analysis that looks at the specific risks posed by the service provided, service conditions, and the risk profile of the firm.
Controlling Risk in the Cloud
Cloud computing provides a great number of advantages, but the new risks that it entails can't be ignored. Every company that takes advantage of these services will need to perform an analysis that looks at the specific risks posed by the service provided, service conditions, and the risk profile of the firm.
Blending IT: The Integration of BI and Search
Search is having a major influence on BI and data retrieval and analysis in general. Although the technology is still developing, the combination of BI and search is important because it can provide nontechnical business users and BI consumers with easier access to -- and the ability to analyze -- both structured and unstructured information.
Extracting Business Value from the Semantic Web
A business can gain significant value from the Semantic Web by drawing on its capability to combine and interoperate with several technologies and services, encompassing data warehouses, disparate operating systems, and myriad types of messaging. The resulting "cohesive" technological platform allows in-depth user participation and collaboration that also reveals new and meaningful relationships among information silos and applications that may not be obvious to the business.
Extracting Business Value from the Semantic Web
A business can gain significant value from the Semantic Web by drawing on its capability to combine and interoperate with several technologies and services, encompassing data warehouses, disparate operating systems, and myriad types of messaging. The resulting "cohesive" technological platform allows in-depth user participation and collaboration that also reveals new and meaningful relationships among information silos and applications that may not be obvious to the business.
The Agile Triathlete Times Four
With significant input from fellow Cutter Consultant Ken Collier, I recently wrote an article called "The Agile Triathlete" that discussed how becoming skilled at test-driven development (TDD) was analogous to becoming a skilled triathlete.
Netbooks, 4G Networks to Spark IT's New Generation, Part II
In my last Trends Advisor ("Netbooks, 4G Networks to Spark IT's New Generation," 3 September), I suggested that the netbook, as opposed to what folks like Microsoft CEO Steve Ballmer have been suggesting, is one of the major "disruptive technologies" of the decade.
Netbooks, 4G Networks to Spark IT's New Generation, Part II
In my last Trends Advisor ("Netbooks, 4G Networks to Spark IT's New Generation," 3 September), I suggested that the netbook, as opposed to what folks like Microsoft CEO Steve Ballmer have been suggesting, is one of the major "disruptive technologies" of the decade.
Netbooks, 4G Networks to Spark IT's New Generation, Part II
In my last Trends Advisor ("Netbooks, 4G Networks to Spark IT's New Generation," 3 September), I suggested that the netbook, as opposed to what folks like Microsoft CEO Steve Ballmer have been suggesting, is one of the major "disruptive technologies" of the decade.
The Business Transformation Process
The Business Transformation Process
The accompanying Executive Report discusses the framework, process, and practical enactment of business transformation. The report is based on the unique experiences I've had providing consulting and training services to three separate organizations over the past two years.
Data Security Implications for New Enterprise Architectures
Data integrity and confidentiality have long relied on a combination of network- and application-based security. As enterprise architecture (EA) becomes more complex, data is progressively more integrated within massive data warehouses and distributed architectures.
Data Security Implications for New Enterprise Architectures
Enterprise data integrity, security, and confidentiality have long relied on combined network- and application-based security. When data was secured on local centralized systems using role-based account access supported by strong firewalls, the thinking was that corporate data was well secured.
Green IT Metrics and Measurement: The Complex Side of Environmental Responsibility
This month's issue focuses on green IT and its measurement. Our objective is to benchmark current practice and offer tangible guidelines on the measurement of green IT and green IS efforts. Our academic contributor is Brian Donnellan, Professor of IS Innovation at the National University of Ireland, Maynooth, and Co-Director of the Innovation Value Institute. Our practicing contributor is Bhuvan Unhelkar, a Cutter Consortium Senior Consultant.
Green IT Metrics: Enhancing Brand Value While Meeting Compliance
Creating and Applying Green IT Metrics and Measurement in Practice
Measuring Green IT Efforts: Much Work Remains to Be Done
This installment of Cutter Benchmark Review focuses on one of the most important and complex issues we have addressed during my tenure as editor. It complements our May 2008 issue (Vol. 8, No. 5) on green IS by analyzing green IT metrics and measurement. Specifically, with this issue we sought to benchmark current practice and offer tangible guidelines on the measurement of green IT and green IS efforts.
Green IT Metrics and Measurement Survey Data
This survey investigated the relevance of metrics and measurements to a green (environmentally responsible) organization. The 29 respondents were primarily from North America and Asia (38% each), with 21% from Europe and 3% from South America.
The End of the Internet Static Age: Desperately Seeking Search 3.0
Barriers to the continual refinement of today's traditional search engine model are looming as the Internet continues to grow exponentially, as the information signal-to-noise ratio continues to shrink, and as we embrace the emerging Web 3.0 era, which is characterized by semantically linked data.
The End of the Internet Static Age: Desperately Seeking Search 3.0
Barriers to the continual refinement of today's traditional search engine model are looming as the Internet continues to grow exponentially, as the information signal-to-noise ratio continues to shrink, and as we embrace the emerging Web 3.0 era, which is characterized by semantically linked data.


