The Vanishing IT Organization

John Berry

Managers can't wait until the IT organization finally disappears. Not that it will go out of existence-- although some managers would be fine with that -- but that organizationally IT will find itself so woven into the fabric of everyday work that it will cease to operate as a clearly defined structure with its own office door upon which a sign hangs, "IT Department: Enter at Your Own Risk."


Outsourcing Legacy Systems

Ian Hayes

Application outsourcing is becoming an increasingly common strategy for handling everything from an individual legacy application through end-to-end support of an entire portfolio. Companies turn to outsourcing to cut costs, focus on core competencies, gain guaranteed service performance, free resources, offload undesirable tasks, and/or take advantage of specific expertise offered by the outsourcer.


Comments on Securing the Long Tail

Eric Clemons

Eric Clemons was moved to respond at some length to David Lineman's Advisor of 30 May (see "Securing the Long Tail"). Due to the length of his response, we are providing a link to the article rather than sending it out in an e-mail message.


Comments on Securing the Long Tail

Eric Clemons

Eric Clemons was moved to respond at some length to David Lineman's Advisor of 30 May (see "Securing the Long Tail"). Due to the length of his response, we are providing a link to the article rather than sending it out in an e-mail message.


Comments on Securing the Long Tail

Eric Clemons

Eric Clemons was moved to respond at some length to David Lineman's Advisor of 30 May (see "Securing the Long Tail"). Due to the length of his response, we are providing a link to the article rather than sending it out in an e-mail message.


How CIOs Are Reaching New Heights

Gabriele Piccoli

One of the most enduring results of research in information systems has been the degree of discomfort that business executives claim when it comes to making decisions about IS and IT. The great number of acronyms (increasing daily it seems), the pervasiveness of technical language, and the unique blend of skills that are required to understand computing can be very intimidating.


Data Breaches Are Costly in More Ways than One

Curt Hall

The next time you find yourself struggling to get plans or funding approved to better secure your organization's customer information systems, be sure to point out that data breaches are costly in more ways than one. For real-world proof, you need look no further than the ongoing saga at TJX Companies, Inc.


Data Breaches Are Costly in More Ways than One

Curt Hall

The next time you find yourself struggling to get plans or funding approved to better secure your organization's customer information systems, be sure to point out that data breaches are costly in more ways than one. For real-world proof, you need look no further than the ongoing saga at TJX Companies, Inc.


Data Breaches Are Costly in More Ways than One

Curt Hall

The next time you find yourself struggling to get plans or funding approved to better secure your organization's customer information systems, be sure to point out that data breaches are costly in more ways than one. For real-world proof, you need look no further than the ongoing saga at TJX Companies, Inc.


The Top 5 Business Activities to Improve the Privacy and Security of Personally Identifiable Information (PII) Webinar

Rebecca Herold

Through the highly publicized pain and mistakes of others, corporations have learned many lessons about effectively preserving the privacy of their customers’ personally identifiable information (PII), as well as what they should NOT do. Join Cutter Senior Consultant Rebecca Herold for this hour-long webinar in which she will reflect upon incidents that have occurred over the past few years and divulge the lessons your organization should take away from the experiences of others.


Comments on Securing the Long Tail

Eric Clemons

David Lineman makes a number of points in his wonderful Cutter IT Journal E-Mail Advisor "Securing the Long Tail." Some of the points, while well known, are still true and important to state. Some of the points are even more important to state, because they are based on popular misconceptions that are newly demonstrably incorrect, for reasons that reflect changes in consumer behavior as well as changes in corporate strategy they have produced.


Leading Up: Guiding Your Leaders to Effectively Support Your Team's Efforts

Pollyanna Pixton, Ryan Dow, Jenni Dow

In today's rapidly changing environment, it is critical to deliver results often and quickly. This requires leading effectively both upward and outward. How can we guide our leaders to provide the support our teams need? What are the tools to embrace change, foster innovation, and collaborate -- no matter where you fit in your organization?


Corporate Use of BI for Monitoring and Analyzing Business Processes

Curt Hall

One of the most important developments in business process management (BPM) involves the application of business intelligence (BI) to monitor and analyze the efficiency of distributed processes.


"Fabbing" Agile Leadership

S.M. Kripanidhi

Learning is the willingness to be open to the input that comes from the environment with a commitment to apply one's mind to understand this input and a passion to stay with the understanding long enough to be able to derive one's own insights. This, followed with conviction to integrate one's own understanding and insights into a real-life context, makes learning a meaningful process.

-- J.M. Sampath [1]


Comments on Securing the Long Tail

Eric Clemons

David Lineman makes a number of points in his wonderful Cutter IT Journal E-Mail Advisor "Securing the Long Tail." Some of the points, while well known, are still true and important to state.


Comments on Securing the Long Tail

Eric Clemons

David Lineman makes a number of points in his wonderful Cutter IT Journal E-Mail Advisor "Securing the Long Tail." Some of the points, while well known, are still true and important to state.


Comments on Securing the Long Tail

Eric Clemons

David Lineman makes a number of points in his wonderful Cutter IT Journal E-Mail Advisor "Securing the Long Tail." Some of the points, while well known, are still true and important to state.


Outsourcing Insights: 2004 to 2006 -- Evolution or Equilibrium?

Ning Su

The rising publicity of IT service outsourcing has sparked much speculation and expectation. Companies' conception and misconception of outsourcing, coupled with the unique business situation of each organization, give rise to diverse outsourcing strategies and practices across firms and industries.


Outsourcing Insights: 2004 to 2006 -- Evolution or Equilibrium?

Ning Su

The rising publicity of IT service outsourcing has sparked much speculation and expectation. Companies' conception and misconception of outsourcing, coupled with the unique business situation of each organization, give rise to diverse outsourcing strategies and practices across firms and industries.


Software Intellectual Property: Part III -- Getting Something for Nothing (Almost)

E.M. Bennatan

Many years ago, a man stood on London Bridge with a suitcase full of one pound notes, which he proceeded to offer passersby for 50 pence each. He could find no takers. According to this oft-told story, he was trying to prove the point that people are suspicious and even dismissive of any deal that seems too good.


Software Intellectual Property: Part III -- Getting Something for Nothing (Almost)

E.M. Bennatan

Many years ago, a man stood on London Bridge with a suitcase full of one pound notes, which he proceeded to offer passersby for 50 pence each. He could find no takers. According to this oft-told story, he was trying to prove the point that people are suspicious and even dismissive of any deal that seems too good.


Software Intellectual Property: Part III -- Getting Something for Nothing (Almost)

E.M. Bennatan

Many years ago, a man stood on London Bridge with a suitcase full of one pound notes, which he proceeded to offer passersby for 50 pence each. He could find no takers. According to this oft-told story, he was trying to prove the point that people are suspicious and even dismissive of any deal that seems too good.


Database and Web 2.0

Ken Orr

Back in the 1980s, I taught distributed database design. At that time, there was a lot of interest but there weren't a lot of applications. Moreover, with some real exceptions, the technology wasn't quite ready for prime time. Today, when there is a lot of real need and real technology, the distributed database has fallen out of favor.


Database and Web 2.0

Ken Orr

Back in the 1980s, I taught distributed database design. At that time, there was a lot of interest but there weren't a lot of applications. Moreover, with some real exceptions, the technology wasn't quite ready for prime time. Today, when there is a lot of real need and real technology, the distributed database has fallen out of favor.


Database and Web 2.0

Ken Orr

Back in the 1980s, I taught distributed database design. At that time, there was a lot of interest but there weren't a lot of applications. Moreover, with some real exceptions, the technology wasn't quite ready for prime time. Today, when there is a lot of real need and real technology, the distributed database has fallen out of favor.