The Business of Information Technology: Managing Acquisitions

David Rasmussen
  Read the Executive Summary

Why do some acquisitions fail to meet expectations? Why does the integration of acquired IT operations take so long? Why are there so many IT surprises during integration?


The Business of Information Technology: Managing Acquisitions

David Rasmussen
  Read the Executive Summary

Why do some acquisitions fail to meet expectations? Why does the integration of acquired IT operations take so long? Why are there so many IT surprises during integration?


Care and Feeding of the "Creative Class"

Ken Orr, Cutter Business Technology Council, Cutter Business Technology Council, Cutter Business Technology Council
Domain

Organizational matters

Assertion 146

Because of the growing need to attract and retain the people that are categorized as members of the "creative class," organizations will need to spend more time and effort developing (and encouraging the development of) environments and software systems that appeal to individuals in this important group.


Care and Feeding of the "Creative Class"

Ken Orr, Cutter Business Technology Council, Cutter Business Technology Council, Cutter Business Technology Council
Domain

Organizational matters

Assertion 146

Because of the growing need to attract and retain the people that are categorized as members of the "creative class," organizations will need to spend more time and effort developing (and encouraging the development of) environments and software systems that appeal to individuals in this important group.


Performance Metrics: The Seven Deadly Sins -- Part II

Jim Love
Performance Metrics: The Seven Deadly SinsPart I

E-Mail Intelligence: Taming the E-Mail Monster

Curt Hall

Vendors today are introducing new products that apply advanced algorithms designed specifically for e-mail analysis. The result is an emerging market: e-mail intelligence.

This Executive Update examines the use of e-mail intelligence tools, a market that is driven by the need for organizations to analyze the ever-increasing amounts of information accumulating in their corporate e-mail systems.


E-Mail Intelligence: Taming the E-Mail Monster

Curt Hall

Vendors today are introducing new products that apply advanced algorithms designed specifically for e-mail analysis. The result is an emerging market: e-mail intelligence.

This Executive Update examines the use of e-mail intelligence tools, a market that is driven by the need for organizations to analyze the ever-increasing amounts of information accumulating in their corporate e-mail systems.


Securing Cyberspace: Is It Time to Rethink Our Strategy?

Larry Clinton

"Since it is private industry that owns and operates the vast majority of what constitutes the Internet, it is therefore industry's responsibility to demonstrate leadership in the fight to secure cyberspace."


Securing Cyberspace: Is It Time to Rethink Our Strategy?

Larry Clinton

"Since it is private industry that owns and operates the vast majority of what constitutes the Internet, it is therefore industry's responsibility to demonstrate leadership in the fight to secure cyberspace."


Cutter IT Journal: Securing Cyberspace: Is It Time to Rethink Our Strategy? - Opening Statement

Larry Clinton

In the call for papers for Cutter IT Journal's edition on cyber security, we asked, "Is it time to change our strategy?" Apparently, the answer is a resounding "yes."

Nearly every article we received (enough to necessitate a second edition on this topic to be published in August) called for fairly fundamental shifts in strategy to address a problem that most evidence suggests is growing like a malignant tumor -- and which we may understand far less how to treat.


Cutter IT Journal: Securing Cyberspace: Is It Time to Rethink Our Strategy? - Opening Statement

Larry Clinton

In the call for papers for Cutter IT Journal's edition on cyber security, we asked, "Is it time to change our strategy?" Apparently, the answer is a resounding "yes."

Nearly every article we received (enough to necessitate a second edition on this topic to be published in August) called for fairly fundamental shifts in strategy to address a problem that most evidence suggests is growing like a malignant tumor -- and which we may understand far less how to treat.


Cyber Risk Management: The Need for Effective Public and Private Partnership

Robert Stephan
UNDERSTANDING THE CYBER THREAT

In today's world, the traditional security paradigm is shifting to encompass the unique challenges presented by the digital landscape. IT and cyber infrastructure are critical to national economies and homeland security. Cyber systems support everything from food distribution to financial transactions to national security.


Cyber Risk Management: The Need for Effective Public and Private Partnership

Robert Stephan
UNDERSTANDING THE CYBER THREAT

In today's world, the traditional security paradigm is shifting to encompass the unique challenges presented by the digital landscape. IT and cyber infrastructure are critical to national economies and homeland security. Cyber systems support everything from food distribution to financial transactions to national security.


Investing in Cyber Security: The Path to Good Practice

Shari Pfleeger, Rachel Rue, Jay Horwitz, Bala Balakrishnan
RISKS AND CONSEQUENCES

According to the recent Technology Assessment: Cyber Security for Critical Infrastructure Protection conducted by the US Government Accountability Office (GAO):


Investing in Cyber Security: The Path to Good Practice

Shari Pfleeger, Rachel Rue, Jay Horwitz, Bala Balakrishnan
RISKS AND CONSEQUENCES

According to the recent Technology Assessment: Cyber Security for Critical Infrastructure Protection conducted by the US Government Accountability Office (GAO):


Securely Sustaining Software-Intensive Systems

Carol Woody
INTRODUCTION

Great authorization and authentication will not save a system from a poorly planned implementation and sustainment. Shepherding a software-intensive system through project development to implementation is just the beginning of the saga. Modern software-intensive systems face the confusing and multifaceted challenge of sustainment. After implementation is when the security problems will show up.