The Business of Information Technology: Managing Acquisitions
Why do some acquisitions fail to meet expectations? Why does the integration of acquired IT operations take so long? Why are there so many IT surprises during integration?
The Business of Information Technology: Managing Acquisitions
Why do some acquisitions fail to meet expectations? Why does the integration of acquired IT operations take so long? Why are there so many IT surprises during integration?
Care and Feeding of the "Creative Class"
Organizational matters
Assertion 146Because of the growing need to attract and retain the people that are categorized as members of the "creative class," organizations will need to spend more time and effort developing (and encouraging the development of) environments and software systems that appeal to individuals in this important group.
Care and Feeding of the "Creative Class"
Organizational matters
Assertion 146Because of the growing need to attract and retain the people that are categorized as members of the "creative class," organizations will need to spend more time and effort developing (and encouraging the development of) environments and software systems that appeal to individuals in this important group.
Performance Metrics: The Seven Deadly Sins -- Part II
E-Mail Intelligence: Taming the E-Mail Monster
Vendors today are introducing new products that apply advanced algorithms designed specifically for e-mail analysis. The result is an emerging market: e-mail intelligence.
This Executive Update examines the use of e-mail intelligence tools, a market that is driven by the need for organizations to analyze the ever-increasing amounts of information accumulating in their corporate e-mail systems.
E-Mail Intelligence: Taming the E-Mail Monster
Vendors today are introducing new products that apply advanced algorithms designed specifically for e-mail analysis. The result is an emerging market: e-mail intelligence.
This Executive Update examines the use of e-mail intelligence tools, a market that is driven by the need for organizations to analyze the ever-increasing amounts of information accumulating in their corporate e-mail systems.
Securing Cyberspace: Is It Time to Rethink Our Strategy?
"Since it is private industry that owns and operates the vast majority of what constitutes the Internet, it is therefore industry's responsibility to demonstrate leadership in the fight to secure cyberspace."
Securing Cyberspace: Is It Time to Rethink Our Strategy?
"Since it is private industry that owns and operates the vast majority of what constitutes the Internet, it is therefore industry's responsibility to demonstrate leadership in the fight to secure cyberspace."
Cutter IT Journal: Securing Cyberspace: Is It Time to Rethink Our Strategy? - Opening Statement
In the call for papers for Cutter IT Journal's edition on cyber security, we asked, "Is it time to change our strategy?" Apparently, the answer is a resounding "yes."
Nearly every article we received (enough to necessitate a second edition on this topic to be published in August) called for fairly fundamental shifts in strategy to address a problem that most evidence suggests is growing like a malignant tumor -- and which we may understand far less how to treat.
Cutter IT Journal: Securing Cyberspace: Is It Time to Rethink Our Strategy? - Opening Statement
In the call for papers for Cutter IT Journal's edition on cyber security, we asked, "Is it time to change our strategy?" Apparently, the answer is a resounding "yes."
Nearly every article we received (enough to necessitate a second edition on this topic to be published in August) called for fairly fundamental shifts in strategy to address a problem that most evidence suggests is growing like a malignant tumor -- and which we may understand far less how to treat.
Cyber Risk Management: The Need for Effective Public and Private Partnership
In today's world, the traditional security paradigm is shifting to encompass the unique challenges presented by the digital landscape. IT and cyber infrastructure are critical to national economies and homeland security. Cyber systems support everything from food distribution to financial transactions to national security.
Cyber Risk Management: The Need for Effective Public and Private Partnership
In today's world, the traditional security paradigm is shifting to encompass the unique challenges presented by the digital landscape. IT and cyber infrastructure are critical to national economies and homeland security. Cyber systems support everything from food distribution to financial transactions to national security.
Investing in Cyber Security: The Path to Good Practice
According to the recent Technology Assessment: Cyber Security for Critical Infrastructure Protection conducted by the US Government Accountability Office (GAO):
Investing in Cyber Security: The Path to Good Practice
According to the recent Technology Assessment: Cyber Security for Critical Infrastructure Protection conducted by the US Government Accountability Office (GAO):
Securely Sustaining Software-Intensive Systems
Great authorization and authentication will not save a system from a poorly planned implementation and sustainment. Shepherding a software-intensive system through project development to implementation is just the beginning of the saga. Modern software-intensive systems face the confusing and multifaceted challenge of sustainment. After implementation is when the security problems will show up.


