Sourcing and Risk: Information Security's View
Sourcing and Risk: Information Security's View
BEA Buys Plumtree Software
Managing Technology Due Diligence: Packaging and Communications
The Other Face of Outsourcing
Developing Collaborations/Partnerships
Developing Collaborations/Partnerships
Developing Collaborations/Partnerships
Developing Collaborations/Partnerships
The Other Face of Outsourcing
The Other Face of Outsourcing
Developing Collaborations/Partnerships
Developing Collaborations/Partnerships
Relational and Object-Oriented Database Design in the 21st Century -- Part 3
Developing Collaborations/Partnerships
Developing Collaborations/Partnerships
Align IT Strategies for Delivering Right Business Value: Recognizing the Complexities of Risk Management and Governance
In my previous two Advisors (" Align IT Strategies for Delivering Right Business Value: Setting the Ground Rules," 20 July 2005, and " Align IT Strategies for Delivering Right Business Value: Developing Effective IT Strategies," 3 August 2005), I discussed setting ground rules to establish and
Align IT Strategies for Delivering Right Business Value: Recognizing the Complexities of Risk Management and Governance
In my previous two Advisors (" Align IT Strategies for Delivering Right Business Value: Setting the Ground Rules," 20 July 2005, and " Align IT Strategies for Delivering Right Business Value: Developing Effective IT Strategies," 3 August 2005), I discussed setting ground rules to establish and
Constraints on Wireless Applications and Development Challenges
The explosive growth of the market for wireless devices is stimulating widespread efforts to clone almost any technology developed for desktop computers to wireless handheld devices connected to a wireless network. This is challenging, as mobile applications must work within the daunting constraints of devices that have the following characteristics:
Summer Jigsaw Puzzles and Project Management
During this summer's family week at the beach, my wife bought a 1,000-piece jigsaw puzzle for us to assemble during hot afternoons and periods of rain. I noticed several things about assembling a jigsaw puzzle that may apply to projects and project management.
How Enterprise IT Uses Utility Computing
In April 2005, Cutter Consortium surveyed nearly 100 enterprise IT professionals regarding their views on utility computing. When asked how they define utility computing, the majority of all survey participants defined it as "deploying computing power on an as-needed basis."
"How do you define utility computing?"
How Enterprise IT Uses Utility Computing
In April 2005, Cutter Consortium surveyed nearly 100 enterprise IT professionals regarding their views on utility computing. When asked how they define utility computing, the majority of all survey participants defined it as "deploying computing power on an as-needed basis."
"How do you define utility computing?"


