Book Review: Software Factories
Side Channels: Privacy's Stealth Enemy
When it comes to protecting my personal data, I feel both organizationally and technologically handicapped. Of course, there is the Data Protection Act (DPA), which applies mostly to countries of the western world, but how would that actually protect my personal data?
Far-Flung Teams Increase Intellectual Capital
TrueDemand for RFID Analysis
In a BI Advisor I wrote back in February 2004, I said that increased use of radio frequency identification (RFID) technology would lead to new analytic applications for supply-chain analysis and operational business intelligence (BI). (See, " BI and Radio Frequency Identification," 3 February 2004.)
TrueDemand for RFID Analysis
In a BI Advisor I wrote back in February 2004, I said that increased use of radio frequency identification (RFID) technology would lead to new analytic applications for supply-chain analysis and operational business intelligence (BI). (See, " BI and Radio Frequency Identification," 3 February 2004.)
Sourcing: What Works for You? In-, Off-, or Near-Shore?
TrueDemand for RFID Analysis
In a BI Advisor I wrote back in February 2004, I said that increased use of radio frequency identification (RFID) technology would lead to new analytic applications for supply-chain analysis and operational business intelligence (BI). (See, " BI and Radio Frequency Identification," 3 February 2004.)
TrueDemand for RFID Analysis
In a BI Advisor I wrote back in February 2004, I said that increased use of radio frequency identification (RFID) technology would lead to new analytic applications for supply-chain analysis and operational business intelligence (BI). (See, " BI and Radio Frequency Identification," 3 February 2004.)
(Paper) Documentation Considered Harmful
It's been part of programmers' training since the earliest days:
Enterprise Security Governance
What does it mean to govern for enterprise security or, stated differently, to govern an organization to achieve and sustain an acceptable or adequate level of security?
Our definition of governing for enterprise security (GES) is
Enterprise Security Governance
What does it mean to govern for enterprise security or, stated differently, to govern an organization to achieve and sustain an acceptable or adequate level of security?
Our definition of governing for enterprise security (GES) is
Align IT Strategies for Delivering Right Business Value: Developing Effective IT Strategies
In my previous Advisor (" Align IT Strategies for Delivering Right Business Value: Setting the Ground Rules," 20 July 2005), I discussed setting ground rules to establish and manage IT alignment initiatives and shared my observations from the practice. In this Advisor, I focus on the concepts relevant to developing strategies.
ESB Goes Open Source
Building a Safe Information-Sharing Environment
Since 9/11, enormous effort has been devoted to answering one basic question: "Why can't our intelligence agencies share critical information?" Indeed, following the attacks, various commissions and public agencies have devoted a large percentage of their time to solving the information-sharing problem.
Building a Safe Information-Sharing Environment
Since 9/11, enormous effort has been devoted to answering one basic question: "Why can't our intelligence agencies share critical information?" Indeed, following the attacks, various commissions and public agencies have devoted a large percentage of their time to solving the information-sharing problem.
Building a Safe Information-Sharing Environment
Since 9/11, enormous effort has been devoted to answering one basic question: "Why can't our intelligence agencies share critical information?" Indeed, following the attacks, various commissions and public agencies have devoted a large percentage of their time to solving the information-sharing problem.
Building a Safe Information-Sharing Environment
Since 9/11, enormous effort has been devoted to answering one basic question: "Why can't our intelligence agencies share critical information?" Indeed, following the attacks, various commissions and public agencies have devoted a large percentage of their time to solving the information-sharing problem.
Benchmarking State of the Art: Thinking About Metrics and IT Performance
It's time we step back from benchmarking specific topics and industries to consider the process of performance measurement and benchmarking itself. How should you use benchmarking information? What information should you gather about your company's own internal operations? In general, how should you gather and use performance data? It's important to look inward at your processes, your own ways of thinking, to make sure they still make sense and that you haven't developed any bad habits.
Measuring Up to Metrics: How I Became A Missourian
The state of Missouri is often referred to as the "Show-Me state." Its epithet is traced back to Missouri Congressman Willard Duncan Vandiver, who in an 1899 speech said, "Frothy eloquence neither convinces nor satisfies me. I am from Missouri. You have got to show me." Vandiver may have unwittingly been the father of metrics.
Business Performance Management: Key Performance Indicators
In November 2004, Cutter Consortium conducted a survey that asked 110 end-user organizations about their adoption and use of business performance management (BPM) practices. The goal was to determine the degree to which companies are implementing BPM techniques and technologies. In particular, the survey was designed to identify BPM development issues and trends, discern how companies are progressing with BPM initiatives, and provide statistics useful for benchmarking and measuring your organization's BPM efforts.
The "Anti-Productivity" Argument
"If you want higher quality, build less stuff." That, in essence, is what Cutter Business Technology Council Fellow Tom DeMarco once said about a daring strategy for quality improvement: reduce quantity. Tom went on to say, "Whatever it is that your organization makes, make less of it. Make less, and choose much more carefully what you make."1


