Statistical Project Management, Part IX: Assigning Volatility to Different Levels
In Part IX of this Executive Update series on statistical project manangement, we return to the eight volatility metrics to see how we can assign them to project managers, object types, objects, phases, and other levels of analysis.
CX Management in the Enterprise, Part V: The Leading Technologies
In Part V of this Executive Update series, we examine the various leading CX technologies organizations are interested in adopting.
Building an Effective Digital Defense
While the world is enjoying the benefits of the fourth industrial revolution, the risks to businesses from cyber threats are increasing in both sophistication and frequency. What can business leaders do to strengthen their resilience to cyber threats? Leaders must first recognize that the risks in the digital space present as real a threat to the success of the business as do the more familiar risks in the physical world. To build effective digital resilience, leaders must adopt a C-suite response, embracing both robust technology and organizational culture approaches.
Why Is Software Delivery Talent So Difficult to Find?
The right team is key to crafting software systems capable of supporting innovation. Software delivery talent, however, is extremely difficult to find for a multitude of reasons, which we explore in this Advisor.
Why Is Software Delivery Talent So Difficult to Find?
The right team is key to crafting software systems capable of supporting innovation. Software delivery talent, however, is extremely difficult to find for a multitude of reasons, which we explore in this Advisor.
Caution! AI Consequences Ahead — An Introduction
This issue of CBTJ looks at three previous AI "waves" and helps us to get up to speed with the current state of AI and to think about some of the issues raised when we look beyond systems that appear to work as intended.
Caution! AI Consequences Ahead — An Introduction
This issue of CBTJ looks at three previous AI "waves" and helps us to get up to speed with the current state of AI and to think about some of the issues raised when we look beyond systems that appear to work as intended.
Blockchain Validation: The Core of “Trust”
Given the distributed nature and the potential uncertainty of the elements contained in any blockchain event, validation is an essential component. In this Advisor, we discuss how blockchain could improve trust in, and dependability of, the business process under automation.
Business Architecture: What’s the ROI?
This Executive Update offers an approach for calculating ROBAI to help business architecture teams better demonstrate their value and impact.
3 Essential Cybersecurity Issues in Industry 4.0
In this Advisor, we examine the three conventional essential security requirements — confidentiality, integrity, and availability — which present somewhat different issues in the age of Industry 4.0.
Who Knew THAT Would Happen?
Cutter Consortium Senior Consultant Paul Clermont describes some of the impact that AI has had at the boundaries of commercial organizations and public policy in an article aptly entitled, “Who Knew THAT Would Happen?” Those of us who have experienced unintended consequences of other technologies will want to answer “anybody” but should remind ourselves that some may not have the memory of prior years, and that hindsight is perfect. Clermont explores how to identify possible unintended consequences in advance and proposes countermeasures to negative unintended consequences in the form of design principles and public policies.
Who Knew THAT Would Happen?
Cutter Consortium Senior Consultant Paul Clermont describes some of the impact that AI has had at the boundaries of commercial organizations and public policy in an article aptly entitled, “Who Knew THAT Would Happen?” Those of us who have experienced unintended consequences of other technologies will want to answer “anybody” but should remind ourselves that some may not have the memory of prior years, and that hindsight is perfect. Clermont explores how to identify possible unintended consequences in advance and proposes countermeasures to negative unintended consequences in the form of design principles and public policies.
The AI Journey: What Is Real, and What Is AI?
Cutter Consortium Fellow Lynne Ellyn recounts her experiences with AI technology in the real world, surveys the current landscape, and identifies key nontechnical issues that companies are likely to face when deploying AI-based systems.
The AI Journey: What Is Real, and What Is AI?
Cutter Consortium Fellow Lynne Ellyn recounts her experiences with AI technology in the real world, surveys the current landscape, and identifies key nontechnical issues that companies are likely to face when deploying AI-based systems.
Strategic Perspectives on AI Product Development
As AI becomes more visible as a corporate strategic tool, organizations will have to incorporate issues surrounding AI as part of corporate strategy. Pavankumar Mulgund and Sam Marrazzo help us by providing a framework for developing an AI strategy. The authors discuss the “minimum viable model” approach to the development of the underlying AI/ML models, along with the platform on which these models run and the inevitable tradeoffs. They conclude their piece by examining some best practices for the successful implementation of AI initiatives.
Strategic Perspectives on AI Product Development
As AI becomes more visible as a corporate strategic tool, organizations will have to incorporate issues surrounding AI as part of corporate strategy. Pavankumar Mulgund and Sam Marrazzo help us by providing a framework for developing an AI strategy. The authors discuss the “minimum viable model” approach to the development of the underlying AI/ML models, along with the platform on which these models run and the inevitable tradeoffs. They conclude their piece by examining some best practices for the successful implementation of AI initiatives.
When AI Nudging Goes Wrong
One way of getting an off-course system (or person) back on track is by nudging. This concept can be particularly useful in goal-directed systems. But, to reiterate, errors will occur. In his article, Richard Veryard describes technologically mediated nudging; the possible unintended consequences; and the need to consider the planning, design and testing, and operation of the system for robust and responsible nudging.
When AI Nudging Goes Wrong
One way of getting an off-course system (or person) back on track is by nudging. This concept can be particularly useful in goal-directed systems. But, to reiterate, errors will occur. In his article, Richard Veryard describes technologically mediated nudging; the possible unintended consequences; and the need to consider the planning, design and testing, and operation of the system for robust and responsible nudging.
Vulnerability and Risk Mitigation in AI and Machine Learning
Experienced IT practitioners know that errors will occur. A big part of building and managing complex systems is dealing with risk management (which includes identification and mitigation strategies). This is hard enough when documentation and source code exist. But the current state of ML-based AI tends to result in opaque black boxes, which make this activity, um, challenging. David Biros, Madhav Sharma, and Jacob Biros explore the implications for organizations and their processes.
Vulnerability and Risk Mitigation in AI and Machine Learning
Experienced IT practitioners know that errors will occur. A big part of building and managing complex systems is dealing with risk management (which includes identification and mitigation strategies). This is hard enough when documentation and source code exist. But the current state of ML-based AI tends to result in opaque black boxes, which make this activity, um, challenging. David Biros, Madhav Sharma, and Jacob Biros explore the implications for organizations and their processes.
Machine Learning and Business Processes: Transparency First
This article takes us to outer space (well, low Earth orbit, actually) to examine the issues around AI (in its ML incarnation) employed in a NASA system to track orbital debris. William Jolitz, the inventor of OpenBSD (open source Berkeley Software Distribution), makes the case for organization-wide awareness and alignment around ML and suggests that, like security, transparency cannot be bolted on later; it must be addressed at a project’s origin.
Machine Learning and Business Processes: Transparency First
This article takes us to outer space (well, low Earth orbit, actually) to examine the issues around AI (in its ML incarnation) employed in a NASA system to track orbital debris. William Jolitz, the inventor of OpenBSD (open source Berkeley Software Distribution), makes the case for organization-wide awareness and alignment around ML and suggests that, like security, transparency cannot be bolted on later; it must be addressed at a project’s origin.
Caution! AI Consequences Ahead — Opening Statement
The contributions in this issue of CBTJ will help us get up to speed with the current state of AI and to think about some of the issues raised when we look beyond systems that appear to work as intended. Our contributors span industry and academia, and their commentary provides a good way to gain an overview of the problem.
Caution! AI Consequences Ahead — Opening Statement
The contributions in this issue of CBTJ will help us get up to speed with the current state of AI and to think about some of the issues raised when we look beyond systems that appear to work as intended. Our contributors span industry and academia, and their commentary provides a good way to gain an overview of the problem.
The Benefits of AI for Cybersecurity
Artificial intelligence (AI)-based cybersecurity solutions offer significant advantages with respect to threat detection, response time, and, most important, reduction in false positive alerts.


