Corporate Trends in Real-Time BI Applications

Curt Hall

In February and March of this year, Cutter Consortium conducted a survey asking 152 organizations worldwide a variety of questions pertaining to their use of data warehousing and BI. The goal was to uncover corporate application development issues and trends, as well as to discern how companies are applying real-time BI technology to new applications and domains.


Corporate Trends in Real-Time BI Applications

Curt Hall

In February and March of this year, Cutter Consortium conducted a survey asking 152 organizations worldwide a variety of questions pertaining to their use of data warehousing and BI. The goal was to uncover corporate application development issues and trends, as well as to discern how companies are applying real-time BI technology to new applications and domains.


Managing the Project Portfolio

Ian Hayes

Is project portfolio management a passing fad? Or a smart idea whose time has come?

Although IT professionals have every right to be skeptical of the latest overhyped trend, don't discount project portfolio management. Far from a passing fad, the concept has existed for some time, in various incarnations.


Managing the Project Portfolio

Ian Hayes

Is project portfolio management a passing fad? Or a smart idea whose time has come?

Although IT professionals have every right to be skeptical of the latest overhyped trend, don't discount project portfolio management. Far from a passing fad, the concept has existed for some time, in various incarnations.


Cracking the Whip on Asset Management

Beth Cohen

You're responsible for managing the 40,000 user accounts and 53,500 computers for your company. It's 9 am on Monday. Do you know where your users' computers are? Do you have any idea what software and applications are running?


Cracking the Whip on Asset Management

Beth Cohen

You're responsible for managing the 40,000 user accounts and 53,500 computers for your company. It's 9 am on Monday. Do you know where your users' computers are? Do you have any idea what software and applications are running?


The Real-Time Company

Paul Harmon

Is That a Risk, an Issue, or a Problem?

Carl Pritchard

These three terms constantly blur together in organizations without a common risk lexicon. As such, we sometimes find ourselves using them interchangeably when, in fact, they are not synonyms. These terms represent three completely different types of project concerns (oh, great, a new term -- concern!) and are managed differently.


Is That a Risk, an Issue, or a Problem?

Carl Pritchard

These three terms constantly blur together in organizations without a common risk lexicon. As such, we sometimes find ourselves using them interchangeably when, in fact, they are not synonyms. These terms represent three completely different types of project concerns (oh, great, a new term -- concern!) and are managed differently.


Is That a Risk, an Issue, or a Problem?

Carl Pritchard

These three terms constantly blur together in organizations without a common risk lexicon. As such, we sometimes find ourselves using them interchangeably when, in fact, they are not synonyms. These terms represent three completely different types of project concerns (oh, great, a new term -- concern!) and are managed differently.


Is That a Risk, an Issue, or a Problem?

Carl Pritchard

These three terms constantly blur together in organizations without a common risk lexicon. As such, we sometimes find ourselves using them interchangeably when, in fact, they are not synonyms. These terms represent three completely different types of project concerns (oh, great, a new term -- concern!) and are managed differently.


Outsourcing and Web Services

George Westerman
  For more on Web services standards, see the October 2002 issue of Web Services Strategies, available from Cutter Consortium at +1 781 641 9876, fax +1 781 648 1950, or e-mail

Who Can You Trust?

Mark Seiden

In every facet of life, the question of who you can trust surfaces -- though the answer often eludes us. In the information security game, we try to create mechanisms to help us answer this question, and our reputation as well as professional pride are tied up with getting it right. But is that possible?