Blending Learning Resources: Moving From Potluck to Banquet

Pamela Hager

Organizations are bursting with information and knowledge these days. For each, the challenge is to harness all this know-how and make it available to everyone throughout the organization. Today, there are myriad learning gems available for the taking; coupled with the Internet, the resources are boundless.


When IT Executives Become Strategists

Eric Tanefo

IT offers a major source of competitive advantage in almost all industries. Companies rely on technology to reduce internal inefficiencies, connect to external partners (suppliers, clients, and distributors), and implement business models that sometimes transform the rules of the game in their market space.


When IT Executives Become Strategists

Eric Tanefo

IT offers a major source of competitive advantage in almost all industries. Companies rely on technology to reduce internal inefficiencies, connect to external partners (suppliers, clients, and distributors), and implement business models that sometimes transform the rules of the game in their market space.


May 2002 Component Development Strategies

Volume XII, No. 5; May 2002PDF Version Executive Summary

Supply Chain Management: Progress So Far

Robert Austin
So what is the status of SCM at this juncture? I see two big-picture stories: one about how SCM activities are being targeted and another about the evolution of SCM automation products. The first story is more obviously relevant to our question, but the second -- a sort of subplot that has importance that transcends the SCM category of applications -- may turn out to be the bigger story.

A Component Architecture

Oliver Sims

Editor's Note: This report addresses component and application architectures in detail and builds on the discussion covered in the author's previously published report, "Making Components Work" (see Cutter Consortium Distributed Enterprise Architecture Executive Report, Vol. 4, No. 9).


A Component Architecture

Oliver Sims

The accompanying Executive Report details two of the key architectures necessary for efficient and productive application development: component architecture and application architecture.1


Do You Know Where Your Patterns Are?

Chris Armstrong, Bobbi Underbakke

The more things change, the more they stay the same.

-- Elphonse KarrLes Guê Pes, 1849

Those who cannot learn from the past are doomed to repeat it.

-- George SantayanaThe Life of Reason, 1905

One of these things is not like the others.

-- Big BirdSesame Street


CORBA Today

Paul Harmon

The Object Management Group (OMG) began developing CORBA in 1989. The idea was that organizations would be moving to object and component technologies and that everyone would be better off if they had a common, open standard to use when they wanted to link together objects or components on different platforms.


IT Architecture and Standards in Insurance: A Look at Industry Trends

Viktor Ohnjec
SPENDING TRENDS

It's no secret that insurance companies are big IT spenders. Larger insurers have been consistently spending hundreds of millions of dollars per year on software alone. For some time, insurers have been focusing the vast majority of their technology spending in two areas: computing infrastructure and business process automation.


The 12 Application Priorities for Competitive Intelligence in the Modern Business Enterprise

Arik Johnson

Competitive intelligence (CI) is the purposeful and coordinated monitoring of your competitor(s), wherever and whomever they may be, within a specific marketplace. Your competitors are those firms that you consider rivals and with whom you compete for market share. CI also involves determining what your rivals are planning to do before they do it.


The 12 Application Priorities for Competitive Intelligence in the Modern Business Enterprise

Arik Johnson

Competitive intelligence (CI) is the purposeful and coordinated monitoring of your competitor(s), wherever and whomever they may be, within a specific marketplace. Your competitors are those firms that you consider rivals and with whom you compete for market share. CI also involves determining what your rivals are planning to do before they do it.


The 12 Applications Priorities for Competitive Intelligence in the Modern Business Enterprise

Arik Johnson

If asked, just about any manager today could define competitive intelligence (CI). You should expect to hear responses ranging from "stealing business secrets" and "industrial espionage" coming from the truly deluded to a more accurate "collection and analysis of competitor behavior and plans" from those better informed.


The 12 Applications Priorities for Competitive Intelligence in the Modern Business Enterprise

Arik Johnson

If asked, just about any manager today could define competitive intelligence (CI). You should expect to hear responses ranging from "stealing business secrets" and "industrial espionage" coming from the truly deluded to a more accurate "collection and analysis of competitor behavior and plans" from those better informed.


Supply Chain Intelligence: Development Issues (Part II)

Curt Hall
  Supply Chain Intelligence: Development Issues series: Part IPart II

On Bricks and Walls: Why Building Secure Software Is Hard

Gary Mcgraw
BUILDING SECURE SOFTWARE

The Internet continues to change the role that software plays in the business world, fundamentally and radically. Software no longer simply supports back offices and home entertainment; instead, software has become the lifeblood of our businesses and has become deeply entwined into our lives.


On Bricks and Walls: Why Building Secure Software Is Hard

Gary Mcgraw
BUILDING SECURE SOFTWARE

The Internet continues to change the role that software plays in the business world, fundamentally and radically. Software no longer simply supports back offices and home entertainment; instead, software has become the lifeblood of our businesses and has become deeply entwined into our lives.


Viruses, Worms, and Zombies and What to Do About Them

Lee Imrey

In the first five months of 2001, leading antivirus vendors detected more viruses than they had in the entire previous year. This development led media outlets such as ZDNet to refer to 2001 as the "Year of the Virus." Not only were more viruses detected, but according to MessageLabs SkyScan virus-scanning service, the ratio of infected e-mail messages to total e-mail messages increased from roughly 1:1,500 to 1:1,000 [4].


Viruses, Worms, and Zombies and What to Do About Them

Lee Imrey

In the first five months of 2001, leading antivirus vendors detected more viruses than they had in the entire previous year. This development led media outlets such as ZDNet to refer to 2001 as the "Year of the Virus." Not only were more viruses detected, but according to MessageLabs SkyScan virus-scanning service, the ratio of infected e-mail messages to total e-mail messages increased from roughly 1:1,500 to 1:1,000 [4].


How to Maximize Business Value Using Agile Processes

Ken Schwaber
INTRODUCTION

Agile project management creates an opportunity for a business to comanage a project with its IT department. This Executive Report explains how comanagement works and how to maximize the project's return on investment (ROI). After all, ROI is the only important measure of success in agile project management.


How to Maximize Business Value Using Agile Processes

Ken Schwaber

The accompanying Executive Report presents the application of empirical process control to the practice of project management. Traditional project management lays out a plan and ensures that the activities conform to the plan.


The State of Software Estimation: Has the Dragon Been Slain? (Part 1)

E.M. Bennatan

Software estimation has been a tough beast to control ever since the early days of programming. Some may say that we have succumbed to the dragon. During the 1980s and 1990s, there were many infamous stories about software projects running out of control and ultimately being abandoned, due to significant cost and time overruns [1].