UCITA Will Cause Short- and Long-Term Harm to the Industry and the Public

Cem Kaner, Cutter Business Technology Council, Cutter Business Technology Council, Cutter Business Technology Council
Domain

IT Industry


UCITA Will Cause Short- and Long-Term Harm to the Industry and the Public

Cem Kaner, Cutter Business Technology Council, Cutter Business Technology Council, Cutter Business Technology Council
Domain

IT Industry


Timing Information Technology Investment

Tom DeMarco, Cutter Business Technology Council, Cutter Business Technology Council, Cutter Business Technology Council
Domain

IT Industry

Assertion #86

Companies that invest now in new IT infrastructure will emerge from the present downturn markedly stronger than their less confident competitors.


Timing Information Technology Investment

Tom DeMarco, Cutter Business Technology Council, Cutter Business Technology Council, Cutter Business Technology Council
Domain

IT Industry

Assertion #86

Companies that invest now in new IT infrastructure will emerge from the present downturn markedly stronger than their less confident competitors.


When Intelligence Is Much Needed

Eric Tanefo

With the recent acceleration of the economic downfall of several industries, the business community is entering an untested playground mined with all sorts of unpredictable threats.


When Intelligence Is Much Needed

Eric Tanefo

With the recent acceleration of the economic downfall of several industries, the business community is entering an untested playground mined with all sorts of unpredictable threats.


When Intelligence Is Much Needed

Eric Tanefo

With the recent acceleration of the economic downfall of several industries, the business community is entering an untested playground mined with all sorts of unpredictable threats.


Network Management Software Paradigm Versus Security Management Paradigm

Nicholas Nanos

Editor's note: Assertion 57 from the Cutter Business Technology Council states: "Every server on the Internet is attacked every day by hackers or hacker agent software.


Network Management Software Paradigm Versus Security Management Paradigm

Nicholas Nanos

Editor's note: Assertion 57 from the Cutter Business Technology Council states: "Every server on the Internet is attacked every day by hackers or hacker agent software.


2001 in Retrospect

Paul Harmon

Opening Up the Data Warehouse to Suppliers and Other Partners

Curt Hall
OPENING UP THE DATA WAREHOUSE

Risk Assessment Before May Prevent Litigation After

Cutter Consortium, Cutter Consortium
A RISK ASSESSMENT BEFORE

Project Mood Management

Jim Highsmith

Working with What You Have

Chris Pickering

Patterns for E-Business

Paul Harmon

One of the most interesting IT developments in 2001 was the growing use of patterns. At least a dozen books on patterns came out during the year, documenting patterns for new languages, for component models, for analysis and design issues, and for middleware systems development. One of the areas that I followed most closely was the extension of patterns to large-scale application design.