Implementing E-Business Strategy to Create Flexibility and Velocity

Andre Kuper
IMPLEMENTING E-BUSINESS STRATEGY

Pinky, The Brain, and Strategic Investment Management

Marek Stokalski
PINKY, THE BRAIN, AND STRATEGIC INVESTMENT MANAGEMENT by Marek Gmerski and Borys Stokalski

Before each night is done, their plan will be unfurled; By the dawning of the sun, they'll take over the world.


Pinky, The Brain, and Strategic Investment Management

Marek Stokalski
PINKY, THE BRAIN, AND STRATEGIC INVESTMENT MANAGEMENT by Marek Gmerski and Borys Stokalski

Before each night is done, their plan will be unfurled; By the dawning of the sun, they'll take over the world.


A Road Map for Successfully Transforming SMEs into E-Businesses

Athula Ginige, San Murugesan, Athula Murugesan, Philip Kazanis
A ROAD MAP FOR SUCCESSFULLY TRANSFORMING SMES

A Road Map for Successfully Transforming SMEs into E-Businesses

Athula Ginige, San Murugesan, Athula Murugesan, Philip Kazanis
A ROAD MAP FOR SUCCESSFULLY TRANSFORMING SMES

The Dark Side of Components

James Bach, Cutter Business Technology Council, Cutter Business Technology Council, Cutter Business Technology Council
Domain

Software Development

Assertion 48

The use of third-party components places an unexpected and potentially severe limitation on the reliability of software products.


Agile Methodologies Gaining Wider Acceptance

Scott Ambler

A common question asked within the IT industry is "How can we successfully develop software?" One answer is to adopt and follow an appropriate software process -- also referred to as a software methodology -- to guide your development efforts.


Agile Methodologies Gaining Wider Acceptance

Scott Ambler

A common question asked within the IT industry is "How can we successfully develop software?" One answer is to adopt and follow an appropriate software process -- also referred to as a software methodology -- to guide your development efforts.


IT Professionals Skeptical About Computing Utility Model

Robert Austin

In a recent Cutter Business Technology Council Opinion, I wrote the following:

"Software functionality and other services traditionally provided by internal IT departments will be increasingly delivered 'over the Net' via supply chains composed of multiple external service providers.


IT Professionals Skeptical About Computing Utility Model

Robert Austin

In a recent Cutter Business Technology Council Opinion, I wrote the following:

"Software functionality and other services traditionally provided by internal IT departments will be increasingly delivered 'over the Net' via supply chains composed of multiple external service providers.


Outsourcing ERP

Norris Overton

Outsourcing ERP

Norris Overton

The Big Mystery: What Will Be the Next "Paradigm Shift" in User Interfaces?

Ed Yourdon
THE BIG MYSTERY: WHAT WILL BE THE NEXT

The Big Mystery: What Will Be the Next "Paradigm Shift" in User Interfaces?

Ed Yourdon
THE BIG MYSTERY: WHAT WILL BE THE NEXT

Vendor Risk Assessments for Survivable COTS-Based Systems

Howard Lipson

Building survivable systems out of commercial off-the-shelf (COTS) components is a daunting task, primarily because you have little or no access to the artifacts of the software engineering process used to create the components. One way to partially compensate is to use vendor risk assessments as a tool to help you build, maintain, and evolve survivable COTS-based systems.


Vendor Risk Assessments for Survivable COTS-Based Systems

Howard Lipson

Building survivable systems out of commercial off-the-shelf (COTS) components is a daunting task, primarily because you have little or no access to the artifacts of the software engineering process used to create the components. One way to partially compensate is to use vendor risk assessments as a tool to help you build, maintain, and evolve survivable COTS-based systems.