Implementing E-Business Strategy to Create Flexibility and Velocity
Hatfields and McCoys: Changing IT and Business Beliefs to Drive E-Business
Hatfields and McCoys: Changing IT and Business Beliefs to Drive E-Business
E-Powering the Business: Building a Business Strategy That Leverages the Internet
E-Powering the Business: Building a Business Strategy That Leverages the Internet
Pinky, The Brain, and Strategic Investment Management
Before each night is done, their plan will be unfurled; By the dawning of the sun, they'll take over the world.
Pinky, The Brain, and Strategic Investment Management
Before each night is done, their plan will be unfurled; By the dawning of the sun, they'll take over the world.
A Road Map for Successfully Transforming SMEs into E-Businesses
A Road Map for Successfully Transforming SMEs into E-Businesses
The Dark Side of Components
Software Development
Assertion 48The use of third-party components places an unexpected and potentially severe limitation on the reliability of software products.
Agile Methodologies Gaining Wider Acceptance
A common question asked within the IT industry is "How can we successfully develop software?" One answer is to adopt and follow an appropriate software process -- also referred to as a software methodology -- to guide your development efforts.
Agile Methodologies Gaining Wider Acceptance
A common question asked within the IT industry is "How can we successfully develop software?" One answer is to adopt and follow an appropriate software process -- also referred to as a software methodology -- to guide your development efforts.
IT Professionals Skeptical About Computing Utility Model
In a recent Cutter Business Technology Council Opinion, I wrote the following:
"Software functionality and other services traditionally provided by internal IT departments will be increasingly delivered 'over the Net' via supply chains composed of multiple external service providers.
IT Professionals Skeptical About Computing Utility Model
In a recent Cutter Business Technology Council Opinion, I wrote the following:
"Software functionality and other services traditionally provided by internal IT departments will be increasingly delivered 'over the Net' via supply chains composed of multiple external service providers.
Software Development 2001
Outsourcing ERP
Outsourcing ERP
The Big Mystery: What Will Be the Next "Paradigm Shift" in User Interfaces?
The Big Mystery: What Will Be the Next "Paradigm Shift" in User Interfaces?
Aligning Strategic Systems with Legacy Environments
A Platform with Wheels
Vendor Risk Assessments for Survivable COTS-Based Systems
Building survivable systems out of commercial off-the-shelf (COTS) components is a daunting task, primarily because you have little or no access to the artifacts of the software engineering process used to create the components. One way to partially compensate is to use vendor risk assessments as a tool to help you build, maintain, and evolve survivable COTS-based systems.
Vendor Risk Assessments for Survivable COTS-Based Systems
Building survivable systems out of commercial off-the-shelf (COTS) components is a daunting task, primarily because you have little or no access to the artifacts of the software engineering process used to create the components. One way to partially compensate is to use vendor risk assessments as a tool to help you build, maintain, and evolve survivable COTS-based systems.