Technical Due Diligence for Acquisitions
Cutter Consortium’s Technical Due Diligence for Acquisitions ensures an unbiased assessment of the software, software architecture, technology, security, and technology skills of your potential acquisition. Discover the value and SWOTs of your target company’s current-state systems.
Technical Due Diligence for Acquisitions
Cutter Consortium’s Technical Due Diligence for Acquisitions ensures an unbiased assessment of the software, software architecture, technology, security, and technology skills of your potential acquisition. Discover the value and SWOTs of your target company’s current-state systems.
Just in Case: A Database Perspective on Business Continuity
In this Advisor, we provide a database perspective on business continuity. Starting from a contingency plan, we elaborate on various single points of failure: availability and accessibility of storage devices, availability of database functionality, and availability of the data itself.
Intelligence at the Edge of IoT
This article discusses the Industrial Internet along with the IoT applications and domains that are most likely to benefit from edge computing.
Intelligence at the Edge of IoT
This article discusses the Industrial Internet along with the IoT applications and domains that are most likely to benefit from edge computing.
Fog/Edge Computing: Opportunities, Case Studies, Challenges — Opening Statement
This issue of Cutter Business Technology Journal offers perspectives from seven authors on fog/edge computing to bring some sunlight to the challenges, benefits, and possible uses of these emerging technologies.
Fog/Edge Computing: Opportunities, Case Studies, Challenges — Opening Statement
This issue of Cutter Business Technology Journal offers perspectives from seven authors on fog/edge computing to bring some sunlight to the challenges, benefits, and possible uses of these emerging technologies.
Flying Through the Fog: Aerial Drones in Supply Chain Delivery
The authors address the criteria for operating unmanned aerial vehicles, or “aerial drones,” in a fog architecture. The use of drones in supply chain delivery offers faster, more cost-effective delivery but also poses myriad concerns, ranging from collision to security risks, as well as regulatory concerns.
Flying Through the Fog: Aerial Drones in Supply Chain Delivery
The authors address the criteria for operating unmanned aerial vehicles, or “aerial drones,” in a fog architecture. The use of drones in supply chain delivery offers faster, more cost-effective delivery but also poses myriad concerns, ranging from collision to security risks, as well as regulatory concerns.
Fog Computing: Securing the Intelligent Edge in Next-Generation Networks
The OpenFog Reference Architecture for fog computing has emerged as a highly credible paradigm for architecting compute-intensive solutions for networks and applications that utilize IoT, 5G, and artificial intelligence. In this article, we’ll examine how fog architecture addresses cybersecurity for next-generation networks.
Fog Computing: Securing the Intelligent Edge in Next-Generation Networks
The OpenFog Reference Architecture for fog computing has emerged as a highly credible paradigm for architecting compute-intensive solutions for networks and applications that utilize IoT, 5G, and artificial intelligence. In this article, we’ll examine how fog architecture addresses cybersecurity for next-generation networks.
Fog in the Smart Factory: Optimizing Production for Perishable Goods Manufacturing
This article illustrates how fog computing can reduce waste, improve product quality and consistency, and create a digital twin of difficult-to-replicate processes through a hypothetical example of a craft brewery.
Fog in the Smart Factory: Optimizing Production for Perishable Goods Manufacturing
This article illustrates how fog computing can reduce waste, improve product quality and consistency, and create a digital twin of difficult-to-replicate processes through a hypothetical example of a craft brewery.
Protecting Tomorrow's Critical Infrastructure
In a world where cyber threats are becoming ubiquitous, being able to apply a specific set of international standards combined with a dedicated and worldwide certification program, is one of the best ways of ensuring long-term cyber protection of critical infrastructure.
Looking at Cloud Characteristics in the Context of Big Data
In the context of cloud computing, big data analytics requires careful consideration of storage, integration, security, and pricing.
A Cloud Close to the Ground: Reflections from the Fog World Congress
After a brief introduction describing cloud, fog, and edge computing, Cutter Senior Consultant Claude Baudoin provides an overview, along with his insights, of the panels and discussions at the recent Fog World Congress.
A Cloud Close to the Ground: Reflections from the Fog World Congress
After a brief introduction describing cloud, fog, and edge computing, Cutter Senior Consultant Claude Baudoin provides an overview, along with his insights, of the panels and discussions at the recent Fog World Congress.
Architecture: Pilot or Autopilot?
Systems that simplify and enable an autopilot mode can help in dealing with complex real-world situations, unless they lead to implicit and unquestioning trust that ends up taking relevant human intelligence out of the loop.
Speaking Out: Rising Interest in Natural Language Processing
Almost 50% of survey respondents indicated that their organizations are interested in adopting NLP, making it third among all AI technologies organizations say they are most interested in adopting.
Agile Leadership in Scrum
In this Advisor, we align the Agile leadership framework to the key players in the Scrum process.
Measuring DevOps for Execs
While the name DevOps points toward a merger of the role of the developer (creating software) and operations (making software run), this is not really the case. What DevOps does is automate as much as possible the work of operation, and in a way that is comfortable and usable by developers.
The First Step: Scoping the Digital Backbone
This Advisor describes the first step in implementing a digital backbone: scoping. It draws on the lessons the author has learned in his work with transformational change in technology organizations.
AI & Machine Learning in the Enterprise, Part IV: How Do AI Technologies Rank?
Cutter Consortium is conducting a series of surveys on how organizations are adopting, or planning to adopt, artificial intelligence (AI) technologies. We also seek to identify important issues and other considerations they are encountering or foresee encountering in their efforts. Here in Part IV, we look at survey findings concerning the various AI technologies organizations are interested in adopting.
AI & Machine Learning in the Enterprise, Part IV: How Do AI Technologies Rank?
Cutter Consortium is conducting a series of surveys on how organizations are adopting, or planning to adopt, artificial intelligence (AI) technologies. We also seek to identify important issues and other considerations they are encountering or foresee encountering in their efforts. Here in Part IV, we look at survey findings concerning the various AI technologies organizations are interested in adopting.
Blockchain Ecosystems in the Financial Sector
Blockchain’s cryptographic capabilities can be applied directly to the business process, via the distributed ledger and data flow, obviating the need for third parties and ensuring privacy and confidentiality. In this Advisor, we present an example of blockchain’s use in the financial industry.