Call for Papers

Below is the call for papers for the upcoming Cutter IT Journal issue The IoT: Technologies, Opportunities and Solutions, Guest Edited by Ron Zahavi and Alan Hakimi.

The Internet of Things in its basic form is the interconnected network of uniquely identifiable sensors, devices, and computers.

The ability to connect all these "things" together creates the opportunity to develop a limitless set of solutions applicable to every domain. Manufacturing plants can track the status of products being created as they cross the manufacturing floor. Building management companies can track the health of lighting or heating/cooling systems remotely. Governments can track water flow through water systems, crossers of their borders, traffic in their cities, and medicines to address pandemics. Consumers can manage their homes or vehicles from a distance.

All these possible solutions are not technologically alike. Some require real-time capabilities, others require few transactions and still others require high volume of concurrent transactions and bandwidth. Building these types of highly connected "systems of systems" requires sophisticated architectures that address complex integration, information management, identity and device management, and business intelligence and insights, for a start – all the while taking into consideration privacy and security threats and vulnerabilities.

CEOs and CIOs around the globe must evaluate and prepare for the IoT. Should they apply the IoT to the solutions targeting their customers? How do solutions that are consumer focused differ from those targeted to the back office? Should they use the IoT to improve the efficiency of the buildings they own and if so will it pose new security threats they need to understand?

An upcoming issue of Cutter IT Journal will address these questions and present strategies for meeting the challenges of newly emerging IoT technologies, solutions and opportunities.

Topics may include, but are not limited to, the following:

  • What should CEOs and CIOs do to evaluate and get their organizations ready to take advantage of the IoT?

  • What are new concerns, risks and threats posed by the IoT and how can they be addressed?

  • What opportunities and challenges exist for organizations seeking to leverage the IoT?

  • What are examples of IoT architectures and how are they different than traditional solutions?

  • What are the layers and services that IoT architectures must include?

  • How do IoT solutions relate to the cloud, mobility, social, and analytics?

  • How should organizations address ethics, compliance and governance posed by the IoT?


Please respond to Ron Zahavi at rzahavi[at]comcast[dot]net, with a copy to cgenerali[at]cutter[dot]com no later than 12 September 2014 and include an extended abstract and a short article outline showing major discussion points.


Accepted articles are due by 27 October 2014.


Most Cutter IT Journal articles are approximately 2,500-3,000 words long, plus whatever graphics are appropriate. If you have any other questions, please do not hesitate to contact CITJ's Group Publisher, Christine Generali at cgenerali[at]cutter[dot]com or the Guest Editor, Hillel Glazer at hglazer[at]cutter[dot]com. See the editorial guidelines.


When you submit an article to Cutter Consortium, you warrant that you (or your employer) are the sole owner of the article and that you have full power and authority to copyright it and publish it. Also, the article you submit to Cutter must be an original; not previously published elsewhere.

Articles published in the journal must meet certain criteria relating to audience, technical content, and presentation. In the unlikely occurrence that, upon selection and editorial review, your completed article does not meet with these requirements, Cutter Consortium reserves the right to decline the publishing of your article in the journal.

See more information on Cutter's copyright policy.


Typical readers of Cutter IT Journal range from CIOs and vice presidents of software organizations to IT managers, directors, project leaders, and very senior technical staff. Most work in fairly large organizations: Fortune 500 IT shops, large computer vendors (IBM, HP, etc.), and government agencies. 48% of our readership is outside of the US (15% from Canada, 14% Europe, 5% Australia/NZ, 14% elsewhere). Please avoid introductory-level, tutorial coverage of a topic. Assume you're writing for someone who has been in the industry for 10 to 20 years, is very busy, and very impatient. Assume he or she will be asking, "What's the point? What do I do with this information?" Apply the "So what?" test to everything you write.


We are pleased to offer Journal authors a year's complimentary subscription and five copies of the issue in which they are published. In addition, we occasionally pull excerpts, along with the author's bio, to include in our bi-weekly Cutter Edge e-mail bulletin, which reaches another 10,000 readers. We may also quote you, or passages from your article, in Cutter press releases. If you plan to be speaking at industry conferences, we can arrange to make copies of your article available for attendees -- furthering your own promotional efforts.


No other journal brings together so many cutting-edge thinkers, and lets them speak so bluntly and frankly. We strive to maintain the Journal's reputation as the "Harvard Business Review of IT." Our goal is to present well-grounded opinion (based on real, accountable experiences), research, and animated debate about each topic the Journal explores.