Transitioning to a digital world is front-of-mind for many business executives, yet finding the right path is an ongoing challenge. So we asked Cutter’s team of experts for their insights on some of the technologies, trends, and strategies that will be relevant in 2017 and beyond. In typical Cutter Business Technology Journal fashion, our call produced a wide range of opinions and reflections worthy of consideration as you chart your business technology journey for the new year.
January 2017
In this issue:- Technology Trends, Predictions, and Reflections 2017: Opening Statement
- Five Disruptive Technology Clusters
- Rapid Technology Innovation in Blockchain: Should You Be on the Front Lines?
- The IT Scene in 2017
- Cognitive Computing 2017
- Architectural Thinking to the Rescue
- The Future of Collaboration
- AGI: A Threat, an Opportunity, or an Inevitable Unknown for 2017?
- 2017: The Year of Exchanging Technology Hype for Humility and Hard Work
- Process of Things: Ensuring a Successful Connection Between Things
- The Tech-Driven Tech Backlash
- Delivering a Brighter Future for IT Projects
December 2016
This fintech special issue of Cutter Business Technology Journal (CBTJ) will assist managers in gaining an understanding of the emerging business opportunities and technologies in the financial services domain.
In this issue:- Fintech and the Digitization of Financial Services — Opening Statement
- Toward Digital Financial Services Ecosystems
- Fintech and Blockchain for Senior IT Managers
- How Digital Is Disrupting the Insurance Sector
- Distributed Ledger, Distributed Consensus, and Their Impact on the Financial Services Market
- Asia’s Payments Revolution
November 2016
This issue of Cutter Business Technology Journal (CBTJ) is focused on cognitive computing, a term that is similar to, but currently more popular than, artificial intelligence (AI). It refers to all those innovations in computing that are being driven by various types of AI research. Cognitive computing applications can provide superior interfaces that allow computer systems to interact with customers or employees, with the Internet or massive databases, or with computer chips embedded in almost any item you might want to track. The applications, once trained, can talk with people using ordinary language, ask questions, and then provide answers or recommendations.
In this issue:September 2016
This August/September 2016 double-issue of Cutter Business Technology Journal is about change. We don’t need to read more statistics or stories about digital transformation to convince us that it is real, poses both an opportunity and a threat for our organizations, and requires us to take action now. Digital transformation is more than just a bullet point in a strategy session or the current buzzword. The visions we cast and execute upon today will likely dictate our organizations’ successes and survival in the future and collectively shape the world in which we live.
In this issue:- Business-Driven Digital Transformation — Opening Statement
- Architecting Digital Transformation
- Leveraging Business Architecture to Digitize Business
- All About the Outcomes: Turning Needs into Experiences, From Ideas to Delivery
- All the World’s a Sound Stage: The Digital Transformation Journey in the Era of Hollywood Economics
- Achieving Digital Business Transformation through Strategic Acquisitions: The Role of Enterprise Architecture
- Socializing Technology: Digital Transformation and Global Business Services at Dell EMC
- The PIE Model: How CInOs Can Plan, Implement, and Evaluate Business-Driven “Innovating Innovating”
- The Human Risks of Digital Transformation
July 2016
This edition of Cutter IT Journal features five articles that discuss existing and future (but not at all fictional) risks in what we currently call the Internet of Things and that in the very near future will evolve into the Internet of Everything (IoE). It presents examples of risks and attacks in the different domains of our personal life, commercial world, and industry in which IoT devices are used, and highlights the corresponding technological and managerial challenges for confronting — even anticipating and warding against — security attacks.
In this issue:- Security in the Internet of Everything -- Opening Statement
- Cyber and Physical Threats to the Internet of Everything
- Security Challenges and Approaches in the Industrial Internet
- Social Engineering in the Internet of Everything
- Securing the IoT: It Takes the Global Village
- Security and Privacy in the Internet of Things: How to Increase User Trust

