Skip to main content
Cutter Consortium Cutter Consortium
  • Search
  • Login
  • Sign up
  • Practices
    • Leadership
    • Sustainability
    • Technology
    • Industry
  • Products & Services
    • Amplify
    • Research & Analysis
      • Amplify
      • Leadership
      • Sustainability
      • Technology
      • Industry
    • Join the Cutter Community
    • Subscribe to our Newsletters
  • Experts
    • All Experts
    • Leadership Experts
    • Sustainability Experts
    • Technology Experts
    • Industry Experts
  • Arthur D. Little
  • About
    • Corporate Overview
    • Testimonials
    • Contact Us
    • Privacy Policy & Terms of Use
    • Write for Cutter
  1. Home
  2. Journals
  • Agile Data Techniques

    December 2005

    "I believe that we're starting to see a trend away from the serial, and often bureaucratic, methods that pervade many data groups toward an evolutionary/agile approach that reflects modern software development practices."

    In this issue:
    • Agile Data Techniques
    • Agile Data Techniques: Opening Statement
    • Evolutionary Database Development Techniques
    • Agile Database Testing
    • Enabling Agile Database Development: A Case Study
    • Agile Applications as Open-Vocabulary English Business Rules over SQL
    • Data and Agile Methods
  • Security and Risk Management: The Never-Ending Game of Chess

    December 2005

    Viruses, Trojan horses, worms, time bombs, adware, spyware, keystroke tracking tools, spoofing, snooping, sniffers -- these are some of the most popular examples of malicious code and techniques that modern organizations find themselves fighting. Couple this seemingly unabated tide of new releases and new forms of harmful software with human threats like crackers, thieves, industrial espionage contractors, and your own disgruntled or ill-intentioned employees, and what do you get? You get a complex cocktail of potential security headaches. How big a headache?

    In this issue:
    • Security and Risk Management: The Never-Ending Game of Chess
    • Best Practices in IT Risk Management: Buying Safeguards, Designing Security Architecture, or Managing Information Risk?
    • Information Security -- A Difficult Game: Things to Think About When Planning Your Next Move
    • Security: A Game Worth Playing
    • IT Risk Management/Security Survey Data Collected by Cutter Consortium
  • IT-Related Litigation: Likely Trends and Recommended Practices

    November 2005

    "Alas, an embarrassingly large percentage of IT projects continue to fail -- and now that so many of them involve outsourcing contracts between vendors and customers who may be located on opposite sides of the world, the failures are even more likely to result in expensive litigation."

    - Ed Yourdon, Guest Editor

    In this issue:
    • IT-Related Litigation: Likely Trends and Recommended Practices
    • IT-Related Litigation: Likely Trends and Recommended Practices: Opening Statement
    • They Signed What? A Customer's Approach to Software Development Contracting
    • The Role of a Collaborative Commerce Legal Framework in IT-Related Litigation
    • Some Critical Misconceptions About Iterative Development -- and How They Lead to Litigation
    • When a Project Goes South, Try to Think Like a Lawyer
    • Sagas of an Expert Witness
  • It's Your Responsibility: Managing the Transition to Open Source Software

    November 2005

    From the Editor, Gabriele Piccoli

    Some debate can be had about the exact birth date of the open source software movement. Was it when computer enthusiasts and scientists began to exchange code? Was it at the time of the birth of the Internet when the infrastructure was made available to enable further collaboration?

    In this issue:
    • It's Your Responsibility: Managing the Transition to Open Source Software
    • The Business of Open Source: A Strategic Perspective
    • The Enterprise Transition to Open Source: Following the Yellow Brick Road
    • Open Source: A Reality That Still Requires Careful Management
    • Use of Open Source Software: A Summary of Survey Data
  • Cutter IT Journal: M&As: Can IT Make the Difference Between Success and Failure?

    October 2005

    Vol. 18, No. 10, October 2005
     
    It's About Reducing Risk
    Failure to include IT in M&A due diligence activity puts unnecessary pressure not only on the IT organization, but also on the business. Technology due diligence defines business issues and needs that require IT support.

    It's About Increasing Value

    In this issue:
    • M&As: Can IT Make the Difference Between Success and Failure? -- Opening Statement
    • M&A Technology Due Diligence: A Framework for Assessing the Good, the Bad, and the Ugly
    • Finding Method in the MADness: Case Studies of IT's Role in Mergers, Acquisitions, and Divestitures
    • Minimizing the Risk of an M&A
    • Adventures in M&A Wonderland
    • Why Due Diligence Should Include IT: A Case Study
    • The Importance of Human Needs Analysis in the Due Diligence Process

Pagination

  • Previous page
  • 62
  • Next page

Subscribe to free newsletters

Cutter connects the brightest minds from every field, creating unparalleled collective intelligence and transforming what’s possible.

Subscribe

Contact us

  • Cutter Consortium,
    an Arthur D. Little community
  • 10 High Street, Suite 900
    Boston, MA 02110 USA
    +1 (781) 648-8700
    service@cutter.com

Cutter | An Arthur D Little Company

Cutter | An Arthur D Little Company

Copyright © 2025 Arthur D. Little  |   All Rights Reserved. Privacy Policy | Terms of Service
  • Practices
    • Leadership
    • Sustainability
    • Technology
    • Industry
  • Products & Services
    • Amplify
    • Research & Analysis
      • Amplify
      • Leadership
      • Sustainability
      • Technology
      • Industry
    • Join the Cutter Community
    • Subscribe to our Newsletters
  • Experts
    • All Experts
    • Leadership Experts
    • Sustainability Experts
    • Technology Experts
    • Industry Experts
  • Arthur D. Little
  • About
    • Corporate Overview
    • Testimonials
    • Contact Us
    • Privacy Policy & Terms of Use
    • Write for Cutter