In this issue of Cutter Benchmark Review, we focus on the corporate applications of wireless networking.
June 2006
In this issue:- Corporate Applications of Wireless Networking: Moving Beyond Cell Phones and BlackBerries
- Can Corporate Applications of Wireless Go Beyond Simple Productivity Applications?
- Ubiquitous Wireless Adoption Brings Business Opportunity — and Risks — for IT Leaders
- Corporate Applications of Wireless Networking: We Still Have a Lot of Room to Roam
- Corporate Applications of Wireless Networking Survey Data
June 2006
At the heart of customer relationship management (CRM) is the customer, and knowing the customer is key. Next month you’ll learn why it's vital to determine not just the customer’s propensity to buy but her capacity to buy — and why companies whose CRM systems leverage broader market data and predictive analytics will surpass those that get their CRM functionality out of a box.
In this issue:- CRM: The Next Five Years
- Web 2.0 and CRM: Harnessing the Power of Collective Business Intelligence
- Capacity Scoring: An Essential CRM Capability for Identifying and
- Maximizing the Analytic Value Chain: The Fusion of Enabling Technology and Marketing Science
- The Wireless CRM Market: Double-Digit Growth, High ROIs, Hosted Systems
- Business-to-Business CRM: The Next Five Years
- CRM from an M&A Perspective
May 2006
In this issue of Cutter Benchmark Review, we focus on a topic that is dear to my heart and to that of many IT professionals I know: innovation in IT departments.
May 2006
In the first installment of "Securing Cyberspace," we asked, "Is it time to rethink our strategy?" The answer was a resounding "yes." In next month's issue, our authors discuss a bevy of innovative ways we can protect our cyber infrastructure, from managing cyber risk through cyber insurance to reengineering the base protocols of TCP/IP.
In this issue:- Securing Cyberspace: What Exactly Should We Be Doing?
- Opening Statement: Securing Cyberspace: What Exactly Should We Be Doing?
- How to Stop Talking About - and Start Fixing - Cyber Security Problems
- Moving Beyond Security: The Resilience Imperative
- Contracting for Information Security in Commercial Transactions: A New Tool for Managing Risk
- The Role of Cyber Insurance in Fighting the War on Terror
- Payments System Security: No Longer Just a "Company Issue"
- Forging a Public-Private Partnership: The "Wonk-Free" Approach to Cyber Security
April 2006
Why are seminars on measuring IT performance so well attended but implementation of performance management programs so rare? Could it be that we are afraid to manage IT like a business? Tune in next month as we look IT performance management full in the face — and live to tell the tale. Our expert authors will show you how to design a dashboard with leading indicators that help you take action.
In this issue:- The CIO Dashboard and IT Performance Management: Key to Demonstrating IT’s Value?
- Opening Statement: The CIO Dashboard and IT Performance Management: Key to Demonstrating IT’s Value?
- Getting on the Same Page: Dashboard Development from Planning to Implementation
- Mitigating Metrics Madness: How to Tell KPIs from Mere Metrics
- Action-Oriented Metrics for IT Performance Management
- Measuring Business Value from IT Investments
- In Pursuit of Value
- CIO Dashboards: Flying by Instrumentation