In this issue of Cutter Benchmark Review, we tackle the topic of virtual teams and their management. Like any team, virtual teams are groups of individuals with shared objectives and shared responsibilities. Unlike traditional or colocated teams, though, virtual teams draw members from multiple locations and thus cannot easily meet face-to-face.
July 2006
July 2006
Business needs change, the competitive landscape changes, so system requirements must also be able to change if we want to deliver software that satisfies our customers. That's agile development in a nutshell, right? But what if we're so focused on the rapid development of working software "trees" that we don't see the "forest" of business requirements?
In this issue:- Do Agilists Understand Requirements?
- Early and Often: Elaborating Agile Requirements
- Are Systems Engineers Complete Losers When It Comes to Communication?
- Hallucinating Requirements
- Agile Requirements and the Art of Communicating
- Feature This: Transforming Borland’s Development Process with Scrum
- Agility vs. Requirements
June 2006
In this issue of Cutter Benchmark Review, we focus on the corporate applications of wireless networking.
In this issue:- Corporate Applications of Wireless Networking: Moving Beyond Cell Phones and BlackBerries
- Can Corporate Applications of Wireless Go Beyond Simple Productivity Applications?
- Ubiquitous Wireless Adoption Brings Business Opportunity — and Risks — for IT Leaders
- Corporate Applications of Wireless Networking: We Still Have a Lot of Room to Roam
- Corporate Applications of Wireless Networking Survey Data
June 2006
At the heart of customer relationship management (CRM) is the customer, and knowing the customer is key. Next month you’ll learn why it's vital to determine not just the customer’s propensity to buy but her capacity to buy — and why companies whose CRM systems leverage broader market data and predictive analytics will surpass those that get their CRM functionality out of a box.
In this issue:- CRM: The Next Five Years
- Web 2.0 and CRM: Harnessing the Power of Collective Business Intelligence
- Capacity Scoring: An Essential CRM Capability for Identifying and
- Maximizing the Analytic Value Chain: The Fusion of Enabling Technology and Marketing Science
- The Wireless CRM Market: Double-Digit Growth, High ROIs, Hosted Systems
- Business-to-Business CRM: The Next Five Years
- CRM from an M&A Perspective
May 2006
In the first installment of "Securing Cyberspace," we asked, "Is it time to rethink our strategy?" The answer was a resounding "yes." In next month's issue, our authors discuss a bevy of innovative ways we can protect our cyber infrastructure, from managing cyber risk through cyber insurance to reengineering the base protocols of TCP/IP.
In this issue:- Securing Cyberspace: What Exactly Should We Be Doing?
- Opening Statement: Securing Cyberspace: What Exactly Should We Be Doing?
- How to Stop Talking About - and Start Fixing - Cyber Security Problems
- Moving Beyond Security: The Resilience Imperative
- Contracting for Information Security in Commercial Transactions: A New Tool for Managing Risk
- The Role of Cyber Insurance in Fighting the War on Terror
- Payments System Security: No Longer Just a "Company Issue"
- Forging a Public-Private Partnership: The "Wonk-Free" Approach to Cyber Security