Business Technology & Digital Transformation Strategies

You are here

Digital Strategy, Operating Models & Technology Implementation Insight

Boost business success via insights on emerging trends in digital transformation and IT strategy; practical frameworks you can apply; and guidance from the world’s experts in leadership, IaaS, investment prioritization, operational excellence, sustainable innovation, change management, enterprise agility, and applying emerging technologies.

Learn More »

Recently Published


When AI Nudging Goes Wrong

by Richard Veryard

One way of getting an off-course system (or person) back on track is by nudging. This concept can be particularly useful in goal-directed systems. But, to reiterate, errors will occur. In his article, Richard Veryard describes technologically mediated nudging; the possible unintended consequences; and the need to consider the planning, design and testing, and operation of the system for robust and responsible nudging.


Vulnerability and Risk Mitigation in AI and Machine Learning

by David Biros, by Madhav Sharma, by Jacob Biros

Experienced IT practitioners know that errors will occur. A big part of building and managing complex systems is dealing with risk management (which includes identification and mitigation strategies). This is hard enough when documentation and source code exist. But the current state of ML-based AI tends to result in opaque black boxes, which make this activity, um, challenging. David Biros, Madhav Sharma, and Jacob Biros explore the implications for organizations and their processes.


Machine Learning and Business Processes: Transparency First

by William Jolitz

This article takes us to outer space (well, low Earth orbit, actually) to examine the issues around AI (in its ML incarnation) employed in a NASA system to track orbital debris. William Jolitz, the inventor of OpenBSD (open source Berkeley Software Distribution), makes the case for organization-wide awareness and alignment around ML and suggests that, like security, transparency cannot be bolted on later; it must be addressed at a project’s origin.

caution AI

Caution! AI Consequences Ahead — Opening Statement

by Lou Mazzucchelli

The contributions in this issue of CBTJ will help us get up to speed with the current state of AI and to think about some of the issues raised when we look beyond systems that appear to work as intended. Our contributors span industry and academia, and their commentary provides a good way to gain an overview of the problem.


The Benefits of AI for Cybersecurity

by Prerna Lal

Artificial intelligence (AI)-based cybersecurity solutions offer significant advantages with respect to threat detection, response time, and, most important, reduction in false positive alerts.


Business Architecture: Strategy Execution’s Secret Weapon

by Brian Cameron

Aligning strategic objectives and tactical demands is critical to successfully execute your strategy and drive change. Cutter Consortium Senior Consultant Brian Cameron explores the ways you can structure your business architecture to effectively facilitate strategy execution in this on-demand webinar.


A Security Management Cycle for Cybersecurity

by Feng Xu, by Xin Luo

Cybersecurity incidents lead to huge loss or severe damage to industrial assets. To mitigate cybersecurity threats, it is essential to understand the cycle of infor­ma­tion security governance and control: preparation, prevention, detection, response, and learning. This Advisor closely examines the security management cycle.

Stepping up

Stepping Up: Industry 4.0 in Regulated Industries

by Joel Nichols

In this Advisor, we explore some of the areas in which specific Industry 4.0 technologies can create advances within regulated industries.