Strategic advice to leverage new technologies

Technology is at the heart of nearly every enterprise, enabling new business models and strategies, and serving as the catalyst to industry convergence. Leveraging the right technology can improve business outcomes, providing intelligence and insights that help you make more informed and accurate decisions. From finding patterns in data through data science, to curating relevant insights with data analytics, to the predictive abilities and innumerable applications of AI, to solving challenging business problems with ML, NLP, and knowledge graphs, technology has brought decision-making to a more intelligent level. Keep pace with the technology trends, opportunities, applications, and real-world use cases that will move your organization closer to its transformation and business goals.

Subscribe to the Technology Advisor

Recently Published

Many Agile experts have written about integration and testing. Some debate about the goals, while others explore the tactics taken to achieve them. Most agree that integration and testing should be performed continuously and in an automated manner, if possible. However, this seems to be the extent of agreement. Debate arises over “who does the integration and testing — when, where, and why?” along with discussion about the most efficient and effective way to get the job done. 

In this edition of The Cutter Edge, you'll explore a multi-pronged approach to creating a strategic incident response plan focusing on continuous process improvement, learn what a team has to do to span the gap between its work and the customer market, and more!

It’s clear that organizations are going to have to extend their enterprise data protection practices to be more transparent and flexible if they hope to comply with the various (changing) requirements of data protection and privacy legislation.

Here in Part VIII, we discuss the social and emotional cognitive aspects of proj­ects.

Cybersecurity incidents lead to huge loss or severe damage to industrial assets. To mitigate cybersecurity threats, it is essential to understand the cycle of infor­ma­tion security governance and control: preparation, prevention, detection, response, and learning. This Advisor closely examines the security management cycle.

The communication to design teams of new information that causes rework results in design oscillations. Since knowledge about how to complete a project is incrementally “consumed” by team members, design osc­illations are a natural metabolic byproduct of knowledge-foraging behavior. Design oscillations represent the key engine of the project metabolism. The problem lies in the timing of and team cooperation in synchronization of efforts related to design oscillations. 

It may be my narrow experience, but most Agile teams I encounter develop few to no diagrams or high-level views of the architecture they’re implementing. Instead, they allude to “being Agile,” where architectural docu­mentation is unnecessary, which implies that you simply collaborate around the code and magic (emergent architecture) occurs. In this Advisor, I suggest documentation as a good tool for striking the right balance between architecture and agility.

Despite the emphasis on and investment in cyber security, traditional approaches are failing to protect businesses and their customers. In this Advisor, we explore the benefits of adopting a new, unified approach that brings together technology and risk management processes, enabling organizations to better protect themselves against cyber threats and safeguarding their businesses, data, and revenues.