Advisors provide a continuous flow of information on the topics covered by each practice, including consultant insights and reports from the front lines, analyses of trends, and breaking new ideas. Advisors are delivered directly to your email inbox, and are also available in the resource library.

Poor Online Marketing Practices Detrimental to Customer Relationship Building

Curt Hall
  For more on customer relationship management and business intelligence, join Cutter's Business Intelligence advisory service.

Corporate Alzheimer's and Deadline Management

Michael Mah

Lately, I've been paying attention to my memory or, perhaps, lack of it. I've noticed that, among other things, lapses are often related to the number of parallel tasks going on in my head. The more tasks I have to think about, the more I forget. So I try to focus on only a few things at a time; better to do a few things well than a lot of things poorly.


Rebalancing the Balanced Scorecard

Carl Pritchard

In the early 1990s, Drs. Robert Kaplan and David Norton developed the strategic management balanced scorecard concept to allow business to dissect its management and measurement system(s) into logical breakdowns of what matters and what doesn't. They deemed four areas important for such analyses:

Financial


The State of Distributed Computing

Paul Harmon

I got into a discussion of component systems the other day, and afterwards reflected on how the conversation had been "so 1990s." In the mid-1990s, people debated EJB and COM components. Today, the focus is on service-oriented architectures (SOAs) and the latest XML standards.


Get That IT Project Back on Track

Lynne Nix

As a consultant, one of the things I am often asked to do are project reviews: when things have not gone well, the stakeholders are looking for recommendations to get their project back on track. When projects get into trouble it is often for one (or more) of the following reasons:


The Case for Digital Identity Management: Increased Competition

Steve Andriole
  This article was excerpted from a recent Executive Report, "The Case for Digital Identity Management" by Stowe Boyd, a deliverable of Cutter Consortium's Business Intelligence advisory service.

Agile Data Modeling, Part 3

Ken Orr
  Agile Data Modeling series: Part 1 Part 2

A Systemic Approach to Software Risk Management

Robert Charette

[Excerpted from an article in the September 1992 Cutter IT Journal (formerly American Programmer).]


Vendors: Can't Live with Them, Can't Live Without Them

Steve Andriole

How do we think about vendors? Let me count the ways....


The Consortia

Tom Welsh

A Different Desktop Platform

Paul Harmon

I've recently read a series of articles on Linux desktop options, on Sun's Java Desktop, and on Apple as an alternative desktop. Most of the articles compared OS functionality and the cost per user. What most of the writers don't seem to understand is that, for most of us, a desktop OS is simply the platform on which we run the Microsoft Office suite.


Early Days, Early Models

Robert Austin
Barring dire geopolitical events or the emergence of pro-trade barrier political sentiments stronger than we've seen to date, the globalization of the IT labor force will continue.

Avoid the Stockholm Syndrome in Outsourcing

Thomas Cagley, Jr.

Managing risk is one of the keys to success in an outsourcing arrangement, and companies use many control mechanisms to manage risk in outsourcing deals. These control mechanisms can range from full-scale contract offices, project management offices, metrics, scorecard reporting, audits, CMMI assessments, and onsite oversight teams, or any combination of these.


Optimization Audits

Steve Andriole
  For more information on Cutter Consortium's Business Technology Trends and Impacts advisory service, please contact Cutter Consortium at +1 781 641 9876, fax +1 781 648 1950, or e-mail